You are on page 1of 40

The Philippine Quarterly IT Law Journal :: Volume 3, Number 1

THE PHILIPPINE QUARTERLY THE OFFICIAL PUBLICATION OF THE


ARELLANO UNIVERSITY SCHOOL OF LAW

IT Law Journal E-LAW CENTER AND IT LAW SOCIETY

VOLUME 3, N UMBER 1

whats
Inside
THE PROPOSED ONLINE VOTING IN SINGAPORE
THE PROPOSED ONLINE VOTING by Carlyn Marie Bernadette C. Ocampo-Guerrero
1 IN SINGAPORE

2E DITORIAL

I
n a news article published 4. The names of the candidates, with their
on January 18, 2007, the Commission on pictures and affiliations, will be shown
5 TV HE VULNERABILITY OF INTERNET
OTING Elections (COMELEC) has given word that, to the voter after they have encoded
should Congress approve amendments to or typed in the right PIN code.
6 AL UTOMATED
AW
ELECTION SYSTEM
the Overseas Voting (OAV) Law to allow 5. As soon as they have cast their votes,
postal and online voting, it will test voting the voters will be given a printed receipt
DIGITAL COPYRIGHT by way of the internet only in Singapore in as proof that their votes have been
7 the Philippines midterm election in May. [1] registered at the Comelecs database.
12 TD HE L EGALITY
OWNLOADING MUSIC
THE INTERNET
FROM
OF

Commissioner Florentino Tuason Jr., By the use of this system of voting, instead
chairman of the Committee on Overseas of going to the embassies and consulates,
Absentee Voting, said that the process has the overseas Filipinos can vote in their
19 CV ORPORATE
IDEOCONFERENCING
to undergo a trial first, and Singapore is houses as long as there is an Internet
the most appropriate place for testing online connection, thereby saving precious time
20 IJ URISPRUDENCE IN CYBERLAW:
NTERNET CONFIDENTIALITY OF voting, because it has a well-developed and effort. [5]
CASES INVOLVING VIOLENCE
AGAINST WOMEN AND CHILDREN
information and communications
technology industry. [2] Furthermore he Consequently, if Internet voting in Singapore
WHEN THE P IN PRE-PAID MEANS adds: The reason why we chose is proven successful, the commissioner says,
21 PUNKED Singapore is according to our supplier and the same system will be introduced to other
our own assessment, its easy for them to countries with Filipino communities in the
23 MI OST VISITED PHILIPPINE DAILIES
AND TV NETWORKS IN THE
NTERNET
be educated, first through the website, then 2010 elections. [6]
by training. [3] Filipinos will be educated
YOUR IDENTITY IN A COLORED on Internet voting through local newspapers Manner of Award of Contract.
24 PRINTER PRINTOUT and Filipino groups in city-state. [4] The Commissioner Florentino Tuason Jr. said
system of online voting appears to be that the Office of the Solicitor General
practical due to financial and time approved the selection of Scytl.com as the
28 D .C OT ON
constraints as well as distance barriers that software provider even without going
our overseas workers are faced with. through the public bidding as the Hewlett-
35 W HAT YOU SAY IN CYBERSPACE
MIGHT INCRIMINATE YOU How the proposed system works. The
Packard subsidiary has proven track record.
The system being utilized has also
following are the steps to make voting online safeguards against cheating. [7] He said
38 . WWW ASIANLII.ORG
possible: that the bidding process could be bypassed
D ECLARATION ON FREE ACCESS 1. An online site for Internet voting will because that it is the hindrance towards
39 L TO AW
be provided by Comelec. expediting the whole process, Filipino
2. Immediately after the voter opens or groups in the Middle East, particularly in
40 AIP L
SIAN EGAL I NFORMATION
NSTITUTE L AUNCHED IN THE
HILIPPINES
clicks the site, a video will automatically Saudi Arabia, which has the largest Filipino
appear on screen to give detailed community and number of registered
S UPREME C OURT S E-L IBRARY instructions on how to proceed with the absentee voters, have been clamoring, if
LAUNCHED voting. not demanding, to be allowed to vote by
E -L AW E XECUTIVE D IRECTOR
3. Personal information or details will have mail and via the internet. [8]
INITIATES VIRTUAL LAW CLASS to be keyed in by each voter in order
to get a PIN (personal identification >> [ 3 ] Proposed Online Voting
THE PHILIPPINE STRATEGIC ICT number) code.
ROADMAP

1
Editorial

A
fter a lull On the issue involving copyright of
of at least a year, a new issue of the IT electronic files, the viewpoints of a
Law Journal is hereby published. Most known e-law lecturer/practitioner in
of the journal contributors in the past Digital Copyright and a law student
years have recently graduated from enrolled in the Entertainment Law
the Arellano University School of Law course under Dean Mariano Magsalin
and also recently took the Philippine Jr. in The Legality of Downloading
Bar exams. The primacy of such Music From the Internet are
academic pursuit provided for a presented. Two other papers from the
handicap for the continuing release of said course are slated to be published
the Journal last year. in the next issue.

Last 19 January 2007, upon the Developments relevant to IT law in


recommendation of the Atty. Jaime N. Philippine jurisprudence are discussed
Soriano, Executive Director of the e- in Corporate Videoconferencing and
Law Center, the Arellano University Internet confidentiality of cases
School of Law, through Dean Mariano involving violence against women and
Magsalin Jr. and Mr. Florentino Cayco children. Articles written last year but
III, appointed me as the Deputy which were not published due to
Executive Director of said Center. It is circumstances articulated in the first
an honor to be given such responsibility paragraph -- When the P in Pre- leading website that provides free
and opportunity to help in the pursuit Paid means Punked, Your identity access to useful Philippine legal
of the purpose and goals of the Center in a colored printer printout, and information. The launching of the event
and of the school -- one of the goals Dot.con -- are finally published in Asian Legal Information Institute
of which is the publication of this this issue. Interesting reads from Atty. Launched in the Philippines is
Journal. Jaime Sorianos website (www.soriano- chronicled as to the latest about the
ph.com) are also included herein, such Center and the Society. Past
In this issue, the slated Philippine as Most visited Philippine dailies and participations of the Center, which
national elections on 14 May 2007, TV networks in the Internet and What were also featured, were the launching
for national and local elective officials you say in cyberspace might of the Supreme Courts E-Library and
except for the President and Vice incriminate you. the participation in the forum involving
President, provides the Journal to tackle the Philippine Strategic ICT Roadmap.
The Proposed Online Voting in The featured website for this issue is
Singapore, and its related article www.asianlii.org, the website of the It is also of great pride that the e-Law
The Vulnerability of Internet Voting. Asian Legal Information Institute. The Executive Director has initiated a
The recently enacted Automated Arellano Law Foundation was chosen Virtual Law Class in his website,
Election System Law (Republic Act as an Asian LII partner because of its apparently the first of its kind in the
9369) was also tackled. LawPhil Project, one of the countrys country.

Editorial Board The Philippine Quarterly IT Law IT Law Society


Journal is the official publication of the e-
C HAIRMAN
A new set of officers was elected for
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1

Law Center and the IT Law Society of the


Atty. Jaime N. Soriano, CPA, MNSA Arellano University School of Law. It is School year 2006-2007 on 6 January
published quarterly.
M EMBERS 2006, during the ITLSs New Years
Carlyn Marie Bernadette C. Ocampo- Contributions to the Philippine Quarterly IT party. Christine A. Prado was elected
Guerrero Law Journal express the views of their authors President, Kathleen Bentayen as Vice
Michael Vernon M. Guerrero and not necessarily the views of the Arellano President-Seminar, Jessica Belen as
Christine A. Prado University School of Law.
Vice President-Publication; Sheila
For subscriptions, contact: delos Santos as Secretary, and
S PECIAL C ONTRIBUTOR Kathrina Sulla as Treasurer.
Consuelo L. Cruz THE PHILIPPINE QUARTERLY
It Law Journal
e-Law Center E-Law Center
2/F Heilbronn Hall
Arellano University School of Law Michael Vernon M. Guerrero, former
Taft Avenue corner Menlo Street president of the IT Law Society (2004-
Pasay City 1300 Philippines
2006) was designated as the Deputy
Volume 3, Issue 1 Tels. +63 2 404-3089, 404-3090, 404-3091
http://www.arellanolaw.net Executive Director of the e-Law Center
2007. All Rights Reserved. itlawjournal@arellanolaw.net effective 19 January 2007.

2
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1
<< [ 1 ] Proposed Online Voting In the 2004 elections, The Department accuracy in the tallying of votes,
Abackground of Scytl proves its of Foreign Affairs (DFA), Commission greater savings in material costs in the
credibility and competence in providing on Elections (COMELEC) and the printing and distribution of paper
electronic system--- Philippine Overseas Employment ballots, greater accessibility for the
Agency (POEA) supervised the conduct disabled, flexibility in the modification
Scytl is a software company which of the 2004 overseas absentee voting. of ballot layouts, support of multiple
focuses or specializes in About sixty five percent (65%) of languages, better access to
application-level cryptography. [9] registered voters turned out to vote in information regarding voting options,
It is worldwide leader in the the more than 100 precincts that were prevention of involuntary errors when
development of secure e-voting/ established in different parts of the filling the ballot. [19]
e-participation solutions. It has world. [14]
over 10 years of experience in When electronic vote is remote, in
research and development in the For the 2007 polls, according to addition to the previous advantages,
said field. When it comes to the Comelec data, only a few OFWs from further benefits are provided, such as:
electronic voting industry, Scytl is Asian countries, Middle East, Africa, economies of scale as the size of the
the company being referred to by America and Europe registered for the electoral roll increases, greater
most people. elections. The pattern is the same in mobility and convenience for voters,
other parts of the world. [15] potential increase of participation in the
Scytl has developed Pnyx, a family voting process. [20]
of products that enable all kinds In order to strengthen the OAV law,
of electoral processes (elections, COMELEC is thinking of ways to make Implications of Electronic Voting.
referendums, consultations, labor the registration and voting process The use of electronic voting (poll-site
union elections, shareholders' easier for Filipinos who are scattered or remote voting) presents new
meetings, etc.) to be carried out all over the world. COMELEC has said challenges that should be taken into
by electronic means with the same that the introduction of internet voting account -- the digital nature of the
level of trust, security and privacy is being contemplated in areas like votes in themselves, without any paper-
that exist in conventional paper- Hong Kong, Singapore and Italy where based backup, the existence of a
based elections, and with the it would cost about P25 million for complex technological infrastructure
advantages that electronic systems every 500,000 voters compared to between the voter and the electoral
can offer: accessibility, flexibility, P52 million snail mail. [16] authorities, the existence of people with
cost and speed in the tallying of privileges in the voting systems, for
votes. [10] Since its beginnings, The System of Electronic Voting. example, technicians with total access
Scytl has received numerous We speak of electronic voting when to the systems they manage who could
international awards for its the casting of voting is carried out by manipulate the process. [21]
innovative technology, including the voter through electronic means,
the prestigious 2005 IST Prize thus obtaining an end-to-end digital Types of Security Measures
granted by the European vote. The use of paper is optional and Necessary in Electronic
Commission to the best technology auxiliary. [17] Voting.The following are four levels
companies in Europe. [11] of technological security measures that
Electronic Voting can be classified in are required:
Absentee Voting two categories: Poll-site voting and
Remote Electronic Voting. Our a. Network and systems
A Background. The Overseas concern is the second category which security - protection against non-
Absentee Voting (OAV) Law (Republic is the Remote Electronic Voting which authorized access (firewalls, user
Act 9189) was enacted on 13 takes place when voters cast their vote management...), protection
February 2003 to enable the from any location with access to the against DoS attacks, using fault-
disenfranchised Filipinos to have the Internet via mobile telephone, PCs, tolerant and redundancy
power to influence the way our PDAs, etc. The methods used to identify mechanisms, Protection of
government is run, by allowing them the voter are via digital signature, communications. [22]
to exercise their right to suffrage. [12] biometrics, PIN codes, etc. [18] b. Voters' remote authentication
The same law was enacted pursuant - Digital signature, Biometrics, PIN
to the constitutional mandate provided The process of electronic voting in codes plus personal data, Other
under Section 2 of the 1987 Philippine elections, citizen consultations and/or systems. [23]
Constitution that The Congress shall, other private consultations offer various c. Assurance of the electoral
among others, provide a system for advantages over their counterpart requirements, considering
absentee voting by qualified Filipinos based on paper. Any type of electronic the existence of technicians
abroad. [13] voting offers: greater speed and with privileged access to the

3
voting system. Voter privacy home in search for a better life, but appropriate software and
has to be guaranteed. At the same remain Filipinos at heart, when they hardware technologies for such
time, voters have to be properly are allowed to exercise their right of purpose for submission of a report
identified. The protection of the suffrage in the country where they thereon to the Joint Congressional
digital ballot box against external belong. Ideal it may seem, there still Oversight Committee.
attacks (hackers) and internal has to be an implementing law passed
attacks (administrators of the by Congress to make this vision come Formal approval of the proposed
system) in order to guarantee the into a reality. amendments to the OAV law by
following: secrecy of partial results, Congress, not only in principle, is
integrity of the votes cast (neither In a very short telephone conversation indispensable; and specific guidelines
elimination nor modification), with Atty. Kabaitan Guinhawa and implementing rules have yet to be
prevention of addition of bogus Valmonte, officer in charge of the provided before the system can be said
votes, voter self-verification of the Committee on Overseas Absentee to be feasible and practicable, taking
correct treatment of his/her vote Voting (COMELEC), she said that the into account the cost of the system, the
without allowing vote-buying or basis for implementing the Online security, reliability and until the legality
coercion. [24] Voting System is none other than of the whole process. Till then, this
d. Holistic audit capability As a Republic Act No. 9189 (An Act system should be put on hold because
result, specific technological Providing for a System of Overseas of its premature implementation and
solutions are necessary to Absentee Voting by Qualified Citizens its lack of basis in law.
guarantee all the security of the Philippines abroad,
Endnotes
requirements in an electronic appropriating funds therefore, and for
voting process.[25] Pnyx.core, with other purposes) and Section 52i of the 1. Philippines Plans to Test Online Voting
the result of 10 years of research Omnibus Election Code (Batas for Singapore OFWs. Julie Javellana-
and development, provides an Pambansa, Bldg. 881). However, a Santos, Arab News <http://
www. arabnews.com/?page=4&section
innovative solution in this field. [26] reading of the Republic Act No. 9189 0&article=91069&d=18&m=1&y=2007&pix=
does not explain or even mention about world.jpg&category=World>
Reason for the Need for Standard providing for an online system of voting 2. Ibid.
Security Measures. The standard for the overseas workers. 3. Ibid.
4. Ibid.
security measures provide control over 5. Ibid.
the access to the servers, can ensure Section 52i of the Omnibus Election 6. Ibid.
that all communications are secret and Code cites the powers and functions 7. Ibid.
protected between the web browser of the Commission on Election-- that 8. Scytl: Secure Electronic Voting. <http:/
/www.scytl.com/eng/acerca.htm>
and the server (by using SSL, for is to Prescribe the use or adoption of 9. A call to revisit and strengthen the
example), and offer other generic the latest technological and electronic overseas absentee voting law. <http://
guarantees. [27] devices, taking into account the ettarosales.wordpress.com/2006/11/
situation prevailing in the area and the 08/a-call-to-revisit-and-strengthen-the-
overseas-absentee-voting-law/>
Even if these standard security funds available for the purpose 10. Ibid.
measures are indisepensable in 11. Ibid.
electronic voting, they are not adequate It is only in the Proposed Amendments 12. Ibid.
to guarantee the electoral to the Overseas Absentee Voting Law 13. The System of Electronic Voting. <http:/
/www.scytl.com/eng/voto.htm>
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1

requirements described in the previous (R.A. 9189), where it specifically 14. Ibid.
point. [28] It is also essential to use mentions the COMELECs 15. Ibid.
specific security measures and recommendation of the use of 16. Ibid.
application-level cryptography, to electronic mail, internet, or other 17. Ibid.
18. Ibid.
adequately address the risks associated secured networks in the casting of 19. Ibid.
with electronic voting. Pnyx.core, votes: 20. Ibid.
together with the know-how of Scytl, 21. Ibid.
enable electronic voting to be carried Sec. 18. Personal Voting Casting 22. Ibid.
23. Ibid.
out with the same assurance of security and Submission of Ballots. 24. Ibid.
and trust that can be found in the 25. Ibid.
customary paperbased electoral 18.10 The Commission 26. Ibid
processes. [29] shall continuously study, evaluate 27. Ibid.
28. Ibid.
and recommend the adoption of
Conclusion the use of electronic mail, internet,
or other secured networks in the
There is empowerment of citizens who casting of votes. It shall likewise
are thousands of miles away from develop and maintain the

4
Features

The Philippine Quarterly IT Law Journal :: Volume 3, Number 1


THE VULNERABILITY OF INTERNET VOTING
By Jaime N. Soriano

he Commission on The system of e-voting may be done to see the ballots cast by the voter. In

T
Elections (COMELEC) formally
announced plans to pilot test Internet
voting in Singapore that would allow
registered overseas Filipino workers to
electronically cast their votes during the
14 May 2007 midterm elections.

With the implementation of Internet


voting, Filipino absentee voters can
conveniently vote in any Internet
on site with the use of electronic voting
machines or digital terminals or an
electronic public kiosk found in
authorized and designated polling
places or stations, which could be
offline or interconnected in a private
computer network.

E-voting can also be remote using the


Internet. This means accessing and
Internet voting, payment for the vote
may be withheld if access by the
candidates cohorts is refused by the
system.

