Professional Documents
Culture Documents
(m) “Key Pair” in an asymmetric cryptosystem SEC. 2. Copies as equivalent of the originals. –
refers to the private key and its mathematically When a document is in two or more copies
related public key such that the latter can verify executed at or about the same time with
the digital signature that the former creates. identical contents, or is a counterpart produced
by the same impression as the original, or from
(n) “Private Key” refers to the key of a key pair the same matrix, or by mechanical or electronic
used to create a digital signature. re-recording, or by chemical reproduction, or by
(o) “Public Key” refers to the key of a key pair other equivalent techniques which is accurately
used to verify a digital signature. reproduces the original, such copies or
duplicates shall be regarded as the equivalent of
SEC. 2. Construction. – These Rules shall be the original.
liberally construed to assist the parties in
obtaining a just, expeditious, and inexpensive Notwithstanding the foregoing, copies or
determination of cases. duplicates shall not be admissible to the same
extent as the original if:
The Interpretation of these Rules shall also take
into consideration the international origin (a) a genuine question is raised as to the
of Republic Act No. 8792, otherwise known as authenticity of the original; or
the Electronic Commerce Act. (b) in the circumstances it would be unjust or
inequitable to admit a copy in lieu of the
RULE 3 original.
AUTHENTICATION OF ELECTRONIC
SECTION 1. Electronic documents as functional DOCUMENTS
equivalent of paper-based documents. –
Whenever a rule of evidence refers to the term SECTION 1. Burden of proving authenticity. –
of writing, document, record, instrument, The person seeking to introduce an electronic
memorandum or any other form of writing, such
document in any legal proceeding has the of an electronic signature, it shall be presumed
burden of proving its authenticity in the manner that:
provided in this Rule.
(a) The electronic signature is that of the person
SEC. 2. Manner of authentication. – Before any to whom it correlates;
private electronic document offered as authentic
is received in evidence, its authenticity must be (b) The electronic signature was affixed by that
proved by any of the following means: person with the intention of authenticating or
approving the electronic document to which it is
(a) by evidence that it had been digitally signed related or to indicate such person’s consent to
by the person purported to have signed the the transaction embodied therein; and
same;
(c) The methods or processes utilized to affix or
(b) by evidence that other appropriate security verity the electronic signature operated without
procedures or devices as may be authorized by error or fault.
the Supreme Court or by law for authentication
of electronic documents were applied to the SEC. 4. Disputable presumptions relating to
document; or digital signatures. – Upon the authentication of
a digital signature, it shall be presumed, in
(c) by other evidence showing its integrity and addition to those mentioned in the immediately
reliability to the satisfaction of the judge. preceding section, that:
(a) By evidence that a method or process was (a) The reliability of the manner or method in
utilized to establish a digital signature and verity which it was generated, stored or
the same; communicated, including but not limited to
input and output procedures, controls, tests and
(b) By any other means provided by law; or checks for accuracy and reliability of the
(c) By any other means satisfactory to the judge electronic data message or document, in the
as establishing the genuineness of the electronic light of all the circumstances as well as any
signature. relevant agreement;
SEC. 3. Disputable presumptions relation to (b) The reliability of the manner in which its
electronic signature. – Upon the authentication originator was identified;
(c) The integrity of the information and optical or other similar means at or near the
communication system in which it is recorded or time of or from transmission or supply of
stored, including but not limited to the hardware information by a person with knowledge
and computer programs or software used as thereof, and kept in the regular course or
well as programming errors; conduct of a business activity, and such was the
regular practice ot make the memorandum,
(d) The familiarity of the witness or the person report, record, or data compilation by
who made the entry with the communication electronic, optical or similar means, all of which
and information system; are shown by the testimony of the custodian or
(e) The nature and quality of the information other qualified witnesses, is excepted from the
which went into the communication and rule or hearsay evidence.
information system upon which the electronic SEC. 2. Overcoming the presumption. – The
data message or electronic document was presumption provided for in Section 1 of this
based; or Rule may be overcome by evidence of the
(f) Other factors which the court may consider untrustworthiness of the source of information
as affecting the accuracy or integrity of the or the method or circumstances of the
electronic document or electronic data preparation, transmission or storage thereof.
message.
RULE 11
RULE 12
EFFECTIVITY