You are on page 1of 4

Issues on Delegation of legislative Power: Complete in itself

GR 203335 – Disini v. Secretary of Justice


Abad J.

Completeness Test – law must be complete in all its terms and conditions when it leaves the legislature such that when it
reaches the delegate, the only thing he will have to do is to enforce it.
Sufficient Standard Test – mandates adequate guidelines or limitations in the law to determine the boundaries of the
delegate’s authority and prevent the delegation from running riot.

Can’t follow format cause wala siyang facts talaga cause issue here is constitutionality lang ng Cybercrime huhu.
The main issue here in consideration of the main topic (issues on delegation of legislative power: complete in itself) is:
 Section 24 and 26(a) of Cybercrime law wherein there is delegation of legislative powers to the CYBERCRIME
INVESTIGATION and COORDINATING CENTER and giving it power to formulate a national cybersecurity plan
without any sufficient standrads or parameters for it to follow.
 Using the two tests above, the cybercrime law is COMPLETE in itself when it directed the CICC to formulate and
implement a national cybersecurity plan.
 Also the law gave sufficient standards for the CICC to follow when it provided a definition of cybersecurity
 Cybersecurity – refers to collection of tools, policies, risk management approaches, actions, training, best
practices, assurance and technologies that can be used to protect cyber environment and organization and user’s
assets.
 Formulation of the cybersecurity plan is consistent with the policy of the law to prevent and combat offenses
 Thus the delegation of power to CICC is CONSTITUTIONAL!!!

Pero since you know naman na unpredictable si Madam Wilwayco, I’ll include the other shit para ready. PAK LABAN!
Assailed Section of Cybercrime law Petitioners’ Contention Ruling and Holding
Section 4(a)(1) 1. Fails to meet strict scrutiny standard 1. Nothing in this section that calls for
Illegal Access required by laws that interfere with the the application of the strict scrutiny
fundamental rights of the people. since no fundamental freedom like
speech is involved.
2. How about Ethical Hackers who
evaluate the target system’s security 2. Ethical hackers are not included
and report back to the owners? since there was prior permission from
the client.

CONSTITUTIONAL
Section 4(b)(3) 1. Suffers from OVERBREADTH since 1. Does NOT encroach on these
Data Interference – intentional or it intrudes into the area protected freedoms at all since it simply
reckless alteration of computer data, speech and expression creating a punishes what essentially is a form of
electronic document without right chilling effect VADALISM. There is NO freedom to
including the introduction of viruses. destroy other people’s computer
systems

CONSTITUTIONAL
Section 4(a)(6) 1. Violates equal protection clause will 1. Baseless because there is always a
Cyber-squatting – the acquisition of cause a user using his real name to determination if there is BAD FAITH in
domain name over the internet in bad suffer the same fate as those who use the taking of the name or trademark.
faith to profit, mislead, destroy the aliases or take the name of another in
reputation and deprive others from satire. CONSTITUTIONAL
registering the same Hypothetical example: My real name is
Rodrigo Duterte and I mock the
president then another uses the name
it to mock him, we both will be
punished under this section when in
fact I should be punished using
another law (if there is)

1
Section 4(b)(3) 1. violates due process and right to 1. Petitioners fail to show how
Identity Theft privacy and correspondence and government effort to curb computer-
freedom of the press related identity theft violates these
rights. Clearly this section regulates
specific actions: the acquisition, use,
misuse or deletion of personal
identifying data of another. There is
NO fundamental right to ACQUIRE
another’s personal data.

CONSTITUTIONAL
Section 4(c)(1) 1. Violates freedom of expression. 1. This section only is concerned with
CyberSEX Cybersex between husband and wife CYBER PROTSITUTION. (buti na
will be punished. lang kung hindi madaming mahuhuli
sa inyo mga mahilig magskype dyan.
CHAROT!)

CONSTITUTIONAL
Section 4(c)(2) 1. A person who merely doodles on 1. Merely expands Anti-Child
Child Pornography paper and imagines a sexual abuse of Pornography Act of 2009. Nothing
a 16-year-old is not criminally liable for prevent the government from invoking
producing child pornography but one the ACPA
who formulates the idea on his laptop
would be. CONSTITUTIONAL
Section 4(c)(3) 1. Would deny a person the right to 1. Government presents no basis for
Unsolicited Commercial read his emails even unsolicited holding that unsolicited electronic ads
Communications or the ever famous commercial ads addressed to him. reduce the efficiency of computers.
SPAM (Yummerzzzz! Joke Ma Ling
for life <3 ) Unsolicited advertisements are
LEGITIMATE forms of EXPRESSION.
The term referred to a Monty Python’s
Flying Circus Scene in which actors UNCONSTI!!!
would keep saying Spam when
reading options from the menu
(tandaan niyo yan tinanong ni madam
yan nung fake class sesh natin)
RPC 353 and Section 4(c)4 1. The libel provisions of cybercrime 1. Libel is not a constitutionally
Libel law carry with them the requirement protected speech
of presumed malice even when the
latest jurisprudence already replaces CONSTITUTIONAL
it with the higher standard of ACTUAL
MALICE.