Perhaps, the only way to address this


concern is to use biometric
authentication such as fingerprints,
DNA or retinal patterns. But this would
require a separate and very expensive
connected computers even at home, logging on to a designated site in software and hardware. And it is close
in Internet shops, or through the cyberspace using any available means to impossible to expect on-line voters
computers in Philippine embassies and of Internet access to perform or to have access to them on election day,
consular offices abroad, declared complete a poll transaction in a virtual unless the facilities for the biometric
COMELEC Commissioner Florentino polling place or station, a website. technology are installed and made
Tuason. available in government designated
The exercise of suffrage, at least in polling places or stations - but then the
Here is how the system works our jurisdiction, is a personal act. It e-voting becomes on-site.
according to the COMELEC: voters will cannot be assigned or delegated except
have to log on to the Comelec website in meritorious cases allowed by law, Through some connivance or
and be given a personal identification i.e. Sec. 196 of the Omnibus Election collusion, or utilizing the expertise of
number (PIN) to be able to view a list Code that permits the preparation of hackers and crackers, it might be
of senatorial candidates and party-list ballots by illiterate or physically easier to have virtual flying voters cast
organizations participating in the handicapped voters by another person. their votes on election day. All that is
elections. Once the voter clicks the needed is to intrude into anothers
names of his chosen candidates, he Remote e-voting or the use of the private identity or produce fictitious
click a button to send this information Internet in counting and transmission personal identities and assign PINs,
to the Comelec head office where his of votes may be a sound proposition passwords and other authentication
votes will be automatically counted. because it facilitates the timeliness, data for them to complete an on-line
reasonable accuracy, and integrity of poll transaction in favor of a candidate.
It makes sense to believe that the use the poll results provided that adequate Of course, there are audit trails or
of computer technology in the electoral network security is in place. But this system that could address this
process offers distinct advantages in may not be true in Internet voting. fraudulent act. But the process of
terms of ensuring the integrity, security, investigation and verification could be
and immediate outcome of the polls. Even if the Internet voting provides and more tedious and slow than the usual
But given my modest understanding of requires for PINs, passwords, and other manual voting system.
how the technology works, I believe authentication using personal data,
that the intended system could just be there is no assurance that the person In Estonia, Internet voting was utilized
a major tool to perpetuate electoral executing the poll transaction is the during the 2005 local elections
fraud. registered voter himself. He can easily alternatively with the paper ballot. To
pass on this security information to cast an electronic vote days before the
Electronic voting (or e-voting) another or worse to unscrupulous actual date of election, the voter needs
encompasses several stages of the candidates who bought his vote. The a computer with Internet access, his
electoral process: voters registration, set-up could even work well and better nationally issued ID-card and a card
casting of votes, and counting of votes. for the vote-buying candidates because reader. On Election Day, the voter
in a manual voting the vote-buyer
would not have the actual opportunity >> [ 3 5] Vulnerability of Internet Voting

5
Features

AUTOMATED ELECTION SYSTEM LAW


By Michael Vernon M. Guerrero

T
he Automated amending Sections 3 and 5, RA 8346, Results" (Sec. 25, RA 9369). These are
Election System Law or Republic Act respectively.) some of the amendments made by the
No. 9369 was signed into law on 24 Automated Election System Law.
January 2007. The law amended The poll automation law amended
Republic Act No. 8436 that provided Section 6 of RA 8436 as to the For weeks after the law s
for the automation of elections Authority to Use an Automated Election promulgation, there was a heated
supposedly starting from the national System, and Section 7 as to the debate whether Republic Act 9369
and local elections of 1998. It Minimum System Capabilities of the should be implemented for the 14 May
authorized the partial implementation automated election system. New 2007 elections. As of 14 February
of the automated polls for the May provisions were inserted to provide for 2007, the Commission on Elections,
2007 midterm elections. the Communication Channels for and the Advisory Council,
Electronic Transmission (Section 7, RA recommended against automating,
The law defined the automated 8436 as provided by Sec. 8, RA 9369); even partially, the said polls. Lorenzo
election system (AES) as a system the Advisory Council and the Technical Formoso, advisory council spokesman,
using appropriate technology which Evaluation Committee (Secs. 8 and 10, said the decision was "a question of
has been demonstrated in the voting, RA 8436), their functions (Secs. 9 and prudence rather than possibility," and
counting, consolidating, canvassing, 11, RA 8436). As to the procurement that "If poll automation is not properly
and transmission of election results and and maintenance of the AES itself, the tested, it would be vulnerable to
other electoral processes. (Section 2 law amended the provisions of RA hacking. A lot of bad things can come
[1], RA 8436, as amended by RA 9369) 6436 as the Procurement of out if we will insist on pilot-testing poll
A paper-based election system Equipment and Materials (Sec. 8, now automation." (Jaymalin, Mayen and
is defined, on the other hand, as a type 12), Continuity Plan (Sec. 9, now 13), Marvin Sy, The Philippine Star. Its final:
of automated election system that uses and Examination and Testing of No law automation, http://www.abs-
paper ballots, records and counts Equipment or Device of the AES and cbnnews.com/storypage.aspx?
votes, tabulates, consolidates/ Opening of the Source Code for StoryId=66829) A clearer basis,
canvasses and transmits electronically Review (Sec. 10, now 14). In light of however, for the non-implementation
the results of the vote count, (Section the automation, the provisions of of the law is Section 26, RA 9369
2 [7], RA 8436, as amended by RA Official Ballot (Sec. 11, now 15), Ballot amending Section 25 (now 31) of RA
9369) while a direct recording box (Sec. 13, now 17), Procedure in 8436 (Stakeholder education and
electronic election system is a type voting (Sec. 14, now 18), Closing of training) which partly provides that
of automated election system that uses polls (Sec. 15, now 19), Notice of "The Commission shall, not later than
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1

electronic ballots, records votes by Designation of Counting Centers (Sec. six months before the actual automated
means of a ballot display provided with 16, now 20), Counting Procedure (Sec. election exercise, undertale a
mechanical or electro-optical 17, now 21), Election Returns (Sec.18, widespread stakeholder education and
components that can be activated by now 22), Canvassing by Provincial, training program, through newspapers
the voter, processes data by means of City, District and Municipal Boards of of general circulation, radio, television
a computer program, records voting Canvassers (Sec. 21, now 25), Number and other media forms, as well as
data and ballot images, and transmits of Copies of Certificates of Canvass of through seminars, symposia, fora and
voting results electronically (Section 2 Votes and their distribution (Sec. 22, other nontraditional means, to educate
[8], RA 8436, as amended by RA now 26), National Board of Canvassers the public and fully inform the
9369). for Senators and Party-List electorate about the AES and inculcate
Representatives (Sec. 23, now 27), and values on honest, peaceful, orderly
Under the said poll automation law, Congress as the National Board of and informe elections." The law, being
each Board of Canvassers shall be Canvassers for President and Vice promulgated only four months prior
assisted by an information technology- President (Sec. 24, now 28) were to the election, cannot possibly comply
capable person authorized to operate amended. A new section 30 was with this mandate.
the equipment adopted for the created as to "Authentication of
elections. (Sections 3 and 5, RA 9369, Electronically Transmitted Election

6
Computing

The Philippine Quarterly IT Law Journal :: Volume 3, Number 1


DIGITAL COPYRIGHT
By Jaime N. Soriano

Introduction conversely by giving authors, artists trivial, the requirements of originality

I nternet technology
made it possible to distribute,
disseminate, share or exchange, or
capture various information and data
among all the computers
interconnected in cyberspace in digital
or electronic format. The technology
is a huge success that it has also
and others the right to exclude others
from using their works. Essentially,
copyright is the legal right of the author
to his intellectual creation or work.

Under Philippine law and following the


governing principles of the 1886
Berne Convention, copyright attaches
to a work from the moment of its
creation by the author without need of
and creativity are deemed satisfied.

Fixation. Under this requirement, it


is necessary that the original work is
fixed as a tangible medium of
expression. In short, the copyrighted
work must have presence that is
cognizable by the human senses. A
work like a story, a picture, a sound,
or a video is as much protected on a
conquered the usual print and further registration. disk or in cyberspace (written in HTML
broadcast media within its domain. for instance) in a similar fashion as
Obviously, the protection being served when it is captured in paper, tape, on
Digital information may be in the form by copyright is two-fold: the protection stage or similar medium of expression.
of text, graphics, sounds, video, of the author's general right how his
pictures, databases, or computer work is used, and the protection of his There is no iota of doubt that these
programs. This information can be economic rights for creating a valuable essential elements of what constitute
easily uploaded to, downloaded, work. copyright exist in cyberspace works and
transmitted, copied or used creation.
electronically from, the Internet. With It is axiomatic that for the author to
the convenience and accessibility of enjoy copyright protection for his work, Exclusive Rights
data in the network, people tend to he must satisfy three (3) requirements:
assume that they are within the public Copyright carries with it the following
domain and completely ignoring the Originality. Simply stated this means exclusive rights:
legal reality that those digital materials that the author did not copy the work
are also within the ambit of copyright from someone elses work. While The Right to Privacy of Work. This
protection. originality is the essence of copyright, simply means that the author or creator
it does not require that the work is has the right to exclude all others or
Copyright is very much a part of the novel, unlike patents. the public from reproducing the work
Internet. Works posted in cyberspace in the form of a copy. Copyright
are considered published and therefore Creativity. An author can still claim connotes the right to exclude, or not to
qualify for copyright protection. copyright for a work as long as he publish, the work. Websites that restrict
created it himself, even after people access to information of works
The Intellectual Property Code of the already created a similar work before published in the Internet come within
Philippines defines communication to him. Even if only a part of the work is the purview of this right.
the public and published works as original, the work could still satisfy the
making the work available to the public requirement of originality because The Right of Distribution. This
by wires or wireless means. This what is required of the work to enjoy pertains to the right of the author to
definition provides the legal recognition protection is only a minimum amount distribute copies to the public by sale
and basis of Internet copyright in this of creativity. or other modes of transferring
jurisdiction. ownership or by rental or lease. This
Hence, while reproduction in context is also known as economic rights.
The Essence of Copyright is obviously a mere copy and should
not enjoy copyright protection, if First sale doctrine assures the author
Copyright should literally mean the something is contributed to the final or creator of the work that until he
right to copy. But in legal parlance, the product and the variations between the parts with the ownership of his
application of the right is applied original and the copy is more than creation, his privacy rights remain. It

7
is only after the first sale that the new embodied in or represented by the documents, no work of the Philippine
owner can treat the work also as his copyright work. government, as well as the works of
own. government-owned and/or controlled
Other intellectual property laws, like corporations, can be copyrighted
Copyright however is not a license to trademarks and patents, may be the (images, documents, and the like).
sell or distribute, for example, libelous basis though for legal restrictions on However, prior approval is needed if
email or on-line messages. Works and certain reproduction or use where a government work will be used for
creation that invade the privacy rights copyright may not be available. making a profit .
of others or violate obscenity laws may
not be published just because they In copyright, what is subject of the Types of Protected Work
happen to be covered by copyright. protection is the manner of expression,
and not the idea itself. The Intellectual Property Code of the
The uploading of works or making Philippines governs the following
them available on line in cyberspace The Philippine Intellectual Property copyrighted works:
constitutes publication. But it does not Code is clear on this matter when it
diminish or necessarily result in the provides that no protection shall 1. Original Work consists of
waiver of the authors economic rights extend, under this law, to any idea, original intellectual creations in the
over the work. procedure, system method or literary and artistic domain
operation, concept, principle, protected from the moment, and
The Right to Create Adaptation. discovery or mere data as such, even by the sole fact, of their creation
A work may be derived from an if they are expressed, explained, irrespective of the mode and
original work through translation, illustrated or embodied in a work; news manner of expression. In
interpretation, arrangement, of the day and other miscellaneous particular, it includes the following:
dramatizations, fictionalization, films, facts having the character of mere (a) books, periodicals,
recordings, abridgment, condensations items of press information; or any newspapers, pamphlets, letters,
or any other form in which a work may official text of a legislative, articles and other writings; (b)
be recast, transform or adapted. administrative or legal nature, as well lectures, sermons, addresses or
Subsequent works, independently as any official translation thereof. dissertations prepared for oral
created although appearing to be delivery, whether or not reduced
similar to earlier works, do not Works in the Public Domain in writing or other material form;
necessary constitute infringement. (c) dramatic or dramatico-musical
There are certain works that does not compositions, choreographic
The cut, paste, copy and save-as enjoy copyright protection, in full or in works or entertainment in dumb
function of the Internet makes it part, because these works are deemed shows; (d) musical compositions
convenient for users to adapt the work to be a part of public domain. These with or without words; (e) drawing,
of others as his own without realizing works especially when published in the painting, architecture and other
that it could result in copyright Internet are free for everyone to use. works of arts including models or
violations. designs for work of art; (f) original
A work will be part of the public domain ornamental designs or models for
The Right to Performance and if (a) the copyright protection expired, articles of manufacture and other
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1

Public Display. This pertains to the (b) or the copyright is lost or never works of applied art; (g)
right to perform a protected work in acquired, (c) the work was published illustrations, maps, plans,
public such as stage play, before there was a copyright law, (d) sketches, charts and three-
dramatization, and public or the author dedicated the work to dimensional works relative to
performances. The multimedia public domain, i.e. Creative geography, topography,
capabilities of the Internet facilitate the Commons, Copyleft, or the GNU architecture or science; (h)
expression of this right. Public License (also known as GPL) drawings of a scientific or technical
(e) the work is not entitled to copyright character; (i) photographic works;
Idea versus Expression protection, i.e. government work, laws, (j) audiovisual and
judicial decisions. cinematographic works; (k)
Copyright covers only the specific form pictorial illustrations and
or the particular manner in which All official Philippine texts of a advertisements; (l) computer
ideas or information have been "legislative, administrative, or judicial programs; and (m) other literary,
manifested, or the so-called "form of nature" or any official translation of scholarly, scientific and artistic
material expression". It is not designed those kinds of texts may not be works.
or intended to cover the actual idea, copyrighted and are in the public
concepts, facts, styles, or techniques domain. Aside from government

8
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1
2. "Collective Work" means a work the words "fair" or "reasonable" use The principles behind fair use are
such as a periodical issue, cannot be precisely defined, there are equally applicable in the super
anthology or encyclopedia, in a few benchmarks. information highway as a limitation to
which the work in its entirety in digital copyright.
unmodified form, along with a The fair use of a copyrighted work for
number of other contributions, criticism, comment, news reporting, Moral Rights: Independent of any
constituting separate and teaching including multiple copies for economic right, the author of a work
independent works in themselves, classroom use, scholarship, research, has the right to require that the
are assembled into a collective and similar purposes, is not an authorship of the works be attributed
whole, or a work that has been infringement of copyright. to him, in particular, the right that his
created by two (2) or more natural name, as far as practicable be
persons at the initiative and under Decompilation, which is understood to indicated in a prominent way on the
the direction of another with the be the reproduction of the code and copies, and in connection with the
understanding that it will be translation of the forms of the computer public use of his work; to make any
disclosed by the latter under his program to achieve the inter- alteration of his work prior to, or to
own name and that contributing operability of an independently created withhold it from, publication; to object
natural persons will not be computer program with other to any distortion, mutilation or other
identified . programs, may also constitute fair use. modification of, or other derogatory
action in relation to, his work which
3. "Derivative Work" means a work In determining whether the use made would prejudice his honor or
based upon the work or upon the of a work in any particular case is fair reputation; and, to restrain the use of
work and other pre-existing works, use, the factors to be considered shall his name with respect to any work not
such as dramatizations, include: (a) the purpose and character of his own creation, or in a distorted
translations, adaptations, of the use, including whether such use version of his work.
abridgments, arrangements, and is of a commercial nature or is for non-
other alterations of literary or profit education purposes; (b) the The author however may waive these
artistic works including collections nature of the copyrighted work; (c) the rights in writing, electronically or
of literary, scholarly or artistic amount and substantiality of the portion otherwise, but such waiver shall be
works, and compilations of data used in relation to the copyrighted work ineffective where its effect is to permit
and other materials which are as a whole; and, (d) the effect of the another to use the name of the author
original by reason of the selection use upon the potential market for or with respect to a work he did not create
or coordination or arrangement value of the copyrighted work. or to use the name of the author, the
of their contents. These works title of his work, or his reputation with
shall be protected as a new work The fact that a work is unpublished shall respect to any version or adaptation
provided that they do not affect not by itself bar a finding of fair use if of his work which, because of the
the force of any subsisting such finding is made upon alterations therein, would substantially
copyright upon the original works consideration of all the above factors. tend to injure the literary or artistic
employed or be construed to imply reputation of another author.
any right to such use of the original Usage intended to advance public
work, or to secure or extend the interests such as criticism, education Insofar as performers, as regards his
copyright in such original works. or scholarship is generally favored live aural performances or
especially if only a little of another's performances fixed in a sound
Obviously, the Internet is a haven for work is copied. Uses however that recordings, he shall have the right to
all of these types of work or intellectual generate income or interfere with a claim to be identified as the performer
property creation. But in the process copyright owner's income are not. of his performances independently of
many disregard the fact that the Fairness also means crediting original his economic rights.
derivative work is part of the exclusive artists or authors.
rights given to the author or creator of The exclusive rights of performers and
the original work under his right to The use of another's work for producers shall not apply when the
create adaptation. commercial purposes or for profit is work is (1) used by a natural person
disfavored but not entirely forbidden. exclusively for his own personal
Copyright Limitations Hence, while magazines and purposes, or (2) used as short excepts
newspapers are operated for profit, for reporting current events, or (3)
The Doctrine of Fair Use: This is they are not automatically precluded used solely for the purpose of teaching
one of the most important limits to from adopting the doctrine of fair use. or scientific research, or (4) under
copyright. It permits some use of others' conditions of fair use as defined
works even without approval. While herein.

9
When an author contributes to a or carried by broadcast where a analogous to photography or any
collective work, his right to have his copyright is attached. process for making audio-visual
contribution attributed to him is deemed recordings: fifty (50) years from date
waived unless he expressly reserves 7. In sound recordings, the protection of publication and, if unpublished,
it. applies where the producer is a from the date of making.
Filipino citizen or the sound
Moral rights were first recognized in recording is first published in the Calculation of term for the
France and Germany before they Philippines. above: the term of protection
were introduced in the Berne subsequent to the death of the author
Convention. But not all countries 8. In broadcast, the protection shall provided shall run from the date of his
recognize moral rights as part of their apply to broadcasts of death or of publication, but such terms
copyright laws. Notable among them broadcasting organization the shall always be deemed to begin on
is the United States. headquarters of which are situated the first day of January of the year
in the Philippines or for broadcasts following the event which gave rise to
Hence, the application of the doctrine transmitted from transmitters them.
of moral rights in the web may vary situated in the Philippines.
from country to country and from For the rights granted to
jurisdiction to jurisdiction. These rules may be applied in works performers and producers of
found in the Internet particularly if sound recordings: (a) For
Points of Copyright Attachment there is an issue as to the application performances not incorporated in
under Philippine Laws of the Philippine Intellectual Property recordings, fifty (50) years from the
Code. end of the year in which the
Copyright protection afforded by performance took place; and (b) For
Philippine law shall apply to: Duration of Copyright Protection sound or image and sound recordings
and for performances incorporated
1. Works of authors who are Filipino Original, derivative and therein, fifty (50) years from the end
citizens or have their habitual posthumous works: lifetime of the of the year in which the recording took
residence in the Philippines. author and for fifty (50) years after place.
his death.
2. Audio-visual works the producer For broadcasts: twenty (20) years
of which has his headquarters or Works of joint authorship: during from the date the broadcast took place.
habitual residence in the the life of the last surviving author and The extended term shall be applied
Philippines. for fifty (50) years after his death. only to old works with subsisting
protection under the prior law.
3. Works first published in the Anonymous or pseudonymous
Philippines works: for fifty (50) years from the In determining whether or not a work
date on which the work was first in cyberspace with a point of
4. Works first published in another lawfully published unless before the attachment to Philippine laws falls
country but also published in the expiration of this period, the identity outside copyright protection, and
Philippines within thirty days, of the author is revealed, the term as therefore already part of the public
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1

irrespective of the nationality or above stated (for original, derivative domain, a consideration of the
residence of the authors. and joint authorship work as the case foregoing period is imperative.
maybe) shall apply. If the work is not
5. Works that are to be protected by published, the fifty (50) years is Copyright Myths
virtue of any international counted from the making of the work.
convention or other international Many Internet users have the general
agreement to which the Works of applied art : twenty-five tendency to assume certain beliefs that
Philippines is a party. (25) years from the date of making of are in a real sense a myth insofar as
the art. digital copyright is concerned. Among
6. With respect to performers, the these erroneous perceptions are:
protection shall apply to (a) Photographic works: fifty (50) years
performers who are nationals of from publication of the work and, if 1. If the work does not have copyright
the Philippines; (b) the unpublished, fifty (50) years from the notice, it is not copyrighted.
performance should have taken making.
place in the Philippines, in case of 2. If the user of the work does not
non-Filipino citizens; or Audio-visual works including charge for distributing, copying or
incorporated in sound recordings those produced by process selling the work, or if there is no

