Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
2013.7 These orders were given by the Supreme Court after receiving
15 petitions assailing the validity of the said legislation.8
These violent reactions toward the Cybercrime Law were summarized
in the case of Disini, et al. v. Secretary of Justice, where the
constitutionality of the 21 provisions in the Cybercrime Law was
assailed.9 The following are the specific provisions that were
questioned:
1.
2.
3.
4.
5.
6.
7.
8.
9.
7Id.
8 Id at 296-297.
9Idat299300.
10Id.
2
11 Id at 354.
12 Id at 356.
13 Id.
14 Id at 354-356.
15 Idat312.
16 Id.
17 Id.
18SeeTHECYBERCRIMEPREVENTIONACTOF2012,2.
19Id.
3
This catch-all provision impliedly ruled that the scope of the RPC and
special penal laws includes the acts done in the cyber world. 22 During
the deliberation of the Cybercrime Law, Representative Tinga said that
the reason why some crimes were not specifically enumerated in the
law is that there is an assumption that the acts committed that would
make it illegal in the real world also be illegal in the cyber world.23
However, this assumption does not seem to be very accurate. Cyber
world includes virtual world, and in virtual worlds, one may create an
online avatar to represent himself/herself.24 Therefore, the question
now is, would an act punishable under the RPC or special penal laws
still be a crime if it does not have real-world effect? The catch-all
provision of the Cybercrime Law seems to suggest so. This presents an
alarming problem, for the legislators have failed to recognize that
cyber world is a sui generis, thus, needs specific laws.25
It is also worth mentioning that this catch-all provision seems to be too
vague. It is not clear as to what extent does the usage of computerrelated technologies is needed in order for a certain crime to be
20 Id.
21SeeTHECYBERCRIMEPREVENTIONACTOF2012,6.
22Id.
23DisiniJr.,716SCRAat389392.
24 Mark W. Bell, Towards a Definition of Virtual Worlds, available at
https://journals.tdl.org/jvwr/index.php/jvwr/article/view/283/237 (Last accessed
August 2, 2015).
25 GARY E. MARCHANT, BRADEN R. ALLENBY & JOSEPH R. HERKERT, THE GROWING GAP BETWEEN
EMERGING TECHNOLOGIES AND LEGAL-ETHICAL OVERSIGHT 86 (2011).
With our current laws stating that the concealment of a name, use of
pseudonyms and anonymous publication, and the same, being made
applicable even in the cyber world, there is an apparent violation of
peoples right to privacy and security, as guaranteed by the 1987
Philippine Constitution.32
Recently, a report by the United Nations (UN) special rapporteur on
freedom of expression presented the concept of right to online
anonymity to the UN Human Rights Council. 33 This was supported by a
lot of international human rights group. 34 It is not surprising that these
kinds of concepts emerge, as the international community begins to
recognize the complexity, purpose, and sui generis character of the
cyber world, and thus begins to adopt measures in addressing issues
therein.35 Some of the countries, which have already begun recognizing
the right to online anonymity, include Canada, Chile, Argentina and the
European Union members.36
b. Statement of the Problem
Given the aforesaid facts and situation, there is a call for the
State to uphold the peoples rights to privacy and security. While peace
and order should be prioritized, the means of implementing peace and
order should never jeopardize the fundamental rights granted to
Filipinos by no less than the 1987 Constitution. This study will discuss
and address the act of balancing the States power to regulate peoples
cyber world activities vis--vis the constitutional guarantee of privacy
and security.
More specifically, this thesis will answer the question of whether
the catch-all provision under the Cybercrime Prevention Act of 2012, in
positively implying that the scope of the crimes punishable under the
Revised Penal Code and Special Penal Laws cover not only acts done in
the real world, but even in the cyber world, infringes upon the right of
the people to privacy and security. This is in light of the applicability of
certain Revised Penal Code and Special Penal Laws provisions against
the peoples right to use anonymity and aliases in the cyber world.
32PHIL.CONST.1987art.III3.
33UN:OnlineAnonymity,EncryptionProtectRights,availableat
http://www.hrw.org/news/2015/06/17/unonlineanonymityencryptionprotectrights(LastaccessedJuly
26,2015).
34Id.
35S.R.Subramanian,PreventionandRegulationofCyberCrimesintheAgeofTerrorism:TheLegal
andPolicyModelfromIndia,availableathttp://www.irmainternational.org/viewtitle/43781/(page207)
(LastaccessedJuly2,2015).
36 UN, Supranote33.
c. Definition of Terms
1. Alias a name or names used by a person or intended to be
used by him publicly and habitually, usually in business
transactions, in addition to the real name by which he was
registered at birth or baptized the first time, or to the substitute
name authorized by a competent authority; a mans name is
simply the sound or sounds by which he is commonly designated
by his fellows and by which they distinguish him, but sometimes
a man is known by several different names and these are known
as aliases. 37
2. Anonymity the quality or state of being unknown. 38 It may be
done through simply leaving no information about the author of a
work, or by using a username.