2. Infringes on freedom of expression

3. Against International Covenant of


Civil and Political Rights and General
Comment 34 of UN Human Rights
Committee
Section 5 1. Suffers from Overbreadth creating 1. The terms aiding and abetting
Aiding and Abetting in the a chilling and deterrent effect on constitute broad sweep that
commission of Cybercrime and protected expression generates chilling effect on those who
Attempt in the Commission of express themselves through
Cybercrime Microblogging (twitter) and liking, cyberspace posts.
sharing and commenting feelings
about a certain post would constitute UNCONSTITUTINAL with respect to
aiding and abetting. Child Pornography, Spam and Libel.

BUT!!!! Constitutional in relation to


other crimes such as system
interference, cyber-squatting,
2
computer-related fraud and other
except those mentioned above!!!
Section 6 1. In using tech, the offender often
If crimes in Revised Penal Code evades identification and is able to
committed using information and reach far more victims or cause
communications tech, penalty will greater harm. The distinction
be 1 year higher therefore creates a basis for higher
penalties.

CONSTITUTIONAL
Section 7 1. Does not cover crimes of online
A prosecution under this act shall libel and online child pornography
be without prejudice to any liability because not a new crime but only a
for violation of other provisions and repetition of those enunciated in RPC
laws. and ACPA respectively.

LEAVE THE DETERMINATION of the


correct application of Section 7 that
authorizes prosecution of the offender
under both the RPC and Cybercrime
law to ACTUAL CASES with the
exceptions of libel and child porno.
Section 8 1. Judiciary can only interpret the law.
Penalties Court should not encroach on the
prerogative of the lawmaking body.
Section 12 1. Curtail civil liberties or provide 1. With enough traffic data, analysts
Real-Time Collection of Traffic Data opportunities for official abuse may be able to determine a person’s
close associations, religious beliefs,
2. Affects right to privacy political affiliations and even sexual
preferences. Such would inflict
RIGHT TO PRIVACY

Section 12 empowers law


enforcement authorities with DUE
CAUSE but this term is too sweeping.

UNCONSTITUTIONAL
Section 13 1. Deprivation of the right to property 1. The data that service providers
Preservation of Computer Data – preserve on orders of law
content data shall be preserved for 6 enforcement authorities are not made
months. Law enforcement authorities inaccessible to use by reason of the
may order an extension of 6 months if issuance of others.
going to be used in a case. The process of preservation of data
will not unduly hamper the normal
transmission or use of the same.

CONSTITUTIONAL
Section 14 1. Merely the enforcement of duly
Disclosure of Computer Data – upon issued court warrant
securing court warrant shall issue an
order requiring disclosure of data from CONSITUTITONAL
service provider or any person
Section 15 1. Merely enumerates the duties of
Search, Seizure and Examination of law enforcement
Computer Data
CONSTITUTIONAL
Section 17 1. Deprivation of property without 1. No right to order service provider
Destruction of Computer Data due process of law to keep data exclusively for him.
CONSTITUTIONAL

3
Section 19 1. Stifles freedom of expression and 1. No search warrant shall issue
Restricting or Blocking Access to right against unreasonable search except upon probable cause to be
Computer Data – when data is prima and seizures determined personally by the JUDGE.
facie found to be in violation of this
ACT, the DOJ shall issue an order to UNCONSTITUINAL
restrict or block access to such data.
Section 20 1. Bill of atainder 1. The act of non-compliance for it to
Noncompliance be punishable must still be done
knowingly or willfully. There must still
be a judicial determination of guilt

CONSTITUINAL
Section 24 and 26(a) SEE MAIN
ISSUE ABOVE

In Motion for Reconsideration April 23, 2014


 Assail constitutionality of Penalties (section 6) of now RA 10125 (before 10175 but still Cybercrime Prevention Act
of 2012) because produce a chilling effect
 Also assail section 4(c)4 about libel
 Government seeks to regulate activities in the internet because if not it would be anarchical
 Court DENIES MOR

DIGESTER: Malcolm Cruz and Macy Ybanez

You might also like