10
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1
harm to the author, there is no Users surfing for some materials from Of late, the legal issue of copyright
infringement. a website that he would like to use infringement was put into the limelight
should search for information about with the development of a file sharing
3. Any amount of copying for news, permissions to use, downloading, technology called peer-to-peer or
scholarship, education or redistribution or reproduction. P2P. Using P2P as connecting nodes,
commentary for as long as there people in the Internet network can
is attribution falls within the fair use Many Internet sites have a page easily pass or share in real time content
doctrine. devoted to terms of use or a privacy files, especially audio, video or data,
policy that explain how the user can for as long as they are in electronic
4. Trademark is the synonymous with handle the materials obtained from the format.
copyright. site. It is best to use the materials in
accordance with the policies posted in The technology also allows multimedia
5. A work of fan fiction, or writing a the website. In certain cases, streaming of video and audio. Thus,
story using settings or characters particularly when in doubt, it may be network sharing of music and movies,
from anothers work, is derivative best to contact the individual or particularly in MP3 and DivX formats,
work that is beyond the ambit of organization that holds the copyright has now become commonplace.
copyright protection of the original and obtain permission, electronically
author or creator. or otherwise. Long before the Internet became a
popular media, the US Supreme Court
6. To have a copy of the work does If the user is invoking the doctrine of in the leading 1984 case of Sony
not necessarily mean that you have fair use in using the copyrighted Corporation of America vs. Universal
the copyright, especially if there materials from the Internet, it is always City Studios Inc. , more popularly
is no commercial value. a sound policy to make an attribution known as the Betamax case, held that
or acknowledgement of the source and making individual copies of television
7. Internet service providers are owner of the information in the users shows for purposes of time-shifting is
liable for copyright infringements. own work. fair use and does not constitute
copyright infringement.
Due Diligence in Internet The user must have a keen sense to
Copyright distinguish between what is part of the The Betamax decision effectively
public domain and which is not. It provided a general test for determining
The fact that a work was posted in the should be remembered that even in whether a device with copying or
Internet and is free for anyone to cyberspace, what is the subject of recording capabilities ran afoul of
download a copy does not make the copyright is the expression of idea and copyright law. This test has created
work automatically as part of the public not the idea itself. And it is always some interpretative challenges to courts
domain. prudent to check whether works of art, in applying the case to more recent
literature, books, films, videos, or file sharing technologies available for
In the usual case, there is a need to photographs culled from the Internet use on home computers and over the
ask permission from the site owner to are already part of the public domain Internet.
publish any materials, including with the lapse of their copyright
photographs, music, and artwork from protection. Many times however this Napster, a company founded by an
the site. Infringement of digital task is tedious and getting permission 18 year old computer science student,
copyright may occur when information is still the easier route, something that provided a platform for users to upload
is used and distributed without can also be obtained on-line and in and download music files in
permission. real-time. compressed digital format. Major
recording companies led by A & M
Pirating software, downloading music, Noted Legal Controversies in e- Records, Inc. were threatened and
including an image or graphic in a Copyright immediately sued Napster for
document or presentation, or contributory and vicarious copyright
forwarding private electronic mails, are At present, there are no major law suits infringement. Napster argued on the
common copyright violations unless involving infringement of Internet principles of fair use. In 2001, the US
they fall within the purview of fair use. copyright in the Philippines. But like Court of Appeals (9th Circuit), in the
Unauthorized use of these files might most of the other countries, the world first major case to address the
result to prosecution and other legal is keenly watching the development of application of copyright in P2P file
obligations including civil penalties, legal controversies involving digital sharing, ruled that Napster could be
damages and indemnification. copyright especially in the United liable for contributory infringement
States.
>> [36] Digital Copyright

11
Feature

THE LEGALITY OF DOWNLOADING MUSIC FROM THE INTERNET


By Consuelo L. Cruz

O UTLINE

Introduction * The European Union * MGM Studios Inc. v. Grokster


Directives Ltd. [04-0480, 545 US 125,
Part I. Copyright Laws and S.Ct. 2764 (2005)]
Jurisprudence Jurisprudence
* Sony Corp. of America v. Part II. Key Legal Issues
Copyright Laws in the United States Universal City Studios, Inc.,
I. The United States Copyright 464 US 417, 449 (1984) * What Acts are Involved
Act of 1978 * A&M Records Inc. v. Napster * Who Are Liable
II. The Digital Performance Inc, [2001 US App LEXIS * Infringement of Copyright Laws
Rights in Sound Recording Act 1941, No. 990164001, slip * Should Users be Liable For Direct
of 1995 op. at 2206 (9th Cir., Feb. Infringement?
III. The Digital Millennium 12, 2001)] * Users Not Specifically Identified
Copyright Act of 1998 * MP3 Case [UMG Recordings, * Particular Infringing Acts Cannot
Inc. v. MP3 [92 F.Supp.2d Be Determined
Copyright Laws in the Philippines 349 (S.D.N.Y. 2000)] * Time-Shifting
* Diamond Rio Case * Suppression of Free Speech
Other Copyright Laws (Recording Industry * Current Developments
* The World Intellectual Association of America v. * The Philippine Setting
Property Organization Treaty Diamond Multimedia Systems
(WIPO Copyright Treaty) [180 F.3d 1072 (1999)] Conclusion

Consuelo L. Cruz was a student in the Introduction Part One


Entertainment Law Class of Dean Copyright Laws and

T
Mariano Magsalin Jr. in Arellano he Internet is not only Jurisprudence
University School of Law during the first a powerful source of information but
semester of School year 2006-2007. also a very convenient source of The United States has one of the most
The following paper was submitted as entertainment. An Internet network for relevant statutes covering digital audio-
part of the requirements in said course. anyone with a computer to access a video transmissions and has the most
wide variety of information, and has jurisprudence on copyright
This paper shall discuss legal issues made file sharing of copies of audios, infringement involving file-sharing of
related to music transmission videos, data or anything in digital music recordings. Other developed
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1

specifically copyright infringement and format available to Internet users. The countries such as the Netherlads,
the probable liabilities of Internet use of this file-sharing technology is France, Canada, and Japan are also
network providers and individual users currently at the core of legal enacting and enforcing copyright laws
based on jurisprudence in the United controversies involving copyright similar to that of the United States. The
States. Part One gives an overview of infringement since most of the files following are Copyright Laws covering
various copyright laws with a focus on shared by network providers using this music transmission in the Internet:
a copyright holders exclusive rights, technology, are copies of popular
its exceptions and the concept of fair copyrighted music and movies. Some Copyright Laws in the United
use. Part Two concentrates on the key of these networks -- such as Napster, States
legal issues and particularly tackles the Kazaa, Grokster and Streamcast --
acts involved in downloading of music have been the subject of lawsuits and I. The United States Copyright Act of
from the Internet to determine whether have been found liable for contributory 1978 (USCA)
or not individual Internet users should infringement. In most of these cases,
be held liable for copyright individual Internetusers have been cast It is relevant to understand some
infringement. as the direct infringer. fundamental concepts of the USCA to
which the exclusive rights of copyright

12
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1
owners apply. Section 106 of the USCA be considered fair use, such as Copyright Laws in the Philippines
provides exclusive rights in copyrighted criticisms, comments, news reporting,
works, such as: (1) to reproduce the teaching/instructions, and research. Philippine copyright laws pertinent to
copyrighted work in copies or digital music transmission is contained
phonorecords, (2) to prepare II. The Digital Performance Rights in under the section on Copyright Laws,
derivative works based on copyrighted Sound Recording Act of 1995 (DPRSA) in Part IV of the Intellectual Property
works, (3) to distribute copies to the Code of 1998 (IPC, Republic Act
public or transfer ownership, or by The DPRSA amends Section 106 of 8293). The law basically provides for
rental, lease or lending, (4) in case of the USC by adding public performance the same exclusive rights to copyright
musical works, to perform copyrighted in digital audio transmissions of sound holders similar to that in the US
works publicly, (5) to display the recording as an exclusive right of Copyright Act. However, the right to
copyrighted work publicly by means copyright owners. It covers cases perform the copyrighted sound
of a digital audio transmission. The last where a compulsory license is recordings by means of digital audio
exception is provided under the Digital imposed, such as: (1) the compulsory transmission, which was specifically
Performance Rights in Sound license affecting the mechanical provided in the US Law, is not provided
Recording Act of 1995 which shall be reproduction of musical works; and (2) for in the IPC. Relevant provisions
discussed below. the compulsory license concerning the pertitnent to digital music transmission,
digital transmission of music. though inadequate, may be found in
Section 101 of the USCA defines public Sections 172, 184, and 185 of the
performance as: (i) to perform or III. The Digital Millennium Copyright IPC. Section 172, paragraphs (e) and
display a work at a place open to the Act of 1998 (DMCA) (f), provide that dramatic or
public or at any place where a dramatico-musical compositions,
substantial number of persons outside The DMCA broadens the scope of choreographic works or entertainment
of a normal circle of family and its copyright protection to music on the in dumb shows and musical works, wth
social acquaintances is gathered; or Internet. It provides for potection to or without words, are copyrightable.
(ii) to transmit or otherwise online service providers particular safe Section 184 provides that acts, among
communicate a performace of a harbors for certain types of works others, which do not constitute
display of the work to a place specified relating to infringement if they follow infringement include: (1) the right of
by clause; or to the public, by means a particular procedure. Service performance once a work has been
of any device or process, whether the providers shall not be liable for made accessible to the public provided
members of the public capable of infringement under the following that it is done privately and free of
receiving the performance or display circumstances: (1) if they act merely charge or made strictly for a charitable
receive it in the same or in separate as a data conduit, such as when an or religious institution; (2) the right of
places and at the ssame time or MP3 file is e-mailed from one reproduction and communication to
different times. subscriber to another; (2) in instances the public as part of reports of current
of systems caching when a copy of an events, for teaching purposes, for
Section 107 of the USCA provides for MP3 is kept only for archival purposes; ephemeral recordings by broadcasting
an exception to the exclusive right of and (3) the service provider must not organizations by means of its own
copyright owners. This exception have the knowledge of an infringing facilities and for use in its own
applies to certain uses of copyrighted activity, or upon knowledge of such broadcast. Section 185 provides the
works that are considered fair use infringing activity, he must take action factors that are to be considered in
and do not require authorization of the to block access to the material, and he determining fair use which are
copyright owner. To qualify as fair use, must not receive any financial benefit essentially the same as those provided
the following criteria must be complied for such activity. One aspect of the in the US Copyright Act.
with: (a) the purpose and character of DMCA was the establishment of a new
the use, including whether such use is statutory license for the public Other Copyright Laws
of commercial nature and is for non- performance of sound recording.
profit educational purpose; (b) the Copyright Laws of some highly
nature of the copyrighted work; (c) the The DMCA also added Streaming developed countries commonly
amount and substance of the portion Audio or listening on a streaming provide the same exclusive rights to
used in relation to the copyrighted work mode and Webcasting, which is copyright owners.
as a whole; and (d) the effect of the essentially the re-transmission of AM/
use upon the potential market for or FM radio signals through the Internet, The Right of Reproduction. In
upon the value of the copyrighted work. as non-infringing activities. Canada, France, and the United
The law provides the purposes that may Kingdom, a reproduction on the server
from which users -- the public -- can
download music must be licensed. The

13
Canadian Copyright Act gives an international treaty on copyright law distribution of commercial product
adequate application of Reproduction adopted by member-states of the capable of substantial non-infringing
Rights by providing that a copyright World Intellectual Property uses could not give rise to contributory
owner is granted a right of Organization in 1996. It provides for liability for infringement unless the
reproduction in any material form, additional protections for copyright distributor had actual knowledge of
which includes reproduction in digital deemed necessary due to advances specific instances of infringement and
form, such as when a phonogram is in information technology. It ensures failed to act on that knowledge.
converted in a specific digital format protection for computer programs and
to be transmissible via Internet. A arrangement and selection of material The Courts decision established a
second reproduction takes place when in databases. It provides authors of general test for determining whether
the work is copied to a server. The user works with control over their rental and a device with copying or recording
who requests the musical work from a distribution and prohibits circumvention capabilities infringe copyright laws.
website makes a third copy. [1] of technological measures for This test has created some
protection of works. interpretative challenges to courts in
The Right of Public Performance. applying the case to more recent file
The Right of Public Performance is aptly The WIPO Copyright Treaty is sharing technologies available for use
described in the WIPO Copyright implemented in the United States by on home computers and over the
Treaty of 1996 as such right granted the Digital Millennium Copyright Act Internet.
to copyright owners to make available of 1998, and in Europe by the
to the public their works in a way that European Union Copyright Directives A&M Records, Inc. v. Napster, Inc [2001
the members of the public may access of 2001. US App. LEXIS 1941, No. 00-164001,
these works from a place and a time slip op. at 2206 (9th Cir, Feb. 12,
individually chosen by them. [2] The European Union Directives. 2001)]
However, applications of this right vary. There are two directives in the
In Canada, for example, posting a European Union: (1) the Directive on Napster was the first widely-used peer-
copyrighted work on a publicly Copyritght in the Information Society, to-peer online music sharing service
accessible server is a restricted act. In and (2) the e-Commerce Directive. which allowed music fans to easily
France, posting of a work on a website These directives, which serve as guides share MP3 format song files with each
must be licensed. Under US and UK to copyright laws of its member-states, other. The Ninth Circuit Court upheld
laws, a public performance occurs if essentially provide the exclusive rights the district court decision in holding that
the user listens in streaming mode. [3] of copyright owners such as the right the recording company, A&M Records,
of communication to the public and presented a prima facie case of
Tansmission Rights. An application limitations on transmission rights. The copyright infringement entitling them
of Conflict of Laws is relevant in e-Commerce Directive particularly to a preliminary injunction. It found
determining transmission rights. It must specifies that the service provider is Napster liable for contributory
be noted that transmission of music in subject to the copyright laws of the infringement, having knowledge of
the Internet involves transborder country wher the service provider is infringing activity but had allowed its
transactions. Each country would like established. [5] users to share music files despite
to control both servers located in its having the technical capability to
territory and users in its territory Jurisprudence control such activity. In July 2001,
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1

accessing material posted on foreign Napster shut down its entire network
servers. Copyright collectives similarly Sony Corp. of America v. Universal City in order to comply with the injunction.
want to be able to license transmissions Studios, Inc., 464 US 417, 449 (1984) On 24 September 2001, the case was
from servers in their territory and users partially settled. Napster agreed to pay
-- including end-users -- in their This case, also known as the Betamax music creators and copyright owners
territory. [4] case, was a decision by the US a US$26 million settlement for past,
Supreme Court which ruled that the unauthorized uses of music, as well as
In the course of transmission of music making of individual copies of an advance against future licensing
in the Internet, infringing events occur. complete television shows for purposes royalties of US$10 million. [6]
Reproduction of copies which may of time-shifting does not constitute
occur at various stages of transmission copyright infringement, but is fair use. MP3 Case [UMG Recordings, Inc. v.
or the work may be performed publicly. The Court also ruled that the MP3, 92 F.Supp.2d 349 (S.D.N.Y.
manufacturers of home video 2000)]
The World Intellectual Property recording devices, such as Betamax
Organization Copyright Treaty or other VCRs (referred to as VTRs in The MP3 wensote provided for remote
(WIPO Copyright Treaty). The the case), cannot be liable for storage of sound recordings. The
WIPO Copyright Treaty is an infringement. The Court held that the website was alleged to have copied

14
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1
tracks from various commercial mere distribution with knowledge of Who are liable. The
websites. [7] Plaintiffs asserted that MP3 third-party action, is liable for the abovementioned acts are performed
was liable for infringement of resulting acts of infringement by third by the following persons, respectively:
reproduction rights by reproducing the parties using the device, regardless of (1) the content providers; (2) the
CD on its own server. The case was the devices lawful uses. service providers or access providers;
settled for a purported sum of and (3) the end user, subscriber or
US$20M. [8] On 7 November 2005, Grokster account holder.
announced that it would no longer offer
Diamond Rio Case [Recording Industry its peer-to-peer file sharing service. Content providers determine whether
Association of America v. Diamond As part of a lawsuit permitted by the their website will contain musical works,
Multimedia Systems, 180 F.3d 1072 MGM Studios v. Grokster Supreme they select and post the works. They
(1999)] Court decision, Grokster was forced have knowledge whether the works
to pay US$50 million to the music and they decide to post is protected or
In this case, the court did not find recording industries. [10] unprotected. Clearly, a content
respondent liable by holding that provider must obtain authorization from
respondent did not fit in the description Part Two copyright owners for posting protected
of a digital audio recording device as Key Legal Issues works. Without the required
defined by the Digital Home Recording authorization, they may be liable for
Act. According to the statute, a digital What Acts are Involved. In direct infringement.
audio recording device is one that is determining the key legal issues
designed primarily for the purpose of relative to transmission of music in the Service providers provide the server
making a digital audio recording for Internet, it is important to identify what and the software to publish the musical
private use. Diamond Rio produced acts are legal and what acts are illegal. works. Access providers provide the
computer hard drives that were The process of transmission of music access to the Internet through online
capable of storing various programs in the Internet is legally allowed and connection and accounts. Generally,
that were unrelated to sound downloading of music on the Internet as decided by US Courts in most cases,
recordings. [9] is not outright illegal provided it is done a service or access provider is not
within the parameters of the law. Legal liable for direct infringement but may
MGM Studios, Inc. v. Grokster, Ltd. acts would include those that are be liable for contributory infringement
(04-0480), 545 U.S. 125 S. Ct. 2764 considered fair use and those which when they have knowledge that a
(2005) are authorized or licensed. Fair use musical work is protected and they are
includes use of copyrighted materials technically able to block the use of such
United States Supreme Court in this for purposes of news reporting, content.
case unanimously held that defendant scholarship and research works,
P2P file sharing companies Grokster teaching, comment and criticism The end user or account holder either
and Streamcast are liable for (Listening to music on a streaming listens to musical works in a streaming
contributory infringement for mode is considered fair use). Questions mode, or downloads the musical works
marketing a file sharing software of legality arise when music is commonly known as MP3 files into his
device. Unlike Napster, Grokster downloaded from the Internet. To computer. He is not liable provided that
provides a decentralized software download means to receive his acts fall within fair use. If the end-
device allowing direct peer-to-peer file information or a file from another user records or saves the musical work
sharing withut passing through a computer via a modem, as in his phonorecord or CD or in his
supernode. This made it impossible distinguished from upload which means computer or other device, he must
for the service provider to monitor the to send a file to another computer. obtain an authorization. Such
content of the files. The Ninth Circuit There are three distinct acts that authorization is given by the
Court, in applying the Sony Betamax involves music transmission, the first transmitting organization, the content
Decision, considered Groksters two of which precedes downloading: provider or the service provider who
decentralized architecture and (1) when music from a phonogram or are likewise authorized or licensed by
absolved it from liability. The US CD is converted into digital format to the copytright owner to allow recording
Supreme Court, however, in holding be transmitted via the Internet; (2) of his musical works. In case the
that the ruling in Sony v. Universal when the work is copied onto a server; content or service provider is not
Studios has been misapplied, held that and (3) when the user who requests authorized to transmit protected
one who distributes a device with the the musical work from a website saves copyright works and is thus held liable
object of promoting its use to infringe the copy into his computer hard disk, for infringement, should the end-user
copyright, as shown by clear expression a CD or any musical device. be likewise held liable? This shall be
or other affirmative steps taken to further discussed in this paper.
foster infringement, going beyond

15
Infringement of Copyright Laws. The Court also held that Napster was 1. That the purpose and character of
The key legal issue involve in potentially liable for vicarious the use was not for personal use
downloading of music from the Internet infringement. The Court used the term but commercial in nature. A user
is copyright infringement or the vicarious in its broad sense and not in sending a file is not engaged in
unauthorized use of copyrighted the limited context of employer- personal use when such file is
material in a manner that violates one employee relationship. Vicarious distributed to another user who is
of the original copyright owners liability in copyright infringement anonymous. Napster users get
exclusive rights such as the right to extends to a case where defendant something for free which they
reproduce or perform the copyrighted has the right and ability to supervise would ordinarily have to buy.
work, or to make derivative works. [11] the infringing activity and also has a
direct financial interest in such 2. That there was wholesale copying
Copyright infringement in relation to activity.[15] Napster was found to have of copyrighted works. There is fair
transmission or downloading of music gained financial benefit from use only if the protected work is
from the Internet was extensively revenues dependent upon increases used for sampling purposes, such
discussed in the case of Napster. As a in userbase, [16] and Napster had the as when only a portion of the work
service provider, Napster provided a ability to supervise its users activities. is copied; or for space-shifting
serachable database of all users of Napster allowed its users to access purposes such as when a user
MP3 music files for which computers MP3 files despite knowledge that downloads MP3 files in order to
are at the same time connected to the authorization is required and despite listen to music he already owns
Internet, allowing users to then seek having the technological means to on audio CD or a portable player
out and download files from other prevent such access if done without the for his own private use. Napster
users who are on the Internet at the necessary authorization. users were allowed to download
same time. In effect, Napster created a full and free copy of the
a temporary link to another computer While Napster was found liable by the recording, which in turn, was
and stayed connected during the Ninth Circuit Court, Grokster was shared and passed on to other
downloading process. [12] absolved from any liability by the same users.
court, although both have engaged in
In this case, the US Ninth Circuit Court the same activity as service or access 3. That the marketability of the
gave three distinct types of provider. In Grokster, the Court took copyrighted work is impaired. The
infringement: direct, contributory, and the cognizance of the technology used fact that users may acquire copies
vicarious. by both defendants. Napster used the of the works for free results to
Fastrack network protocol while losss of sales for recording
There is direct infringement if the act Grokster used the Gnutella protocol. companies, which likewise
does not fall within fair use and the Both protocols served the same end necessarily harms the copyright
copyright owners exclusive rights are that is to enable Internet users to holders right to royalty fees.
violated. The Court found Napster exchange music files. However, the
users directly infringed the copyright Fastrack technology allowed file Users not Specifically Identified.
holders rights of reproduction and sharing through a supernode which Although the court gave an objective
distribution. Napster users who upload would enable Napster to monitor the analysis of fair use in its decision,
file names to the search index for file sharing activities of its users; while Napster users were not adequately
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1

others to copy violate plaintiff s the Gnutella technology did not have represented in court. Napster did
distribution rights, while Napster users such a control device and allowed the interpose affirmative defenses by
who download files containing direct interchange of files by its users. alleging in its answer that its users were
copyrighted music violate plaintiffs But in both cases, the Court held that engaged in fair use of copyrighted
reproduction rights. [13] Napster and Grokster users as direct works by sampling and space-shifting.
infringers. These defenses, however, seemed
There is contributory infringement on weak compared to the analysis given
the part of Napster for encouraging Should Users be Liable for Direct by the court when it cited in detail the
and assisting its users to access and Infringement? In the Napster case, factors involved in fair use and how
download MP3 music files. the court held that Napster users are these were violated. However, since
Contributory infringement is present not fair users. Likewise, in the Grokster not one Napster user was specifically
when one who, with knowledge of the case, it was also held that users are named or identified, and considering
infringing activity, induces, causes, or liable for direct infringement. In that the main issue of the case is
materially contributes to the infringing Napster, the Ninth Circuit Courts whether or not the issuance of an
conduct of another. [14] decision was based on the following injunction is proper, being
grounds: underrepresented was immaterial.
The courts decision in holding Napster

16
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1
users liable for direct infringement noted that users who download may v. Universal Studio (supra) as fair use.
[18]
gave basis to the finding that Napster save music files and may also share
was liable for contributory infringement such files with other users. Thus,
because, as the court held, there can uploaders may also be A communication is deemed public if
be no contributory infringement if there downloaders, and therefore difficult it is intended for a number of persons,
is no direct infringement. to distinguish which class should or unless such persons form a clearly
should not be held liable for defined group and are interconnected
The courts decision in holding users infringement. personally by mutual relations or by a
as direct infringers seemed rather relationship to the organization of the
unfair. Why not hold Napster as the Time-Shifting/Space-Shifting. communication. [19]
direct infringer? The users or the Another factor that should be
persons who perform the act of considered is the concept of sharing Thus, for liability to attach, the following
downlooading music from the Internet music files. This must be analyzed in requisites must concur: (1) a user or
are given the opportunity and given conjunction with the copyright holders users, must be specifically named or
free access to perform such an act. right of public performance and the identified; (2) he must be adequately
When something is given for free, it is right of reproduction. Two acts are classified as an uploader or one who
presumed that the giver or the person considered here: (1) the act of listening has in his possession copyrighted music
who allows access such as the service in a streaming mode; and (2) the act files and has intentionally and willfully
provider has the right or the authority of copying or saving the music files in transmitted such files via the Internet
to give it or to provide such service. a computer hard disc or CD. and (3) there must be proof that such
Thus, it is the right and responsibility user or users have knowledge or have
of the service provider to know whether When one listens in a streaming mode, been fully informed that musical works
or not a certain work is copyrighted or there is a broadcasting or rending are copyrighted and proof that there
protected. The users who access a sounds that are immediately audible is intent to share music recordings for
service providers website and uses at the time the user accesses the music commercial purposes.
such website to upload or download files. However, when the user merely
music files has a right to presume that copies or saves the music file into his Suppression of Free Speech. In
the service provider has the authority computer hard disc or CD, without an Amicus Brief in support of the
to allow such access. Thus, it is the listening to the music, there is only a reversal of the ruling against Napster,
service provider who should be held transmission of the music recording. the American Civil Liberties Union of
as the direct infringers, especially Northern California, as Amici Curiae,
Napster whose website which was As mentioned in Part I of this paper, claimed that the preliminary injunction
purposely set up to provide its users and as described in Section 8 of the is overboard and constitutes a prior
access to MP3 music files. WIPO Treaty, public performance restraint on constitutionally protected
constitutes the making available to the speech, based on the following
Particular Infringing Acts Cannot public of their works in a way that the grounds:
be Determined. Can users be held members of the public may access
liable for infringement at all? In the these works from a place and at a time 1. The court did not require pliantiffs
Napster case, there are two types of individually chosen by them. In an to identify the copyrighted works
users: (1) those who upload or allow explanatory note about the Treaty, but instead shifted such burden
their music files to be listened to by WIPO stated that this covers on- upon Napster. Thus, Napster had
other users; and (2) those who demand, interactive communication no choice but to prohibit the
download or listen to music files shared throught the Internet. [17] Clearly, when exchange of files even though
by other users. The persons who a work is broadcast on the Internet and some files were not copyrighted.
upload are presumed to have in their a user listens in streaming mode, there This resulted in the needless
possession the hard copy known as the is public performance. However, it suppression of protected speech;
phonorecord or the compact disc (CD) may be argued that when the user
of the music recording or have saved merely copies or saves the music files 2. By requiring the express
in their computer files or CDs a music into a hard disc or CD, but does not permission of the copyright owner
recording. While persons who listen to the music, there is merely a before any file is exchanged, the
download search the websites music digital transmission of the sound injunction reverses the
data files, choose the title they wish to recording and there is no public consttitutionally mandated burden
listen to and copy the recording into performance. It may be argued, to prove a particular speech is
their hard disk or saves them in their further, that when a user copies or unprotected before it is
own CD. At first glance, it may seem saves music files, he may listen to it at suppressed, and thus imposes an
that the first type of user may be liable a later time. This is equivalent to time- unconstitutional prior restraint on
for infringement. However, it must be shifting, which was held in Sony Corp. protected speech; Napster users

17
may not know whether or not a The Philippine Setting holders and vague on violations in the
music file is copyrighted, which online medium. At present there are
would deter them to exchange In the area involving issues of copyright two pending bills in the House of
speech at all; infringement on digital music Representatives that seek to reform the
transmission, the Philippines is a IPC. These bills, authored by
3. The injunction threatens the neophyte as compared to the Representatives Imee Marcos and Jose
speech-enhancing decentralized developments in the United States and Clemente Salcedo, seek to give
nature of the Internet. The Internet Europe. There is only one statute, the performers, record producers, and
has achieved the most Intellectual Property Code of 1998 broadcasters the same right as authors
participatory marketplace of mass (Republic Act 8293) that enforces of artistic and literary works. [24]
speech that the world has yet seen. intellectual property and copyright laws
xxx Court actions that enjoin online in the country. Most jurisprudence and Authorities are now holding
speech may indirectly affect the litigations pending in Courts are those consultations with concerned parties as
speech-enhancing architecture of involving infringement of trademarks, a prerequisite to the drafting of a
the Internet. trade names, patents and copyright of National Intellectual Property Policy
consumer and technological products. Strategy which aims to outline bills
Current Developments Jurisprudence on copyright needed to strengthen government and
infringement in digital music other bodies that protect and promote
At present, the Recording Industry transmission is yet to be realized. public awareness of intellectual
Association of America (RIAA) is property. [25]
actively pursuing a string of lawsuits There is at present a strong drive to
against users or individuals who have enforce intellectual property laws with Conclusion
Internet access accounts, and who have the formation of the Pilipinas Anti-
engaged in peer-to-peer file sharing. Piracy Team, composed of the National At present, no individual user who has
Some of these lawsuits, however, were Bureau of Investigation (NBI), the downloaded music from the Internet
dismissed based generally on grounds Optical Media Board (OMB), the has been held liable for direct
of insufficiency of the complaint for Philippine National Police (PNP), and infringement. In the United States,
failure by RIAA to specifically identify the Business Software Alliance (BSA). although recording and movie industry
particular infringing acts sufficient to The anti-piracy campaign is directed groups, such as the Recording Industry
establish probable cause to hold at trademark infringement and Association of America (RIAA) and the
defendants liable for direct involves the confiscation of products Movie Producers Association of
infringement and lack of evidentiary bearing the labels of well-known America (MPAA), are aggressively
basis. Some pending cases have been international brands. issuing subpoenas and filing lawsuits
challenged questioning the amount of against individual users on the strength
damages alleging unconstitutionality on In the case of copyright involving of the rulings in Napster and Grokster
this ground. [20] However, RIAA musicians, songwriters, and publishers, and under the Digital Millenium
continues to issue subpoenas and file an organization known as the Filipino Copyrights Act (DMCA), no Internet
lawsuits against hundreds of Internet Songwriters, Composers, Authors and user has been formally accused.
users and thousands of service Publishers (FILSCAP) ensures that its
providers, and continues to achieve members benefit from their copyrights. It would be very difficult for the RIAA
substantial settlement so far. [21]
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1

FILSCAP sees to it that public and the MPAA, though, to pursue these
performance licenses and music lawsuits primarily because of its limited
The entertainment industry in the royalties are adequately paid by music capability to specifically identify these
United States is pushing Congress to users like broadcasting companies, users and provide details of how, when
approve a bill that could send commercial establishments and or where the alleged infringement took
thousands of Internet music and movie telecommunication companies. It place. Secondly, there are civic and
downloaders to jail, but the legislation expects a rise in the earning potentials business groups that are actively in
faces opposition from groups that say of composers and songwriters defense of Internet user. Civic groups
it would unfairly punish consumers. especially with music being used as cell invoke the constitutionally protected
The bill also would criminalize using a phone ringtones, in mobile karaokes, right of free speech and expression
video recorder to copy films while they and when digitalized compositions are while business groups especially those
are still in the theater, and allow the being downloaded as full songs via the in the information technology have
Justice Department to file civil lawsuits Internet. [23] their business interests to protect.
against song-swappers. [22]
With the developments in digital It seems, however, that all these legal
technology, the IPC is inadequate in actions have yielded favorable results
protecting the rights of copyright >> [37] Downloading Music

18
Computing

The Philippine Quarterly IT Law Journal :: Volume 3, Number 1


CORPORATE VIDEOCONFERENCING
By Christine A. Prado

I n this age of modern


technology, various communications in
the field of education, medicine and
health and even in business
undertakings may be made through
teleconferencing. As a consequence
of high speed internet connectivity,
personal video teleconference systems
based on a webcam, personal
Third, audio-conferencing-verbal
communication through the
telephone with the optional
capacity for telewriting or
telecopying.

Indeed, teleconferencing is a high-


quality substitute to face-to-face (FTF)
meetings. It has been found to be
difficulty in determining participant
speaking order; frequently one person
monopolizes the meeting, greater
participant preparation time needed,
informal, one-to-one, social interaction
not possible.

Board meetings
Teleconferencing: Law
by
and
computer system, software beneficial business undertakings and Latest Jurisprudence
compression, and broadband internet corporate governance. People who
connectivity has become more wouldnt normally attend a distant FTF As technology significantly brings
economical for the general public. It meeting can participate. Follow-up to expediency and convenience with local
provides students an opportunity to earlier meetings can be done with and international undertakings, we are
learn by participating in a two-way relative ease and little expense. confronted with its admissibility in local
communication program. It is an Socializing is minimal compared to an courts with regards to the validity and
effective tool for telemedicine and FTF meeting; therefore, meetings are legitimacy of cases such as in board
telenursing applications with respect to shorter and more oriented to the meetings wherein the law requires that
diagnosis, consultations, transmission primary purpose of the meeting. Some the directors or trustees and officers
of medical images and others. It routine meetings are more effective to be elected shall perform the duties
enables individuals from different since one can audio-conference from enjoined on them by law and the by-
locations to effectively conduct any location equipped with a laws of the corporation. Unless the
business transactions and meetings on telephone. Communication between articles of incorporation or the by-laws
short notice. the home office and field staff is provide for a greater majority, a
maximized. Severe climate and/or majority of the number of directors or
What is teleconferencing? unreliable transportation may trustees as fixed in the articles of
necessitate teleconferencing. incorporation shall constitute a quorum
It may be said that teleconferencing is Participants are generally better for the transaction of corporate
an interactive group communication prepared than for FTF meetings. It is business, and every decision of at least
through an electronic medium. It particularly satisfactory for simple a majority of the directors or trustees
brings people together although they problem-solving, information present at a meeting at which there is
are in different locations. There are exchange, and procedural tasks. a quorum shall be valid as a corporate
three types of teleconferencing, Group members participate more act, except for the election of officers
namely: equally in well-moderated which shall require the vote of a
teleconferences than an FTF meeting. majority of all the members of the
First, videoconferencing, also However, other private corporations board.
known as video teleconferencing, opt not to hold teleconferences
which is a set of interactive because of technical failures with As set in the case of Expertravel Tours
telecommunication technologies equipment (including connections that versus the Court of Appeals, Korean
which allows two or more locations are not made), unsatisfactory for Airlines, a foreign corporation doing
to interact via two-way video and complex interpersonal communication business in the Philippines, through Atty.
audio transmission simultaneously. (such as negotiation or bargaining), Aguinaldo, filed a complaint for the
impersonal and less easy to create an collection of sum of money against ETI.
Second, computer conferencing, atmosphere of group rapport, lack of The case involved whether the board
which is the printed- participant familiarity with the meeting held through
communication through keyboard equipment, the medium itself, and videoconferencing was valid with
materials. meeting skills, acoustical problems corporate directors located in another
within the teleconferencing rooms, country and a resident agent and

19
general manager located in the foreign teleconferencing or Absent these, it shall be presumed that
Philippines even without evidence to videoconferencing. the Director has chosen to physically
show its existence. Though the attend the board meeting.
Supreme Court did not invalidate the The Secretary of the meeting has the
board resolution passed through the responsibility to safeguard the integrity At the meeting, the Secretary shall
said board meeting, the Court was not of the meeting, to find good equipment make a roll call and every director shall
convinced that a meeting through and facilities, to record the proceedings state their full name, location and
videoconferencing indeed was held and prepare the minutes of the confirm that he can completely and
and that the resident agents and its meeting, to store the tape recordings clearly hear the other directors, the
general manager in the Philippines and other electronic mechanism used fact that he has received all materials
actually participated in the said thereof as part of the corporate needed for the meeting, and specify
meeting. The allegations failed to records. the type of device used. After which,
establish the identity of Atty. Aguinaldo the Secretary will certify the existence
as the corporations resident agent and It shall be the duty of the Secretary to of quorum. All participants are
was duly authorized to sign the send out notices of the meeting to all required to identify themselves before
verification and certification of non- directors as set in the corporate by- speaking or in objecting to a vote with
forum shopping in behalf of the laws. The notice shall contain the regard to their discussion. Otherwise,
corporation. Antother was that the inquiry with regard to the ability of a it is the duty of the Secretary to specify
corporation nor members of the board director to attend a particular meeting the speaker.
meeting did not have a copy of the physically or through teleconferencing
minutes of the said meeting negating or videoconferencing, the contact The Secretary shall require all directors
the possibility that there was indeed a numbers of the staff whom the director in the meeting to sign the minutes to
board meeting through may get in touch with, the agenda of release all doubts on matters taken up
videoconferencing that took place. the meeting, and all necessary during the meeting.
documents covering the meeting.
Guidelines Promulgated by the Conclusion
Securities and Exchange In case teleconferencing or
Commission for the Use of videoconferencing has been chosen, The legal recognition of the SEC and
Teleconferencing in Board the director concerned shall notify the the Supreme Court of Video-
Meetings Secretary at least five days prior to the teleconferencing as an effective tool
scheduled meeting. The latter, in turn, to pursue corporate functions is most
Thus, the Securities and Exchange shall notify the other directors welcome. Possibilities increase when
Commission issued Memorandum concerned, keep the records of the the law embraces technology, and
Circular No. 15 to set guidelines for details and confirm and note the same allow non-traditional avenues to
board meetings of domestic and as part of the corporate minutes. achieve goals, including economic ones.

Jurisprudence in CyberLaw

INTERNET CONFIDENTIALITY OF CASES


INVOLVING VIOLENCE AGAINST WOMEN AND CHILDREN
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1

By Jaime N. Soriano

This section will be a regular feature of the henceforth, the Court shall withhold judicial policy in reply to a letter of a
journal to highlight significant cases decided the real name of the victim-survivor and mother of a child abuse victim
in the Philippines and in foreign jurisdictions
relating to information technology. shall use fictitious initials instead to addressed to the Chief Justice
represent her. Likewise, the personal expressing anxiety over the posting of

I
circumstances of the victims-survivors full text decisions of the Supreme Court
n an En Banc or any other information tending to on its Internet Web Page. The mother
decision dated 19 September 2006 establish or compromise their argued that confidentiality and the
in the case entitled: People of the identities, as well those of their best interest of the child must prevail
Philippines vs. Melchor Cabalquinto, immediate family or household over public access to information and
G. R. No. 167693, the Supreme members, shall not be disclosed. pleaded that her daughters case, as
Court resolved to refrain from posting (italics supplied) well as those of a similar nature, be
in its Internet Web Page the full text of excluded from the Web Page.
decisions in cases involving child sexual The case was taken by the Supreme
abuse and declared that . . . Court as an opportunity to adopt the >> [36] CyberLaw Jurisprudence

20
Telecommunications

The Philippine Quarterly IT Law Journal :: Volume 3, Number 1


WHEN THE P IN PRE-PAID MEANS PUNKED
By Michael Vernon M. Guerrero

o n g r a t u l a t i o n s ! Smart Padala service; another was the aware of this illegal operation.

C
Pres.GMACHRTY
Sim#have WON! W=680,000
Thousand DisDay 10/04/05,DTI

with phone
+639216727858 on 4 November
FOUND.Ur

PRMT#.0010 > 4 more info? Call now!


Sec.LARRY C.AGUIRRE. texted sender

2005. Tempting as it may seem, a lot


of questions come into mind, and
they212 start with the spelling of
number
toll free no. 09282292317, which is
a mobile phone number which is never
toll free; and lastly, if Smart
Communications would actually be
giving away prizes of sorts, it would
have sent it through the usual three-
digit or four-digit numbers, where it
sends account notifications and text
spams/marketing offers. A call to a
brother-in-law, who is an officer in
thank you and god bless!1

The scam is similar to the scam


reported by the Philippine Star on 16
June 2005. DFA Undersecretary for
Migrant Workers Affairs Jose S.
Brillantes said therein that the text
messages name drop Bangko Sentral
ng Pilipinas (BSP) Governor Rafael
Buenaventura, and claim that the
Congratulations!, the grammar of Smart Communications, readily receiver has won two million Philippine
have WON!, the inconsistency of exposed the scam. pesos and has to remit 800 US dollars
DisDay 10/04/05 and the actual date to be able to receive the prize money.
4 November 2005, and the vagueness Going back to the November text The text message reads Congrats
and implausibility of DTI message involving the alleged GMA your cell roaming no. had won P2
PRMT#.0010. Then the questions Charity Foundation, the text has been million during the electronic raffle
continue to Is it not a wastage of circulating even prior to November drawn from the Central Bank of The
corporate assets if a charitable 2005. In August 2005, a certain Philippines. Call now Governor Rafael
foundation would give out money to a person from Antipolo, Rizal even Buenaventura at this number:
certain person without any called up the texters number, and later +639156907234, according to
qualification, except that the latter is a posted a comment at the governments Donnie Fetalino, Attach and
SIM (Subscriber s Identification dot-gov-dot-ph website. The comment Communications Officer of the
Module) holder? or Why would a reads: Philippine Embassy in Cairo. 2
non-mobile company give money to a Recently, the Department of Foreign
bloke just for having a SIM number? I would just want to inquire about Affairs (DFA) warned OFWs against a
and What political advantage can this the text message that my brother new text scam circulating in Canada.
text message give to Pres. GMA? or got. It says that I won in a raffle by The Philippine Consulate General in
this Sec. Larry C. Aguirre? It is either the GMA CHARITY Vancouver reported, resulting from the
a con artist one-peso investment, or a FOUNDATION. What is this all inquiry of two Filipinos as the veracity
political destabilizers one-peso about? Is this really true? Coz the of the text message, that the text
contribution. A pinch of cynicism exist amount they mentioned is quite message reads: This is an exclusive
to scrutinize the text message because big. We called up the number and for OCWs and OFWs. Your roaming
of an earlier message was received we were told that they got the number was very lucky to receive
by my wife allegedly from SMART number from my service provider $40,000 from CBP. This is a new
PADALA. The text message, received which is GLOBE. We called a project of GMA and Western Union.
22 March 2005, reads SMART certain ATTY. LARRY AGUIRRE and The Consulate General contacted
PADALA: U won a nokia 7610 from our were told to call another person Western Union to verify the authenticity
network. To claim your prize please call which is ATTY. MANUEL of the message and the bank informed
toll free no. 09282292317. DTI NCR NANDING and he gave the the mission that there was no such
permit #2838 series of 2005. God address where we can go to give promotion or project. 3 Simply, the
bless. Three aspects of the message documents about us. #169 would-be victim receives a text
proved problematic, i.e. Smart Padala salcedo village, makati city. i just message announcing he has won in a
involves Overseas Filipino Workers want to know if this is a valid raffle sponsored by BSP (or Pagcor or
(OFW) remittances from abroad to the promo coz they have a dti number the Philippine Charity Sweepstakes
Philippines through mobile accounts (dti no. 00110). if not i want to let Office) with prizes ranging from one
and my wife is not an OFW, but a senior the government and the others million pesos to two million pesos. If
law student as I am, to avail of the the victim responds and calls a

21
telephone number given by the (P20,000), as tax for prize money, to company ID cards, proof of billing, and
sender, an alleged Governor a certain bank account number.6 other documents are necessary to
Buenaventura will reply. The victim will establish capacity to pay pre-existing
be instructed to first pay a ten-percent The recipient could also cause the obligations. These documents form part
withholding tax before he can claim transfer of money by sending the PIN of the records of a post-paid account.
his prize.4 of pre-paid cards, as to credit loads, Although at least 200 million text or
to the senders mobile phone. In a SMS messages are sent every day in
Calling the mobile numbers involved case reported by the Inquirer, the Philippines, more than two for
after a certain period of time would every Filipino and earns the country
solicit network notification that The Victims are told to send the PIN its reputation as the worlds SMS capital
number you have dialed is either codes of newly-purchased Filipinos still do not have to give their
unattended or out of the coverage cellphone cards to join a raffle and identities when buying pre-paid phone
area. Please try your call later. Such get a chance to win 1.5 million cards.8 No document is required in
fact is quite predictable as that the pesos to 2.5 million pesos. A purchasing pre-paid SIM. It can be
mobile numbers used in the scam victim who complained to BSP bought off the shelf. There is no
would be using pre-paid SIMs. In the admitted that he bought 3,000 limitation from buying three SIMs from
November text message, for example, pesos worth of pre-paid cards the three major mobile carriers in the
the sender used a +63921 number; hoping it would increase his Philippines, i.e. in alphabetical order,
i.e. 63 is the Philippines country code, chances of winning. Needless to Globe, Smart, and Sun, even if the
921 involves Smart Buddy subscribers say, unsuspecting victims who person purchasing has only one set of
a pre-paid class of mobile phone divulged their PIN codes were not mobile phone. The main attraction of
subscribers. For a measly sum of less aware that the very same pre-paid pre-paid is that these are low-income
than four United States Dollars (US$4) cards were being used by the scam countries and subscribers want to
the cost of the prepaid SIM being artists to send text messages to control their spending, said Karen
one hundred ninety (P190) pesos only other would-be preys. 7 Ang, a Bangkok-based telecoms
and the anonymity that is maintained analyst for Citigroup. But being able
in purchasing the pre-paid SIM, to Further, the sender can extend his to buy a pre-paid card without giving
perpetuate fraud in this manner would, fraudulent scheme by claiming only up a lot of information about yourself
for some, be lucrative. eight out of the ten PINs actually sent, is also an attraction. 9
for example, were ever received by
The scam works in the same manner him, or that two or three of the PINs Text-based fraud can be reduced if
as how an advance fee fraud sent do not work and that the recipient regulation, not ban, of pre-paid SIM
works.5 It is the SMS-based equivalent should substitute those PINs for him to purchase is enforced. In other parts of
of the Nigerian money transfer fraud, actually facilitate the release of the the Asia-Pacific region, where similar
Nigerian scam or 419 scam, however prize. No amount of pre-paid credit incidents have occurred, governments
it may be called. Herein, the con artist loads or bank deposits would bring the have set up stringent requirements as
would send out text messages similar sender to facilitate the release of the to their registration. Last year, Taiwan,
to those above. If any recipient would prize, as there is no actual prize fed up with con-men using the cover
express his interest by texting back and/ existing. The con artist can dispose of of anonymity to separate gullible
or inquiring into the details of the his pre-paid SIM if it is apparent that people from their money with scams
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1

promotion, the sender would cause the no one else of potential victims would ranging from simple credit-card tricks
recipient to produce certain amounts be interested in falling for the scam, to bogus kidnappings, sought to identify
of money usually 10% of the total or if he/she sensed that law enforcers, pre-paid phone users. Thailand moved
amount for the sender to facilitate if ever, would be on his trail. to register users of pre-paid phones in
the release of the prize money or May, describing it as part of efforts to
goods. One way of sending the Although the scam may be reported stop terrorists using mobile phones to
amounts is through bank deposit or to the Anti-Money Laundering Council, set off bombs. Malaysia ordered phone
transfers. This method of payment, the Philippine National Police, the companies to register all holders of
however, is risky to the con artist National Bureau of investigation and pre-paid services after text-messaging
inasmuch as certain documents need the National Telecommunications gossip-mongers hit a raw nerve with
to be presented by the con artist-bank Commission for their appropriate false talk that the premiers ailing wife
account holder to the bank. Still, one investigation and action, the capture had died. Shanghai, Chinas richest city
victim was reported to have fallen to of the fraudster would prove to be with 20 million people, required
such scam. The victim, who comes difficult as there are no records to registration of pre-paid users last
from the province, said he was duped determine the person behind the pre- September to tackle text-message
into depositing twenty thousand pesos paid number used in the scam. Unlike fraud.10 Most recently, and effective
in post-paid accounts, personal or 1 November 2005, Singapore has

22
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1
required new and existing prepaid card the public is what it purports itself to of the Philippines. Retrieved 4
users to register their numbers. 11 be, or if State-sanctioned. The November 2005. <http://
Government should provide for the w w w. g o v. p h / f o r u m /
Fraud through mobile phone text has prevention of fraud, not just to thread.asp?rootID=68812&catID=5>
2 DFA warns Filipinos Abroad of Text
been reported in the Philippines since prosecute it when the fraudster make
Scam using Central Bank. 16 June
2003; and in light of the possibilities the mistake of making himself 2005. Philippine Headline News
of text messaging in sowing wild identifiable. Online. Retrieved 30 October 2005.
rumors, perpetrating crime and <http://www.newsflash.org/2004/
possibly, triggering bombs; it is a big Further, the Philippines boasts of its 02/be/be003139.htm>
question why the Philippine resolve to root out terrorism, but it has 3 DFA warns OFWs on text scam in
government has not pursued any action not, as apparent as it has been Canada. ABS-CBN News. Retrieved
towards the registration of pre-paid identified by its neighboring countries, 30 November 2005. <http://
numbers. Unlike prior measure to there is no regulation that would w w w. a b s - c b n n e w s . c o m /
storypage.aspx?StoryId=22858>
regulate text messaging in itself such reduce the mobility of malefactors /
4 Giron, Marietta Velasco. Beware of
as to regulation of content, and matters terrorists through the use of text scams and their variants. 9 July
of taxation that were subject to stiff communication tools, or prevent 2003. The Consumer, Inquirer News
opposition by consumers, a regulation malefactors from using Service. Retrieved 4 November 2005.
of pre-paid numbers not with the communication devices as triggers for <http://www.inq7.net/lif/2003/jul/
Government, but with the respective indiscriminate attacks against the 10/lif_32-1.htm>
mobile phone service providers has civilian population. Its gestures towards 5 See Dot.Con article, Philippine IT
not been made, even if there is anti-terrorism are confined in grand Law Journal, Vol. 2, No. 2.
compulsive proof of the need to strokes towards a defective national 6 Giron, Marietta Velasco. Beware of
text scams and their variants. Ibid.
regulate such. legislation, intentionally oblivious to
7 Ibid.
simple suppletory solutions such as that 8 Asia wants SMS genie back in its
The Philippines chronically lags behind of registering pre-paid numbers. bottle. 5 September 2005. Sydney
its neighbors, and the matters involving Morning Herald. Retrieved 30
consumer convenience and fraud Until the simple regulation would occur, October 2005. <http://
prevention are not exempted from said the P in pre-paid would more likely www.smh.com.au/news/World/
statement. The Department of Trade lean towards the possibility of being Asia-wants-SMS-genie-back-in-its-
Industry (DTI) permit numbers do not punked. bottle/2005/09/05/
serve as a deterrent against consumer 1125772446037.html>
9 Ibid.
fraud as no one is aware of the official Endnotes
10 Ibid.
list of permits actually issued by the 11 Singapore to register pre-paid SIM
DTI as to promotions. There is no 1 Gov.ph Home - Forum.
cards. Philippine Star. 23 October
repository, like in the Internet, to check www.gov.ph, the Official
2005, pp. 1, 4.
Government Portal of the Republic
whether a promotion being floated to

MOST VISITED PHILIPPINE DAILIES ANDTV NETWORKS IN THE INTERNET


By Jaime N. Soriano

I n November 2006,
CNN reported that the world wide web
reached a new and mammoth
milestone with 100 million web sites
during the month of October 2006
judging from the report of Netcraft,
an Internet monitoring company that
has tracked Web growth since 1995.

Netcraft in its report noted that in


easily topping the previous full-year
growth record of 17 million from
2005. The Internet has doubled in size
since May 2004, when the survey hit
50 million.

If you are wondering how the major


newspapers in the Philippine ranks in
cyberspace as of today with respect to
the number of visits of their on-line
1st - Philippine Daily Inquirer (2,907);
2nd - Sunstar (3,634); 3rd - Philippine
Star (8,786); 4th - Manila Bulletin
(14,841); 5th - Manila Times
(20,442); 6th - Business World
(31,571); 7th - Malaya (32,830); 8th
-Abante (49,879); 9th - Journal
Publications (50,744); 10th - Manila
Standard Today (55,316); 11th -
Abante Tonite (96,725); and, 12th -
November 2006 survey we received content by the netizens, below are their Visayan Daily Star (214,902)
responses from 101,435,253 sites, up rank site as reported, monitored by,
from 97.9 million sites last month. The and using the toolbar of Netcraft. And if you are also wondering which
100 million site milestone caps an among the newspapers in the world
extraordinary year in which the Internet This is how they fared with their global rank first in terms of net clicks, it is the
has already added 27.4 million sites, ranking in parenthesis: >> [37] Most Visited Dailies

23
Computing

YOUR IDENTITY IN A COLORED PRINTER PRINTOUT


By Michael Vernon M. Guerrero

Identity in documents characteristics that are unique for each printer has been delivered, and to

I t has been some time


since the bygone era of the typewriter.
If one can still remember, the source
of a typewritten document may be
identified by fingerprint impressions on
the paper to identify who handled the
paper, by the distinct flaws of the
typewriters typeface to identify the
usual user of such specific typewriter,
printer, and by designing printers to
purposely embed individualized
characteristics in documents. They
detect, through software, slight
variations in printed characters, which
they call "intrinsic signatures," revealing
subtle differences from one printer
model to another. 1

Printer codes
what dealer. The dealer then can lead
investigators to the local computer store
where the printer was sold. 5 The
EFF has cracked the codes of a
particular line of Xerox printers but has
observed similar marking in Hewlett
Packard (HP) printers, among others.
EFF looked at printer output under a
blue light, and found yellow dot
markings in Brother HL-4200CN
or both. These methods of printer; Canon CLC 1000, CLC 2400,
identification were useful in identifying Another manner of detecting which CLC 4000, Color imageRUNNER
the principals in the commission of printer a printout originated was C3100CN, Color imageRUNNER
fraud, among other crimes. On the reported on 26 October 2004, in the C3200, and Color imageRUNNER
other hand, these methods can also magazine PC World with an article C3220 printers; Dell 3000cn,
be used in identifying the origins or therein entitled Dutch track 3100cn, and 5100cn printers; Epson
authors of underground and counterfeits via printer serial AcuLaser C900, C1100, C1500, and
prohibited self-published literature, numbers. The article pointed out that C1900 printers; HP Color Laserjet
whether under a repressive every printout contains a hidden code 1500l, 2500, 2500n, 2550l, 2550n,
government regime or not. The that contains information about the 2600n, 2680, 2840, 3500, 3500n,
forensic means, as said, can be used computer printer that it was printed on. 3600dn, 3700, 3700dn, 3700n,
for both legitimate and illegitimate Even if modern printers are of different 4600, 4600dn, 4600hdn, 4600n,
ends, but the consolation remains that brands, their print engines are made 4650, 4650dn, 4650dtn, 5100cn,
the mechanical flaws in a certain by only a few companies, such as 5500, 5500atn, 5500dn, 5500hdn,
typewriter were not made deliberately Toshiba, Canon and Ricoh; and that it 5550, 5550dtn, 9500 printers;
by the typewriter manufacturer to allow is the engine that has its own identity Konica/Minolta Bizhub C350,
the identification of its owner- that can be traced. 2 Most consumers CF1501, Colorforce 8050, Desklaser
possessor-user. are unaware of this feature until 2200, DialtaColor CF 2001, Ikon
recently, but most government agencies CPP500E, Magicolor 2210, Magicolor
Presently, with the proliferation of low- are aware of this for some time. Seth 2300 DL, Magicolor 2430 DL,
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1

cost colored printers, and the declining Schoen, a technologist who led the Magicolor 3300, Magicolor 7300
cost of owning a colored laser printer, Electronic Frontier Foundation's (EFF) printers; Kyocera FS-C5016N printer;
it is not uncommon that some research, said he had seen the coding Lanier LD238C, and LP125cx/
counterfeiters try to forge legal tender on documents produced by printers LP126cn printers; Lexmark C510,
through the use of colored printing that were at least a decade old. 3 C720, and C912 printers; Ricoh Aficio
technology, and to utter the printouts CL 3000, Aficio CL 6010, Aficio CL
as money thereafter. Colored laser The built-in security is composed of 7000, and AP 206 printers; Savin
printers, combined with a reliable dots. The dots are yellow, less than C3210 and CLP35 printers; Tektronix
scanner, can also replicate other legal one millimeter in diameter, and are eStudio 3511 printer; Xerox
or commercial documents, and thus typically repeated over each page of DocuColor 12, DocuColor 40,
allow the forger to pass the printouts a document. In order to see the DocuColor 2045, DocuColor 6060,
as the genuine documents. pattern, one needs a blue light, a WorkCentre M24. WorkCenter Pro
Researchers at Purdue University in magnifying glass, or a microscope,4 40, and WorkCenter Pro C2636
West Lafayette, Indiana, United States Schoen revealed. The pattern indicates printers. On the other hand, the press
of America, for one, have developed a unique number that is printed on report that Epson AcuLaser C1100
a technique to trace a document, i.e. every color page. The number printer and all models of Xerox
by analyzing a document to identify determines to what country a specific WorkCentre Pro print tracking codes.

24
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1
Lastly, the manufacturer admitted that In the Philippines, on the other hand, serve as a prior restraint against any
the following printers print tracking in the landmark case of Morfe v. Mutuc other person from airing criticisms or
codes: Tektronix eStudio 210c, eStudio [130 Phil. 415 (1968), 22 SCRA other utterances against entities that
310c, eStudio 311c, eStudio 211c, 424], the Philippine Supreme Court, may have the propensity to resort to
eStudio 2100c, eStudio 3100c, speaking through then Mr. Justice extra-legal remedies to suppress such
FC15i, FC15, FC22i, FC22, FC25Pi, Fernando, stated that expression. Truly, although it may be
FC25P, FC70, printers; and Xerox clear that the means was in
DocuColor 2000, and DocuColor The right to privacy is furtherance of an important
6060 printers. 6 constitutionally protected. The government interest in the United
right to privacy as such is accorded States and parallel to the government
The United States Secret Service recognition independently of its interest of other countries relating to
acknowledged that the markings but identification with liberty; in itself, counterfeit notes, i.e. including the
played down its use for invading it is fully deserving of constitutional Philippines and that said interest is
privacy. Agency spokesman Eric protection. The language of Prof. primarily unrelated to the suppression
Zahren announced that the markings Emerson is particularly apt: The of freedom of expression, there may
merely serve as a countermeasure concept of limited government has be controversy whether the incidental
to prevent illegal activity specific to always included the idea that restriction on the freedom of
counterfeiting, and " to protect our governmental powers stop short expression is no greater than is
currency and to protect people's hard- of certain intrusions into the essential to the furtherance of that
earned money." 7 On the other hand, personal life of the citizen. This is interest. It may be contended that the
EFF Senior Staff Attorney Lee Tien indeed one of the basic distinctions government interest, sought to be
noted that "Underground democracy between absolute and limited promoted, can be achieved by means
movements that produce political or government. Ultimate and other than the suppression of freedom
religious pamphlets and flyers, like the pervasive control of the individual, of expression. 11 By the way things are,
Russian samizdat of the 1980s, will in all aspects of his life, is the one should be printing his legitimate
always need the anonymity of simple hallmark of the absolute state. In criticisms against known political
paper documents, but this technology contrast, a system of limited personalities in some other printer that
makes it easier for governments to find government safeguards a private does not print the encrypted yellow dots.
dissenters, Even worse, it shows how sector, which belongs to the
the government and private industry individual, firmly distinguishing it On the other hand, leaving consumers
make backroom deals to weaken our from the public sector, which the in the dark as to marks that identify
privacy by compromising everyday state can control. Protection of this device purchasers is an insidious
equipment like printers." 8 private sector protection, in means to achieve a certain purpose
other words, of the dignity and without regard to its pregnant potential
Right of privacy integrity of the individual has for abuse. Its continued practice,
become increasingly important as further, is contradictory to the current
Privacy is the ability of an individual or modern society has developed. All trend where sellers provide privacy
group to stop information about the forces of technological age terms in their products, to make the
themselves from becoming known to industrialization, urbanization, and consumer aware of the pertinent
people other than those they choose organization operate to narrow personal information the latter is willing
to give the information to. The right the area of privacy and facilitate to divulge. Such insidious practice
against unsanctioned intrusion of intrusion into it. In modern terms, divests an ordinary person from
privacy by the government, the capacity to maintain and consciously assuming risks such as
corporations or individuals is part of support this enclave of private life those made with the use of computers
many countries' laws, and in some marks the difference between a and mobile phones and from limiting
cases, constitutions (such as France's democratic and a totalitarian liabilities for ambiguous acts such as
Declaration of the Rights of Man and society." 10 currency printouts for a school report.
of the Citizen). 9 Further, the Universal
Declaration of Human Rights, in article Consumer concerns Lastly, the words of EFF Senior Staff
12, states that No one shall be Attorney Lee Tien ring true when he
subjected to arbitrary interference with Identification of the printer origin of a said that "it shows that the government
his privacy, family, home or colored printout ultimate points to the and private industry make backroom
correspondence, nor to attacks upon identification of the owner of the deals to weaken our privacy by
his honour and reputation. Everyone printer. The means to identify a felon compromising everyday equipment
has the right to the protection of the through certain encrypted codes in a like printers. The logical next question
law against such interference or printed output may be said to be is: what other deals have been or are
attacks. legitimate, but the same means may being made to ensure that our

25
technology rats on us?" 12 Just imagine the possibility and effects of Illustration of the encrypted dots
encrypted marks on digital photography and videography, if
government would pursue such measure for a supposedly legitimate The Electronic Frontier Foundation (EFF)
government interest. presented, in line of its Machine Identification
Code Technology project, explained the
Conclusion manner of reading the forensic tracking codes
in a Xerox DocuColor color laser printout, in
The Consumer Act of the Philippines, promulgated on 13 April 1992, the following images. The information is the
does not contain consumer protection as to privacy issues, although result of research by Robert Lee, Seth Schoen,
the powers of the National Consumer Affairs Commission include Patrick Murphy, Joel Alwen, and Andrew
that which recommends new policies and legislation or amendments "bunnie" Huang. The forensic dots are not
to existing ones, 13 i.e. pertaining to consumer protection. The usually visible to the naked eye under white
Philippines has not pursued a path somehow oriented towards the light because of their limited contrast with the
protection of privacy and transborder flows of personal data such background. They can be made visible by
as those embodied in the guidelines promulgated by the Organization magnification (using a magnifying glass or
for Economic Cooperation and Development (OECD), circa 1980 microscope), and/or by illuminating the page
or a path parallel to the initiatives of the United States, ironically as with blue instead of white light. Pure blue light
to this article, through its Federal Trade Commission and Department causes the yellow dots to appear black, such
of Commerce, as to fair information practices. The Philippine as in the image immediately below, which is
government should now be addressing, as it should have had before, an image of one repetition of the dot grid from
advanced consumer issues besides those directly related to usual the same Xerox DocuColor 12 page,
items in store shelves. It cannot actively indulge itself in techno-rhetoric magnified 10x and photographed by the QX5
while being complacently backward in its policies as to matters of microscope under illumination from a Photon
technology. blue LED flashlight. The illumination is from
the lower right; to the upper and lower left of
Endnotes the image.

1 De Vries, Wilbert. Dutch track counterfeits via printer serial numbers


WebWereld Netherlands. 26 October 2004, PC World | HTML
Developer's Guide | Dutch track counterfeits via printer serial
numbers PC World, 2005 IDG Communications. Retrieved 20
October 2005. <http://www.pcworld.idg.com.au/index.php/
id;1002274598>
2 Ibid.
3 Musgrove, Mike. "Sleuths Crack Tracking Code Discovered in Color
Printers," 19 October 2005. Washington Post Company. Retrieved
21 October 2005. <http://www.washingtonpost.com/wp-dyn/
content/article/2005/10/18/AR2005101801663.htm>
4 Secret Code in Color Printers Lets Government Track You: Tiny Dots
Show Where and When You Made Your Print 17 October 2005,
EFF Breaking News: Electronic Frontier Foundation. Retrieved 21
Overlaying the black dots in the microscope
October 2005. <http://www.eff.org/news/archives/ image with larger yellow dots for greater
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1

2005_10.php#004063> visibility (as a schematic representation of the


5 De Vries, Wilbert. Dutch track counterfeits via printer serial numbers. relative position of the dots, through the use
Ibid. computer graphics software, the sample
6 List of Printers Which Do or Don't Print Tracking Dots. Electronic printout's marks look like the following:
Frontier Foundation. Retrieved 21 October 2005.<http://
www.eff.org/Privacy/printers/list.php>
7 Musgrove, Mike. "Sleuths Crack Tracking Code Discovered in Color
Printers," Ibid.
8 Secret Code in Color Printers Lets Government Track You. Ibid.
9 Privacy. Wikipedia, the free encyclopedia. Retrieved 25 October 2005.
<http://en.wikipedia.org/wiki/Privacy>
10 See also Griswold v. Connecticut, 381 U.S. 479 (1965) as to U.S.
Supreme Court declaration regarding the right to privacy.
11 See Social Weather Station vs. Comelec. GR 147571, 5 May 2001,
citing U.S. vs. OBrien, 391 US 365, as to the OBrien test.
12 Secret Code in Color Printers Lets Government Track You. Ibid.
13 Article 153 (b), Republic Act 7394, The Consumer Act of the
Philippines

26
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1
Contributions are Welcome
Explanatory text were added to show the significance of the dots.

T he Philippine IT Law
Journal welcomes the submission of
contributions with a view to publication,
which should be sent to:

The Board of Editors


The Philippine Quarterly
IT Law Journal
Arellano University School of Law
Taft Avenue, corner Menlo Street
Pasay City 1300 Philippines
Tels. (2) 404-3089 to 91
Fax. (2) 521-4691
eMail: itlawjournal@arellanolaw.net
The topmost row and leftmost column are a parity row and column for
error correction. They help verify that the forensic information has been as should all correspondence, books for
read accurately (and, if a single dot has been read incorrectly, to identify review, orders and other
the location of the error). The rows and columns all have odd parity, i.e. communications.
every column contains an odd number of dots, and every row (except
The Board of Editors will only consider
the topmost row) contains an odd number of dots. Each column is read
material which complies with the
top-to-bottom as a single byte of seven bits (omitting the first parity bit); following:
the bytes are then read right-to-left. The columns (numbered herein
from left to right) have the following meanings: 1. The submission is an original,
unpublished work which is not
15: unknown (often zero; constant for each individual printer; may convey being submitted for publication
some non-user-visible fact about the printer's model or configuration) elsewhere.
14, 13, 12, 11: printer serial number in binary-coded-decimal, two 2. The manuscript must be typed,
digits per byte (constant for each individual printer; see below) double-spaced, on one side only of
10: separator (typically all ones; does not appear to code information) a uniform sized paper, and be
accompanied by the text on floppy
9: unused
disk in a recognized software.
8: year that page was printed (without century; 2005 is coded as 5)
3. Footnotes must be numbered
7: month that page was printed consecutively throughout the article.
6: day that page was printed 4. Authors may use graphs, tables,
5: hour that page was printed (may be UTC time zone, or may be set figures, or mathematics only when
inaccurately within printer) its application is necessary for
4, 3: unused achieving the stated objective of the
2: minute that page was printed paper. When mathematics is used,
1: row parity bit (set to guarantee an odd number of dots present per the necessity for doing so should
row) be explained, and the major steps
in the argument and the conclusions
made intelligible to a non-
The printer serial number is a decimal number of six or eight digits;
mathematical reader.
these digits are coded two at a time in columns 14, 13, 12, and 11 (or
possibly just 13, 12, and 11); for instance, the serial number 00654321 Authors are asked to refer to a recent
would be coded with column values 00, 65, 43, and 21. issue of the Philippine IT Law Journal for
style. More detailed guidance will be sent
For a better view of the images and to find out more about how to detect the on request. Authors are encouraged to
dots, see http://www.eff.org/Privacy/printers/docucolor/. As EFF is still working carefully edit their own works.
on cracking the codes from other printers, it needs the public's help. To find
out more on how to make test pages to be included in EFFs research, see
http://www.eff.org/Privacy/printers/wp.php#testsheets.

27
Computing

DOT.CON
By Michael Vernon M. Guerrero

I nternet fraud may


use e-mail, chat rooms, websites and
message boards to present solicitations
to possible victims, to conduct
fraudulent transactions, or to transmit
the proceeds of fraud to financial
institutions. 1

Credit Card Fraud


3.
correct and working. Check with
the Better Business Bureau from
the sellers area. Be cautious when
dealing with individuals/
companies from outside your own
country.
Send the potential seller e-mail to
see if they have an active e-mail
address and be wary of sellers
of the Nigerian Criminal Code that it
violates), is a fraudulent scheme to
extract money from victims after
making them believe they will get an
immense fortune. Victims are
requested to pay an upfront fee before
their purported fortune is released.5

Origin. Originally known as the


who use free e-mail services Spanish Prisoner Letter, the scam is
Credit Card Fraud is the most common where a credit card was not a confidence game dating back to
of Internet fraud. Information used to required to open the account. 1588. In its original form, the con artist
pursue the same may be acquired Consider not purchasing from tells his victim (the mark) that he is in
from retailers, whether online or sellers who would not provide you correspondence with a wealthy person
offline; from companies databases with this type of information. of high estate who has been
which have been compromised; from 4. Do not give out your credit card imprisoned in Spain under a false
schemes like phishing; etc. Using number(s) online unless the site is identity. The alleged prisoner cannot
credit cards online is inherently a secure and reputable site. Do reveal his identity without serious
insecure, as information acquired in not trust a site just because it claims repercussions, and thus supposedly rely
secure transactions are decrypted to be secure. Sometimes a tiny on the con artist to raise money to
into plain text for processing. 2 Still, icon of a padlock appears to secure his release. The con artist offers
some would argue that the safest way symbolize a higher level of to let the mark supply some of the
to purchase items via the Internet is by security to transmit data. This icon money, with a promise that he will be
credit card because one can often is not a guarantee of a secure site, rewarded generously when the
dispute the charges if something is but might provide you some prisoner returns both financially and
wrong.3 assurance. Still, before using the by being married to the prisoners
site, check out the security/ beautiful daughter. However, once the
Prevention. encryption software it uses. Make mark has turned over his money, he
1. Make sure you are purchasing sure the transaction is secure when learns that further difficulties have
merchandise from a reputable you electronically send your credit arisen, requiring more money, until
source. Do not judge a person/ card numbers. the mark is cleaned out and the game
ends.6
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1

company by their web sites. Just 5. Be cautious when responding to


because an individual or company special offers (especially through
has a professional-looking web site unsolicited e-mail). The association with Nigeria was due
does not mean it is legitimate. Web 6. You should also keep a list of all to the massive proliferation of such
sites can be created in just a few your credit cards and account confidence tricks from that since the
days; and after a short period of information along with the card mid-eighties. In the latter form, the
taking money, a site can vanish issuers contact information. If schemers contacted mainly heads of
without a trace. Do your anything looks suspicious or you companies and church officials through
homework on the individual or lose your credit card(s) you should ordinary postal mail. The use of e-mail
company to ensure that they are contact the card issuer spam, instant messaging, and even text
legitimate. Check out other web immediately. 4 messaging for the initial contacts has
sites regarding the person/ led to other persons also being
company you plan to transact. Advance Fee Fraud targeted, as the cost to the scammers
2. Try to obtain a physical address to make initial contact is much lower.7
rather than merely a post office Advance fee fraud (the Nigerian The Nigerian Money Transfer Fraud
box and a phone number, call the money transfer fraud, Nigerian scam operates in the following manner: The
seller to see if the number is or 419 scam after the relevant section potential victim receives a letter or fax

28
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1
10
from an alleged official representing counterfeit check. ready for payment.
a foreign government or agency. An
offer is made to transfer millions of Another variant pretends to be a However, by virtue of our position
dollars in over invoiced contract winning notification from a lottery as civil servants and members of
funds into the potential victims personal company, requesting payment in this panel, we cannot acquire this
bank account. The potential victim is advance to collect the sum that the money in our names. I have
encouraged to travel overseas to potential victim has won.11 This therefore, been delegated as a
complete the transaction; is requested variant is prevalent in the Philippines matter of trust by my colleagues
to provide blank company letterhead or against Filipinos12 through SMS text of the panel to look for an
forms, banking account information, messaging. overseas partner into whose
telephone/fax numbers. The potential account we would transfer the sum
victim receives numerous documents Other forms of 4-1-9 schemes of us$21,320,000.00(twenty one
with official looking stamps, seals and include: c.o.d. of goods or services, million, three hundred and twenty
logo testifying to the authenticity of the real estate ventures, purchases of thousand U.S dollars). Hence we
proposal (electronic documents over crude oil at reduced prices, beneficiary are writing you this letter. We have
Internet). Eventually potential victim of a will, recipient of an award and agreed to share the money thus;
must provide up-front or advance fees paper currency conversion.13 1. 20% for the account owner 2.
for various taxes, attorney fees, 70% for us (the officials) 3. 10% to
transaction fees or bribes. 8 The Example. be used in settling taxation and
original medium for this scam was all local and foreign expenses. It
through mailers, it was in the late Request for urgent business is from the 70% that we wish to
1990s that the Internet was extensively relationship commence the importation
used for the purpose. business.
First, I must solicit your strictest
Variance. One variant involves an confidence in this transaction. This Please note that this transaction
alleged lawyer-con artist, representing is by virtue of its nature as being is 100% safe and we hope to
the estate of some long-lost relative of utterly confidential and Top commence the transfer latest
the potential victim that the latter never Secret. I am sure and have seven (7) banking days from the
knew he or she had (as the potential confidence of your ability and date of the receipt of the following
victims surname will be inserted into reliability to prosecute a information by Tel/Fax; 234-1-
the e-mail message). The con artist transaction of this great magnitude 7740449, your companys signed,
claims to have gone through a lot of involving a pending transaction and stamped letterhead paper the
trouble to find the victim in order to requiring maximum confidence. above information will enable us
give him or her a share of the millions write letters of claim and job
of dollars available if the potential We are top official of the federal description respectively. This way
victim will forward his or her bank government contract review panel we will use your companys name
account information to the con artist. who are interested in importation to apply for payment and re-award
9
of goods into our country with the contract in your companys
funds which are presently trapped name.
Another variant involves the offers of in Nigeria. In order to commence
con artists to buy some expensive item this business we solicit your We are looking forward to doing
which the potential victim has assistance to enable us to transfer this business with you and solicit
advertised, by official, certified, bank into your account the said trapped your confidentiality in this
or cashiers check. The check will have funds. transaction. Please acknowledge
an accidentally or mutually agreed the receipt of this letter using the
higher value than the price of the item, The source of this fund is as follows; above Tel/fax numbers. I will send
so the con artist can ask the victim to during the last military regime here you detailed information of this
wire the extra money to some third in Nigeria, the government pending project when I have
party as soon as the check clears. The officials set up companies and heard from you.
check typically clears after one or two awarded themselves contracts
days, but the fact that it is counterfeit is which were grossly over-invoiced Yours faithfully,
not detected until several days or weeks in various ministries. The present
later, by which time the victim has sent civilian government set up a Dr. Clement Okon
the item and the additional money contract review panel and we have
to the con artist and his representative. identified a lot of inflated contract Note; please quote this reference
Most banks will hold the victim funds which are presently floating number (ve/s/09/99) in all your
accountable for the value of the in the central bank of Nigeria responses.14

29
Prevention. fraudsters place the text of a legitimate losing money because of phishing
1. Be skeptical of individuals site link in the email but actually links attacks. Victims said their banks and
representing themselves as to their own fake site. The fraudsters credit card companies took the biggest
Nigerian or foreign government fake website replicates the legitimate hits. Victims recovered 87 percent of
officials asking for your help in web site as to its code and graphics, their funds. Major U.S. Internet service
placing large sums of money in completely fooling a victim in providers reported 150 to 200
overseas bank accounts. Be navigating through a scam site. The uniquely identifiable phishing attacks
skeptical also of entities offering scams rely more on persuasive against their brands. Pay Pal and eBay
prizes that require you to shell out psychological trickery than on are the top spoofed sites. Citibank is
money or any equivalent to allow technology. 20 The classic phishing the primary bank target for phishing
the processing of your winnings, scams seem to recur with little scams. 25 As of September 2005,
among others. variation, such as Your account is according to the Anti-Phishing Working
2. Do not believe the promise of about to expire, the sender of the e- Group (APWG), the number of unique
large sums of money for your mail warns. Click on the link and phishing reports received in September
cooperation. resubmit your credit card information was 13562, the number of unique
3. Guard your account information to avoid any loss of service. 21 The phishing sites received in September
carefully. 15 message may also provide the was 5259, the number of brands
following messages: We suspect an hijacked by phishing campaigns in
Phishing unauthorized transaction on your September was 106, the number of
account. To ensure that your account brands comprising the top 80% of
One of the popular fraudulent practices is not compromised, please click the phishing campaigns in September was
being done online today is phishing. link below and confirm your identity; 6, the country hosting the most
Phishing (also carding and or During our regular verification of phishing websites in September was
spoofing) is a form of social accounts, we couldnt verify your the United States, Phishing which
engineering, characterized by attempts information. Please click here to contains some form of target name in
to fraudulently acquire sensitive update and verify your information. URL amounted to 50 % of total attacks,
22
information, such as passwords and Phishing may also be a means for phishing which provides no hostname
credit card details, by masquerading a fraudster to commit identity theft. but only IP address amounted to 34 %
as a trustworthy person or business in of total attacks, percentage of sites not
an apparently official electronic Origin. The term phishing arose using port 80 amount to 8 % of total
communication, such as an email or from the use of increasingly attacks. The United States remains on
an instant message. 16 Phishing sophisticated lures to fish for users the top of the list of phishing hosts with
attacks use both social engineering and financial information and passwords. 31.22%, with the top 10 breakdown
23
technical subterfuge to steal It was coined by crackers attempting as follows; China: 12.13%, Republic
consumers personal identity data and to steal AOL accounts during the mid of Korea: 10.91%, Germany: 3.16%,
financial account credentials. 17 1990s. A cracker would mimic an AOL Canada: 2.97%, Japan: 2.44%,
Phishing is the art of getting personal staff member then would send a France: 2.31%, Poland: 2.24%,
information, usually in the form of message entitled, for example, verify Brazil: 1.98%, Romania: 1.98% . In
usernames and passwords, from your account or confirm billing September 2005, the APWG
individuals. It is also a form of Social information, to acquire the AOLs witnessed several new phishing attacks
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1

Engineering which is defined as the user s password, among other which utilized peoples willingness to
art and science of getting people to information, so as to allow the former assist during times of desperation; the
comply to your wishes. 18 to use the AOL account for the attacks being against The Red Cross,
formers benefit or other criminal acts. The Salvation Army, Hurricane Katrina
24
Fraudsters behind the fishing use spam Donations, and Hurricane Rita
messages masquerading as banks or Donations. 26
online payment facilities. They also Prevalence. Washington Post
generate pop-up messages through reported that [s]ince May 2003, Variance. Spear phishing, targets
a website or through certain software nearly 11 million recipients of phishing members of a particular organization
that was installed related to the service e-mail clicked on the links. Of those, and the sender would claim to be its
that claims to be from the a business 1.8 million recalled filling out the e-mail provider. The sender will prompt
organization that one usually deals information requested. Phishing attacks you to download special software,
with. The message may ask one to grew 28 percent from May 2004 to which could install spyware or adware.
update, validate, or confirm your May 2005. About 73 million adult e- Spyware and adware would record
account information. Some phishing mail users reported more than 50 personal information later. 27
emails threaten a dire consequence if phishing e-mails during the 12-month
one does not respond. 19 Some period. 2.42 million adults reported

30
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1
Examples. The following are This email was sent by the Citibank https://www.citibank.com/signin/
examples of phishing e-mails. server to verify your E-mail citifi/scripts/login2/update_pin.jsp
address. You must complete this
Date: Thu, 02 Dec 2004 07:35:28 process by clicking on the link Please note that this update
-0300 below and entering in the small applies to your Citibank ATM/
From: Suntrust Billing Department window your Citibank ATM/Debit Debit card - which is linked directly
<billing@suntrust.com> Card number and PIN that you use to your checking account, not
To: Abnelson on ATM. Citibank credit cards.
Subject: Failure to confirm your
records may result in your account This is done for your protection - Thank you for your prompt
suspension. because some of our members no attention to this matter and thank
longer have access to their email you for using Citibank!
Dear valued SunTrust member, addresses and we must verify it.
Regards,
Due to concerns, for the safety and To verify your E-mail address and
integrity of the online banking access your bank account, click on Riley Buckner
community we have issued the the link below: Head of Citi Identity Theft
following warning message. Solutions
https://web.da-us.citibank.com/
It has come to our attention that signin/citifi/scripts/email_verify.jsp Copyright 2004 Citicorp. All
your account information needs to rights reserved.
be confirmed due to inactive Do not reply to this email as it is
customers, fraud and spoof an unmonitored alias.
reports. If you could please take Thank you for using Citibank 28
5-10 minutes out of your online ozmpjdyvexo utcbt vuqr
experience and renew your The link however goes to a non-secure znrwvsowwvi
records you will not run into any site at http://www.securecitibank.us.
future problems with the online Said domain was registered to a certain The link however ends up to a website
service. However, failure to Wayne Stanford of 3057 sunrise cir, in Asia. The genuine CitiBank page is
confirm your records may result in marina CA, 93933, United States, and forced to appear behind the scams
your account suspension. not to CitiBank itself.29 After the initial pop-up web page.30
Citibank phishing attacks, another set
You can confirm your account of phishing emails were circulated on Prevention. Two of the basic clues
records by logging in to your a different premise, to wit: in determining a phishing email are the
internet banking account. Once emails typographic errors and the
you have confirmed your account Recently there have been a large sophistication of the emails content
records your internet banking number of identity theft attempts and grammar. Misspellings and faulty
service will not be interrupted and targeting Citibank customers. In grammar in the bogus email should
will continue as normal. order to safeguard your account, bring alarm bells ringing in mind.
we require that you update your
To confirm your bank account Citibank ATM/Debit card PIN. 1. Use anti-virus software and a
records please click here. firewall, and keep them updated.
This update is requested of you as Some emails may contain software
Thank you for your time, a precautionary measure against or scripts that can harm your
SunTrust Billing Department. fraud. Please note that we have computer or track your activities
no particular indications that your on the Internet without your
details have been compromised in knowledge, by themselves or by
any way. unleashing viruses or spyware.
2004 SunTrust Banks, Inc. All 2. Be aware of corporate e-mails
rights reserved. - Equal Housing This process is mandatory, and if requesting or require personal
Lender - Member FDIC not completed within the nearest financial information (credit card
time your account may be subject numbers, account usernames,
or to temporary suspension. passwords and social security
numbers). Also be aware of e-
Subject: Verify your E-mail with To securely update your Citibank mails coming from usual service
Citibank ATM/Debit card PIN please go to: providers requesting verification of
certain account information (email

31
addresses, passwords, credit card these indications are not foolproof, The scheme is not limited to aid
numbers, etc.) A sender may as fraudsters may be the commission of violating the
mimic an Internet service provider technologically sophisticated to access device law.
(ISP), bank, online payment develop or mimic secure sites.
service, or even a government 8. If the personal information shared 2. Spyware utilizing spam. Both
agency. Phishers often convince that is vulnerable to fraud is of means of acquiring information
e-mail recipients to respond when financial nature, be aware of or uses e-mails extensively. The
they hijack brand names of banks, check your credit card or account distinction exist in the kind of
credit card companies and e- activity, and report anomalous information being sought, the
retailers. transactions to the concerned purpose for the information
3. If you normally transact with the company or service provider, if sought, and the method being
company requesting the they occur. If your statement is pursued by the two schemes.
information, and if the companys late, call your credit card Phishing is aimed primarily in
office can be contacted by phone company or bank to confirm your acquiring specific personal
without incurring unwelcome billing address, if not your account information (similar to those in bio-
charges, call to confirm. A balances. data), while spyware, besides this
potential fraudster would have specie of information, may even
difficulty taking over the Distinctions with other frauds pursue the determination of a
companys phone system to victims online behavior patterns,
perpetuate his/her scheme. 1. Online Credit Card Fraud. among others. Phishing is
4. Do not reply, either querying/ Online Credit Card Fraud is more necessarily related to the
confirming the senders need for geared towards the use of credit commission of fraud. On the other
the information or worse, sending cards over the Internet. It is a hand, while spywares gathering
the information requested through direct act to utilize another persons of information does not discount
email. Legitimate companies do credit card information to pursue the possibility of the commission
not ask for personal information transactions online; the of fraud, it may be merely an
via email. Further, e-mail is not a information being acquired insidious means to acquire
secure method of transmitting through insidious schemes consumer information for product
personal information. Updating (through keylogging spyware, development or marketing.
information with the companys phishing, etc.) or by cracking the Phishing does not necessarily need
website would be a better option, credit card account itself. a software to acquire its objective,
while updating information within Fraudulent use of credit cards but merely the possible gullibility
company s premises and (accounts) is governed by the of its victim. The victims
authorized personnel would be the Access Device Regulation Act of intervention is always present for
best. 1998 (Republic Act 8484) in the it to occur. Spyware is a software,
5. Do not click on the e-mails link, Philippines. The deterrence of the and it is installed either by the
even if you are curious where the practice, especially if electronically gullibility of the victim, by
link would lead you. Go directly pursued, is supplemented by the indiscriminate clicking of ok
to the companys website by e-Commerce Act of 2000 buttons, by agreeing to the terms
typing the websites URL address (Republic Act 8792) and covered of a contract of adhesion by
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1

in your browsers address bar, if by A.M. 01-7-01-SC (Rules on another software where the
you need to. Electronic Evidence). On the spyware is bundled, or even by
6. Do not openany attachment or other hand, phishing is only the scripts or viruses without the
downloading any files from emails preliminary means to pursue victims intervention. Phishing
you receive. These files may actual online credit card fraud. As emails may provide links towards
contain viruses or spyware. a technical subterfuge scheme, it a fake website to gather the
7. If you need to update your plant crimeware onto PCs to steal information sought or to install
personal information in the credentials directly, often using spyware. Spyware through spam
companys website, make sure that Trojan keylogger spyware. emails provide links to install
the site is secure by looking for Phishing, however, may also be spyware. Finally, some spyware
signs in your browser that it is in utilized to acquire information to are installed to get the victim to
fact secure; such as a locked allow identity thefts, a springboard part with his money for an antidote,
yellow padlock at the lower right to the commission of estafa, and while some phishing attacks are
corner of your browser, or the other crimes. It may also be made to get the victim to part with
https:// in your browsers pursued to gain access to non- his money, period.
address bar (the s appended to financial accounts (such as email
http to mean secure). Still, accounts) to pursue other frauds.

32
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1
Pharming that rewrite local host files on individual would include frauds pertaining to
PCs, like the Banker Trojan, have been Internet Auctions, Investment, and
Pharming attacks are similar to phishing used to conduct smaller-scale Merchandise Delivery, among others.
identity-theft attacks, but dont require pharming attacks. 38 Internet Auction Fraud may be
a lure, such as a Web link that victims prevented in the following manner: (1)
must click on to be taken to the attack Prevention. Pharming could be Understand as much as possible about
Web site. 31 Pharming combines combated if browsers would how the auction works, what your
phishing with domain spoofing/domain authenticate websites identities. obligations are as a buyer, and what
hijacking. The distinction lies with the 1. Server side. In order to remove the sellers obligations are before you
exploitation of a vulnerability in the pharming as a threat, servers bid. Understand that if a problem
DNS server software by a hacker- would have to add another layer occurs with the auction transaction, it
phisher to acquire the domain name of authentication. To prove that the could be much more difficult if the seller
for a website and to redirect that online merchants, banks, etc. are is located outside the US because of
websites traffic to the fake site who they purport themselves to be, the difference in laws. (2) Find out if
attributed in phishing. 32 Hence, it might require them to obtain a shipping and delivery are included in
pharming crimeware misdirects users certificate from a certificate the auction price or are additional costs
to fraudulent sites or proxy servers, authority, such as VeriSign. so there are no unexpected costs. Find
typically through DNS hijacking or 2. Client side. out what actions the web site/company
poisoning. This is possible when the a. Response to certificates. takes if a problem occurs and consider
original site was not Secure Sockets When one visit the websites insuring the transaction and shipment.
Layer (SSL) 33 protected, or when the of the online merchant, banks, (3) Learn as much as possible about
user is ignoring warnings about invalid etc., a dialog box appears, the seller, especially if the only
server certificates. 34 Rather than prompting one whether the information you have is an e-mail
spamming a potential victim, pharmers latter would want to trust the address. If it is a business, check the
poisons ones local DNS server by certificate. If the name on the Better Business Bureau where the
redirecting the Web request certificate does not match the seller/business is located. Examine the
somewhere else, i.e. to a website website one tries to access, feedback on the seller. (4) Determine
purporting to be the website one something is amiss. One what method of payment the seller is
intended to access. When a cracker should leave the website, as asking from the buyer and where he/
poisons a DNS server, he or she the website being accessed is she is asking to send payment. Also
changes the specific record for a not the actual electronic ask the seller about when delivery can
domain, sending one to a Web site very merchant, bank, etc. being be expected and if there is a problem
different from the one one intended sought. If the certificate with the merchandise is it covered by
to accesswithout your knowledge. corresponds to the website, a warranty or can you exchange it.
Usually, the cracker does this by posing one needs to save the (5) There should be no reason to give
as an official who has the authority to certificate so that the browser out your social security number or
change the destination of a domain would determine if it has drivers license number to the seller.
name. DNS poisoning is also possible reached the right URL Investment fraud may be limited
via software vulnerability, however. 35 address on the next visit. 39 through observation of due diligence
b. Netcraft toolbar (http:// similar to the prevention of credit card
Prevalence. In 2004 a German t o o l b a r. n e t c r a f t . c o m / ) . fraud, and inquiry about all the terms
teenager from from Helmstedt, Lower Another simple solution that and conditions of the investment
Saxony hijacked the eBay.de Domain works in some cases is a proposal, taking into mind that if it
Name. 36 In January 2005, the browser plug-in from Netcraft sounds too good to be true it probably
Domain Name for a large New York that displays information about is. On the matter of non-delivery of
ISP, Panix, was hijacked, the ownership the site being visited, such as merchandise, to prevent so, (1)
of which was attributed to a site in its geographic location.40 Observe due diligence similar to the
Australia. Requests to reach the prevention of credit card fraud; (2)
panix.com server were redirected to Other Internet fraud Inquire about returns and warranties;
the United Kingdom, and e-mail was and (3) Consider utilizing an escrow
redirected to Canada. Secure e-mail There are other Internet fraud existing, or alternate payment service. 41
provider Hushmail experienced the and which are usually virtual extensions
attack on 24 April 2005 when the of frauds that occur in the normal The creativity of a con artist is unlimited.
attacker rang up the domain registrar routine of commerce. The anonymity Centuries old scams can be revived to
and gained enough information to of a person over the Internet is a assume modern forms, through
redirect users to a defaced webpage. reason why con artists can pursue adoption of modern contexts and
37
On the other hand, e-mailed viruses frauds with more ease. Other kinds means. Be aware. A healthy dose of

33
cynicism once in a while may prove to 15 Internet Fraud Preventive Measures. C r e d i t _ r e p o r t s /
be the major factor in keeping ones Ibid. phishingsample.htm>
pockets healthy, and ones considerate 16 Phishing. Wikipedia, the free 30 Ibid.
social perception intact. encyclopedia. Retrieved 25 October 31 Roberts, Paul. Pharming Attacks
2005. <http://en.wikipedia.org/ Target the Web. 1 April 2005. PC
wiki/Phishing> World. <http://www.pcworld.com/
Endnotes
17 Anti-Phishing Working Group. r e s o u r c e / a r t i c l e /
1 Internet Fraud. Wikipedia, the free
What is Phishing and Pharming? 0,aid,120268,pg,1,RSS,RSS,00.asp>
encyclopedia. Retrieved 25 October
Retrieved 28 November 2005. 32 Pharming. Wikipedia, the free
2005. <http://en.wikipedia.org/
<http://www.antiphishing.org/> encyclopedia. Retrieved 25 October
wiki/Internet_fraud >
18 E-mail Evils: Of Phishing, Spam and 2005. <http://en.wikipedia.org/
2 Ibid.
E-mail Scams. Microsoft Philippines wiki/Pharming>
3 Internet Fraud Preventive Measures.
IT Professionals. Retrieved 28 33 Secure Sockets Layer (SSL) and
Internet Fraud Complaint Center
November 2005. <http:// Transport Layer Security (TLS), its
(IFFC). Retrieved 28 November
www.microsoft.com/philippines/ successor, are cryptographic
2005. <http://www1.ifccfbi.gov/
technet/article.asp?articleid= protocols which provide secure
strategy/fraudtips.asp>
20050628emailevils> communications on the Internet.
4 Ibid.
19 Federal Trade Commission, For the Transport Layer Security Wikipedia,
5 Advance fee fraud. Wikipedia, the
Consumer. FTC Consumer Alert. the free encyclopedia. Retrieved 28
free encyclopedia. Retrieved 30
How Not to Get Hooked by a November 2005 <http://
November 2005. <http://
Phishing scam. Retrieved 28 en.wikipedia.org/wiki/
en.wikipedia.org/wiki/
November 2005. <http:// Secure_Sockets_Layer>
Advance_fee_fraud>
www.ftc.gov/bcp/conline/pubs/ 34 Anti-Phishing Working Group.
6 Spanish Prisoner. Wikipedia, the
alerts/phishingalrt.htm> What is Phishing and Pharming?
free encyclopedia. Retrieved 30
20 Musgrove, Mike. Phishing Keeps Ibid.
November 2005. <http://
Luring Victims, 22 October 20005. 35 Vamosi, Robert. Alarm over
en.wikipedia.org/wiki/
Washington Post. Retrieved 23 pharming attacks: identity theft
Spanish_Prisoner>
October 2005. <http:// made even easier. 18 February
7 Advance fee fraud. Wikipedia, the
www.washingtonpost.com/wp-dyn/ 2005. Cnet.com, Security Watch.
free encyclopedia. Ibid.
content/article/2005/10/21/ Retrieved 28 November 2005.
8 Public Awareness Advisory
AR2005102102113.html> <http://reviews.cnet.com/4520-
Regarding 4-1-9 or Advance Fee
21 Musgrove, Mike. Phishing Keeps 3513_7-5670780-1.html>
Fraud Schemes. United States
Luring Victims. Ibid. 36 Fiutak, Martin. Teenager admits
Secret Service: Advance Fee Fraud
22 Federal Trade Commission, Ibid. eBay domain hijack 8 September
Advisory. Retrieved 30 November
23 Phishing. Wikipedia, the free 2004. C/net news.com. Retrieved 28
2005. <http://
encyclopedia. Ibid. November 2005. <http://
w w w. s e c r e t s e r v i c e . g o v /
24 Musgrove, Mike. Phishing Keeps news.com.com/Teenager+admits
alert419.shtml>
Luring Victims. Ibid. +eBay+domain+hijack/2100-
9 Advance Fee Fraud. Wikipedia, the
25 Ibid. 1029_3-5355785.html>
free encyclopedia. Ibid.
26 Phishing Activity Trends Report, 37 Pharming. Wikidepia, the free
10 Ibid.
September 2005. Retrieved 28 encyclopedia. Ibid.
11 Ibid.
November 2005. <http:// 38 Delio, Michelle. Pharming Out-
12 DFA warns OFWs on text scam in
antiphishing.org/apwg_phishing_ Scams Phishing. 14 March 2005.
Canada. ABS-CBN Interactive.
activity_report_sept_05.pdf> Wired News. Retrieved 28 November
Retrieved 30 November 2005.
27 Musgrove, Mike. Phishing Keeps 2005. <http://www.wired.com/
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1

< w w w. a b s - c b n n e w s . c o m /
Luring Victims. Ibid. news/infostructure/
storypage.aspx?StoryId=22858>
28 ESTec Security - Phishing Attacks. 0,1377,66853,00.html>
13 Public Awareness Advisory
Phishing Sample e-mail. ESTec 39 Vamosi, Robert. Alarm over
Regarding 4-1-9 or Advance Fee
Systems Corporation. Retrieved 30 pharming attacks: identity theft
Fraud Schemes. United States
November 2005. <http:// made even easier. Ibid.
Secret Service. Ibid.
www.security.estec.com/education/ 40 Coursey, David. First Was Phishing,
14 Urban Legends Reference Pages:
phishingSample.htm> Next Is Pharming 2 February 2005.
Crime (Nigerian Scam).
29 Phishing Samples. Mortgage eWeek.com. Retrieved 28 November
Snopes.com. Retrieved 30 November
Investments.com. Retrieved 30 2005 <http://www.eweek.com/
2005. <http://www.snopes.com/
November 2005 <http:// article2/0,1759,1758874,00.asp>
crime/fraud/nigeria.asp>
www.mortgage-investments.com/ 41 Internet Fraud Preventive Measures.
Ibid.
The e-Law Center takes pride in the appointment of former Dean of the Arellano University School of Law and
former Chairman of the Arellano Law Foundation

Hon. Antonio B. Nachura


as Associate Justice of the Philippine Supreme Court.

34
IT-Related News

The Philippine Quarterly IT Law Journal :: Volume 3, Number 1


WHAT YOU SAY IN CYBERSPACE MIGHT INCRIMINATE YOU
By Jaime N. Soriano

T his news report that


hugged global headlines today should
serve as a timely reminder to all
netizens to be more circumspect and
prudent in their conduct in cyberspace.

I am deeply sorry and I apologize for


letting down my family and the people
of Florida I have had the privilege to
allegedly uses to communicate with
Florida Governor Jeb Bush.

ABC news released in its website nine


pages of the alleged excerpts of
Foley s messages
abcnews.go.com/WNT/BrianRoss/
(http://

story?id=2509586&page=1; with a
strong advisory for readers to exercise
consensual sexual relationships with
17-year-old pages. Neither lawmaker
resigned, but Crane was defeated for
re-election in 1984. Studds survived
the scandal and continued to serve in
the House until retiring in 1996.

Ironically, Foley was the founder and


co-chair of the Congressional Missing
represent. This was the simple utmost discretion because of the and Exploited Childrens Caucus. He
statement of American Republican sexually explicit language). did play key roles in passing recent
congressman Mark Adam Foley, legislation on child protection such as
who served his legislative district in In a report, Republican congressman, the Volunteers for Children Act (that
Florida for six terms, when he John Shimkus of Illinois, who oversees gives organizations working with
tendered his abrupt resignation last the legislative page program in the US youths access to FBI fingerprint checks
Friday (29 September 2006), thereby Congress, said that he learned of to make sure that child molesters are
ending his flourishing legislative Foley s inappropriate electronic not hired), the Sex Offender
career, following the revelation of a messages in the late 2005 and took Registration and Notification Act (a
scandal involving inappropriate e-mail immediate action to investigate the bill already approved by the US
exchanges between him and some matter. Congress that seeks to overhaul the
teenage male legislative pages. national monitoring system for
CNN reports that the page program, predatory pedophiles by closing legal
Allegedly, Foleys electronic messages which brings young people from loopholes), and co-sponsored
included asking a page if he made him around the country to work on Capitol legislative measures to eliminate child
horny, and in another wanting to take Hill, came under intense scrutiny in pornography and exploitive child
off the teenagers clothes, or asking 1983, after two lawmakers Rep. model sites on the Internet.
for a photo of the boy. He transmitted Gerry Studds, a Massachusetts
the messages using his personal Democrat, and Rep. Dan Crane, an So the next time you hit that keyboard
account in America On Line (AOL), Illinois Republican were censured in your computer to send on-line
Maf54, the same account he following their admission they had messages, think again.

<< [ 5 ] Vulnerability of Internet Voting Switzerland developed test projects to Code (Batas Pambansa Bilang 881, as
could override his Internet vote with allow citizens to vote via the Internet amended), the Overseas Absentee
his paper vote. In that election, the or by SMS. The tests in Geneva, in Voting Act (Republic Act No. 9189),
percentage of the e-vote as against the particular, have been controversial, the Election Modernization Act
total votes cast was only 1.85% because Internet voting might not satisfy (Republic Act No. 8436), or the newly
because the availability of card the laws that ensure that any citizen signed Automated Election System Law
readers among the e-voters was not can check how the vote is conducted, (Republic Act No. 9369) that gives legal
that common. according to Wikipedia. imprimatur to the COMELEC to
implement Internet voting.
Even if the same system is applied in Internet voting may work on an on-
the Philippine setting, the card reader site and controlled basis. But I have I wish our poll body pushes through
does not effectively address the serious doubts whether at the moment with election automation with the much
concerns on Internet voting. Beside the it will work well in a remote and more vigor and enthusiasm than it does
fact that we do not have the requisite uncontrolled environment. with Internet voting. Otherwise, we
ID for the card reader, what would could not be blamed if we perceive
prevent an e-voter from passing to And the biggest hurdle still is that there that there must be something fishy.
another his identity card for a price? is nothing in the Omnibus Election

35
<< [40] Virtual Law Class << [40] AsianLII Philippine Launch To know more about Asian LII,
legal literature as they are all made see the LegalWeb portion of this
available in electronic form and journal.
integrated in the site on a per module
Endnotes
basis, (d) could engage and indulge in
healthy and stimulating on-line 1. http://www.arellanolaw.edu/
discussion with their professor and 2. h t t p : / / w w w .
among themselves about legal issues supremecourt.gov.ph/justices/
cj.puno.php
involving the subject through the 3. http://www2.austlii.edu.au/
various fora and blogs found in the ~graham/
website, and (e) are able to view 4. http://www.unsw.edu.au/
privately and confidentially their 5. http://www.austlii.edu.au/
6. h t t p : / / w w w. b a k e r c y b e r l a w
individual ratings in graded class centre.org/
activities, except their final grades, as 7. http://www.lawphil.net/
well as suggested answers on
examination questions to ensure better << [20] CyberLaw Jurisprudence << [40] SC e-Library Launched
transparency in student performance. The Supreme Court took note of the Judicial Academy (Philja), Office of the
legal mandate on the utmost Court Administrator (OCA), Judicial
On the other hand, the on-line course confidentiality of proceedings involving and Bar Council (JBC); Officials of the
also allows the professor: (1) to violence against women and children Action Program for Judicial Reform
administer on line examinations, both set forth in Sec. 29 of Republic Act (APJR) partners of the SC; editors of
objective and essay questions, (2) to No. 7610 (Special Protection of law school journals published in the E-
view individual and over-all class Children Against Child Abuse, Library; and law students. Upon prior
performance on demand, (3) to Exploitation and Discrimination Act), arrangement with the SC E-Library
answer on-line questions of my Sec. 44 of Republic Act No. 9262 Committee, other government
students on difficult or misunderstood (Anti-Violence Against Women and personnel may access the E-Library.
or complicated legal issues about the Their Children Act of 2004), and Sec.
subject, and (4) to control and monitor 40 of A.M. No. 04-10-11-SC (Rule The E-Library may be accessed
students activities in the interactive on Violence Against Women and Their through http://elibrary.supremecourt.
course, as each student is required to Children) effective November 15, 2004. gov.ph. It is maintained by a staff led
enrol, register and utilize their own by Director Milagros S. Ong of the SC
secured username and password to be This judicial pronouncement perhaps Library Services.
a part of the on-line community. should serve as a useful guide to all
The information for this article was acquired
other Internet domains and websites
The modules and the related reading primarily from Ivan M. Bandals article SC
that provide a repository of legal E-Library Opened to Law Students, 28
literature were organized in such a way information, case laws, and on-line February 2006, Court News Flash February
that would stimulate learning, reports of cases involving violence and 2006 (http://www.supremecourt.gov.ph/
understanding and analysis of the abuse of women and children in the news/courtnews%20flash/2006/02/
subject and that students are not simply 02280602.php)
Philippines.
spoon fed with legal information. The
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1

site also generates and sends, and << [11] Digital Copyright
of the US Supreme Court, said:
automatically notifies the students of,
In another legal challenge, dubbed as
updated information about on-line
the most important intellectual property "We hold that one who distributes
activities through their private e-mails.
case in decades, lodged by a a device with the object of
consortium of twenty-eight movie promoting its use to infringe
In the very near future or next semester
studios and record labels, the US copyright, as shown by clear
perhaps, a podcast (audio and/or
Supreme Court held in the case of expression or other affirmative
video) would be integrated in this
MGM Studios, Inc. v. Grokster, Ltd. steps taken to foster infringement,
virtual law class.
that in the process of marketing file is liable for the resulting acts of
sharing software, the file swapping of infringement by third parties."
The on-line course, which may be
P2P companies induces copyright
found at http://www.soriano-ph.com/
infringement and may constitute piracy Legal controversies involving digital
law-class/, was made possible using
of intellectual property rights. copyright are far from over especially
the open-source course management
with the way the Internet becoming a
system of Moodle.
The ponente in the Grokster case, way of life for most people. In fact,
Associate Justice David Hackett Souter the legal battle has just began.

36
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1
<< [39] Declaration on Free Access * Wits University School of Law Endnotes

1. See <http://www.worldlii.org/worldlii/
Made at the 4th Law via the Internet As amended by the representatives of declaration/montreal_en.html>
Conference in Montreal on 3 October the following legal information institutes 2. The amendements were: (i) in the title
2002 by representatives of the present at the 5th Law via the Internet of the Declaration, `public' was changed
following legal information institutes: to `free'; (ii) the words `where possible'
Conference in Sydney, November
were deleted from the second bullet
* Australasian Legal Information 2003: point `where possible, free of charge';
Institute * Australasian Legal Information (iii) addition of the description of a legal
* British and Irish Legal Information Institute information institute and the
Institute encouragement to participate in
* British and Irish Legal Information
networks; and (iv) addition of the final
* LexUM/Canadian Legal Institute bullet point about an annual meeting to
Information Institute * LexUM/Canadian Legal the list of areas of agreed cooperation.
* Hong Kong Legal Information Information Institute 3. The amendments were: (i) the words "It
Institute also includes legal documents created
* Hong Kong Legal Information
as a result of public funding." were added
* Legal Information Institute Institute to the end of para 2 after 'boards of
(Cornell) * Pacific Islands Legal Information enquiry': (ii) the words "To provide to
* Pacific Islands Legal Information Institute the end users of public legal information
Institute clear information concerning any
* South African Legal Information
conditions of re-use of that information,
* University of the West Indies Institute where this is feasible." were added to
Faculty of Law Library the final list of bullet points.

<< [18] Downloading Music 2. Ibid. << [23] Most Visited Dailies
3. Ibid.
for the recording and motion picture 4. Ibid. New York Times that ranks 57 as of
industry. Content and service providers 5. Ibid. today based on Netcraft statistics of top
have become more prudent in 6. Paul Supnik, Music on the Internet,
100 most visited websites.
complying with legal requirements such United States Perspective (Retrieved
from http://www.supnik.com)
as the imposition of fees as imposed 7. Ibid. As to major Philippine television
by the DMCA. Recent developments 8. Ibid. stations, and here is the result: 1st:
in technology have incorporated 9. Ibid.
ABS-CBN-2 (70,691*); 2nd: GMA-7
hardware and software control devices 10. Retrieved from http://
en.wikipedia.org/wiki/ (82,046); 3rd: STUDIO-23
that would enable content and service MGM_Studios%2C_Inc._v._Grokster (909,866); 4th: ABC-5 (1,082,117);
providers to effectively monitor music %2C_Ltd. and, 5th: NET25 (1,441,341). All the
transmission in the Internet. Internet 11. Supra, footnote 6, at 10
other networks did not show any
users who log-on to music websites are 12. Ibid.
13. A&M Records v. Napster, Inc. [2001 US *global ranking.
provided notice though the websites App. LEXIS 1941, No. 00-153001, slip
Terms of Use disclosing to users strict op. at 2206 (9th Cir., Feb. 12, 2001)] And if you are also wondering which
compliance with copyright laws. 14. Ibid.
among the television network in the
15. Ibid.
16. Ibid. world rank first in terms of net clicks, it
The development of technology and 17. Supra, footnote 1, at 6 is the BBC NEWS of the United
the enforcement of copyright laws are 18. Ibid. Kingdom that ranks 8 as of today based
pitted against each other. There must 19. Ibid.
on Netcraft statistics of top 100 most
be a clear cut policy that would strike 20. Atty. Rey Beckerman, How the RIAA
Litigation Process Works (Comments, visited websites. US-based Fox News
a balanced application of technology Copyright 2006, retrieved from http:// and CNN rank 11th and 15th,
and copyright laws to give legal www.findarticles.com, 11 July 2006) respectively.
authorities adequate guidance in 21. David McGuire, Comments (Retrieved
imposing liabilities. Otherwise, the from http://www.washingtonpost.com,
19 December 2003) << [40] ICT Roadmap
lowly Internet user will continuously 22. David McGuire, Congress May Act on response of the Commission on
and conveniently be put at the Internet Piracy Bill (Retrieved from
Information and Communications
crossroads. http://www.washingtonpost.com, 16
November 2004) Technology (CICT), through Sec.
23. Atty. Adrian S. Cristobal Jr., For a Song Ramon P. Sales (Chair, CICT) to the
Endnotes (Retrieved from http://www.oped Civil Society Comments on the Draft
@businessmirror.com.ph, Business
1. Daniel J. Gervais, Transmission of Music Mirror, 18 May 2006)
Roadmap. Said comments were the
in the Internet: an Analysis of Copyright 24. Policymakers Press for Updates to result of a previous forum conducted
Laws (Vanderbilt Journal of Transnational Copyright Law (BusinessWorld, 14 16 September 2006 at the ISO. The
Law, Vanderbilt University Law School, September 2006, p. S1/17) forum was hosted by the Foundation
November 2001; Retrieved from http:/ 25. In Search of a Clear National IP Strategy
/aix1uottaa.ca/~dgervais/publications/ (BusinessWorld, 14 September 2006, p.
for Media Alternatives.
Transmissions.pdf) S1/17)

37
LegalWeb

WWW.ASIANLII.ORG
Asian LII Brochure, Version 20.
Prof. G Greenleaf, Prof A. Mowbray, Mr P Chung, AustLII Co-Directors
http://www.asianlii.org/asianlii/brochures/AsianLII_brochure.pdf

This section is a continuing series legal information institutes


of articles featuring various
(LIIs) belonging to the Free
websites which may be relevant
to legal practitioners, legal Access to Law Movement.
researchers, and law students. AustLII provides the largest
online facility for Australian
Free access & non-profit legal research

T he Asian
Legal Information Institute
(AsianLII - www.asianlii.org) is
a non-profit and free access
website for legal information
from all 27 countries and
territories in Asia located
from Japan in the east to
Pakistan in the west, and from
(www.austlii.edu.au) and
coordinates the World Legal
Information
( W o r l d L I I )

Commonwealth Legal
Information
( C o m m o n L I I )
<www.commonlii.org>.
Institute

<www.worldlii.org> and

Institute

This experience is now being


Mongolia in the north to applied to access to Asian
Timor Leste in the south. law.
Access to AsianLII is free.
AsianLII will be launched for AustLII receives funding
free public access on 8 support for development of
December 2006 in Sydney. AsianLIIs infrastructure from
Launches in a number of the Australian Research
Asian countries will take place Council, for inclusion of
The homepage of the Asian Legal Indformation Institute (http:// content from six jurisdictions
in the first half of 2007, www.asianlii.org). The website was launched in December 2006.
beginning with the from AusAIDs Public Sector
Philippines. Linkages Programme (PSLP)
(Indonesia, Cambodia, Thailand,
Facilities For every country, AsianLII will also Vietnam, the Philippines, and Macau),
contain an extensive Catalog of law- and for inclusion of content from four
AsianLII provides for searching and related websites for that country (parts other jurisdictions from the Australian
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1

browsing databases of legislation, case- of the largest law catalog on the Attorney-Generals Department (India,
law, law reform reports, law journals Internet), and a Law on Google Singapore, Malaysia and China). PSLP
and other legal information, where facility assisting users to search Google assists development linkages between
available, from each country in the only for legal materials from that Australian public sector organisations
region. At launch it will provide access country. and those of Asian countries. AsianLII
to nearly 100 databases drawn from is also supported by APECs SELI
almost all 27 Asian countries. Over Developers, partners and (Strategic Economic Legal
140,000 cases from at least 15 supporters Infrastructure) Coordinating Group.
countries, and over 15,000 pieces of Other regional institutions are
legislation from at least 18 countries AsianLII is being developed by the welcome to join in supporting AsianLII.
will be searchable. All databases can Australasian Legal Information Institute
be searched simultaneously, or (AustLII), a joint facility of the Law Development approach AsianLII
searches can be limited to one Faculties at the University of
country s databases or other Technology, Sydney (UTS) and the Asia is a region of wide diversity of
combinations. Search results can be University of New South Wales languages. We will aim to include in
ordered by relevance, by date, or by (UNSW), in cooperation with partner AsianLII as much legal information as
database. institutions in Asian countries and other possible in the English language, so as

38
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1
to provide a common linguistic DECLARATION ON FREE ACCESS TO LAW
platform for comparative legal http://www.worldlii.org/worldlii/declaration/
research. At the same time, we will
obtain wherever available legal
materials in national and local
languages other than English and also In October 2002 the meeting of LIIs * Does not impede others from
make them accessible via AsianLII. in Montreal at the 4th Law via Internet publishing public legal
AustLIIs own search engine (Sino) is Conference, made the following information; and
being developed to allow it to search declaration[1] as a joint statement of * Supports the objectives set out in
data in any language (via conversion their philosophy of access to law. There this Declaration.
into Unicode). Hypertext links between were some further modifications of the
the versions of the same document in Declaration at the Sydney meeting of All legal information institutes are
different languages will be provided LIIs in 2003[2] and at the Paris meeting encouraged to participate in regional
wherever possible. User Guides will in 2004[3]. or global free access to law networks.
be available in various languages used
in Asia. Legal information institutes of the Therefore, the legal information
world, meeting in Montreal, declare institutes agree:
The databases searchable via AsianLII that: * To promote and support free
will in most cases be located on the * Public legal information from all access to public legal information
AsianLII servers located at AustLII, countries and international throughout the world, principally
where they will be converted into a institutions is part of the common via the Internet;
common format. In many cases the heritage of humanity. Maximising * To cooperate in order to achieve
same data will also be able to be access to this information these goals and, in particular, to
obtained from the websites of our local promotes justice and the rule of assist organisations in developing
partners. Where a local legal law; countries to achieve these goals,
information institute with sufficient * Public legal information is digital recognising the reciprocal
technical capacity already exists (such common property and should be advantages that all obtain from
as HKLII for Hong Kong or PacLII in accessible to all on a non-profit access to each other's law;
relation to Papua New Guinea law), a basis and free of charge; * To help each other and to support,
constantly synchronised mirror copy of * Independent non-profit within their means, other
the LII is located at AustLII for searching organisations have the right to organisations that share these
purposes, but search results from publish public legal information goals with respect to:
AsianLII searches return the user to the and the government bodies that * Promotion, to governments
local LII. create or control that information and other organisations, of
should provide access to it so that public policy conducive to the
Encouraging local capacity it can be published. accessibility of public legal
information;
One aim of the AsianLII project is to Public legal information means legal * Technical assistance, advice
assist development of the local capacity information produced by public bodies and training;
of our partner organisations to develop that have a duty to produce law and * Development of open
and maintain independent local legal make it public. It includes primary technical standards;
information to the standards of worlds sources of law, such as legislation, case * Academic exchange of
best practice, and to integrate them law and treaties, as well as various research results.
into international free-access law secondary (interpretative) public * To meet at least annually, and to
networks such as AsianLII, CommoinLII sources, such as reports on preparatory invite other organisations who are
and WorldLII. Where possible and work and law reform, and resulting legal information institutes to
requested, AustLII will provide technical from boards of inquiry. It also includes subscribe to this declaration and
assistance to our partner institutions to legal documents created as a result of join those meetings, according to
develop these capacities. This may public funding. procedures to be established by
include the provision of AustLIIs Sino the parties to this Declaration.
search engine and other software for A legal information institute: * To provide to the end users of
LII development. It may also include public legal information clear
AustLII support for applications by local * Publishes via the internet public information concerning any
partners to obtain resources. Some in- legal information originating from conditions of re-use of that
country training will be provided for more than one public body; information, where this is feasible.
our AusAID partner institutions. * Provides free, full and anonymous
public access to that information; >> [37] Declaration on Free Access

39
The Center and the Society

ASIAN LEGAL INFORMATION INSTITUTE SUPREME COURTS


LAUNCHED IN THE PHILIPPINES E-LIBRARY LAUNCHED
By Jaime N. Soriano

T he Arellano Law
Foundation[1] launched the Asian
Legal Information Institute in the
Philippines (http://www.asianlii.org)
in simple ceremonies at the Century
Park Hotel in Manila on 10 January
2007 with no less than Chief Justice
Reynato S. Puno [2] of the Philippine
Supreme Court as Guest of Honor and
department, the Australian embassy in

The launch was made possible through


Law Professor Graham Greenleaf
[3]
T
the Philippines, and other personalities.

of the University of New South Wales


(UNSW) [4] and co-director of the
Australasian Legal Information Institute
(AustLII) [5] and the Cyberspace Law
The nationwide
launching of the the Supreme Court
E-Library was held at the Arellano
University School of Law library in
Pasay City on 20 February 2006, with
live simulcast via the Internet with seven
other law schools, which already have
access to the E-Library, located in
different parts of the country. The other
Speaker. and Policy Centre. [6] participating schools, besides Arellano
University School of Law, were Saint
The affair was also attended by legal Asian LII aims to facilitate and promote Louis University in Baguio City, Aquinas
luminaries, law deans and professors, comparative research, make laws of University in Legaspi City, University
government functionaries from the Asia-Pacific countries more accessible, of San Carlos in Cebu City, Silliman
judiciary and the foreign affairs encourage international trade and University in Dumaguete City, Xavier
investment, and provide the University in Cagayan de Oro City,
many other benefits of free Mindanao State University in Marawi
access to law. City, and Ateneo de Davao University
in Davao City.
The Arellano Law Foundation
was chosen as Asian LII partner The SC E-Library is the first fully
because of its LawPhil searchable web-based digital library
Project, [7] one of the countrys in the Philippines. Those currently
leading website that provides authorized to access the E-Library are
free access to useful Philippine Justices; Judges; clerks of courts; court
legal information. librarians; and officials of the Philippine
<< [36] AsianLII Philippine Launch << [36] SC e-Library Launched

E-LAW EXECUTIVE DIRECTOR THE PHILIPPINE


INITIATES VIRTUAL LAW CLASS STRATEGIC ICT
The Philippine Quarterly IT Law Journal :: Volume 3, Number 1

ROADMAP

B eginning Second
Semester of School Year 2006-2007,
Atty. Jaime N. Sorianos law classes in
Civil Procedure and Remedial Law
Review at the Arellano University
School of Law went interactive to
complement his weekly class
discussions. Said on-line course in law
is the first of its kind in the country.
a diagnostic test upon enrolment to
measure their readiness to take the
subject, and other measurement and
assessment tools as well during the
duration of the course, (b) can view O
the course outline divided into modules
as well the pertinent laws and cases
that would be the subject of class
discussion during our weekly meetings,
n 27 November 2006, Atty.
Jaime N. Soriano, executive director
of the e-Law Center, and Mr. Michael
Vernon Guerrero, former president of
the IT Law Society (2004-2006),
attended a public forum at the Institute
of Social Order (ISO) at the Ateneo
de Manila University (AdMU), entitled
Civil Society Interrogates the
(c) need not spend much time in Philippine Strategic ICT Roadmap.
Through the on-line phase of the libraries to read and study the assigned The highlight of the forum was the
course, his law students (a) could take << [36] Virtual Law Class << [37] ICT Roadmap

40

You might also like