3. Catch-all provision a provision which is all-encompassing. This
is usually put at the end of a more specific law, and is used to
cover all the other cases, which the lawmakers may have
missed.
4. Computer a programmable electronic device designed to
accept data, perform prescribed mathematical and logical
operations at high speed, and display the results of these
operations. Mainframes, desktop and laptop computers, tablets,
and smartphones are some of the different types of
computers.39
5. Cybercrime the punishable acts committed in the cyber world,
as defined in the R.A.10175, also known as The Cybercrime
Prevention Act of 2012.40
6. Cyber world the world of Internet; one which is intangible and
accessed through the use of a computer device.
7. Internet an electronic communications network that connects
computer networks and organizational computer facilities around
the world.41
8. Name A name, when applied to a particular person, is a word
or words used to distinguish, that is, identify that person.42
37Ursuav.CA,256SCRA147,155156(1996).
38MerriamWebsterDictionary,Anonymityavailableatwww.merriam
webster.com/dictionary/anonymity(LastaccessedJuly3,2014).
39MerriamWebsterDictionary,Computer,availableathttp://dictionary.reference.com/browse/computer
(LastaccessedJuly28,2015).
40 See THE CYBERCRIME PREVENTION ACT OF 2012.
41 MerriamWebsterDictionary, Internet, available at http://www.merriamwebster.com/dictionary/internet (Last accessed July 29, 2015).
42Inre:JesusNgYaoSiongv.Republic,16SCRA483,484(citingU.S.vs.ToLeePiu,35Phil.4)
(1966).
43MerriamWebsterDictionary,SocialMedia,availableathttp://www.merriam
webster.com/dictionary/social%20media(LastaccessedJuly28,2015).
laws
and
jurisprudence
in
relation
to
2.
3.
4.
5.
6.
7.
8.
11
12
13
personality of the online avatar of a certain person may vary with the
personality of the same person in real life. A lot of players, in fact, are
very opinionated in game, while on the other hand, very reserved in
real life.
Cyber world as Sui Generis
Cyber world is a class of its own. It is a special place where
people are more free and people are more equal. The poor is entitled
to create his own social media and gaming accounts in as much as the
rich is. In fact, some people conceal their personal status online
because for them, the cyber world is not realit is a make-believe
world.
With this, there is a need to give the cyber world a different
treatment. Actions in the cyber world are not commensurate in action
in real life, as much as these actions are, at times, only illusory and
provide no effect in the real world. Since the cyber world is a sui
generis, it requires special legal attention, especially now that the
cyber world population is growing fast.52
58Id.
59 International Covenant on Civil and Political Rights, Dec. 19, 1966, art. 25., 999
U.N.T.S. 171 [hereinafter ICCPR].
60ARTICLE19,RighttoOnlineAnonymity,availableat
https://www.article19.org/data/files/medialibrary/38006/Anonymity_and_encryption_report_A5_final
web.pdf(LastaccessedJuly30,2015).
61InternationalRiceResearchInstitutev.NLRC,221SCRA760,767(1993).
16
Therefore, one may conclude that the term morality, which the State
promotes, necessarily includes the value of honesty.62
Likewise, one may see that the State puts a high regard to honesty, as
seen in the Civil Code, where it says,
Art. 19. Every person must, in the exercise of his rights and in the
performance of his duties, act with justice, give everyone his due
and observe honesty and good faith.63 (Emphasis supplied)
17
18
67 Luis B. Reyes, The Revised Penal Code: Criminal Law Book One ___ (2012).
68Idat__.
69 Id at __.
70 Id at __.
71SeeREVISEDPENALCODE,art3.
19
On June 5, 1987 Executive Order No. 187 fully restored the force
and effect of Article 178 of the Revised Penal Code, among others,
after the repeal of several Presidential Decrees.72
Article 178. Using fictitious name and concealing true name. The
penalty of arresto mayor and a fine not to exceed 500 pesos shall
be imposed upon any person who shall publicly use a fictitious
name for the purpose of concealing a crime, evading the
execution of a judgment or causing damage.
Any person who conceals his true name and other personal
circumstances shall be punished by arresto menor or a fine not to
exceed 200 pesos.73 (Emphasis supplied)
Under this Article, there are 2 punishable acts. The first act is using a
fictitious name to conceal a crime, avoid judgment or cause damage.
This is clearly justified, as it would be very difficult, if not impossible,
for the public officials in-charge to find the offender. 74 This is especially
true when a person fakes his identity around a certain neighborhood,
where no one would suspect that he/she is a wanted person.
The elements of the first paragraph of article 178 includes: (1)
using a fictitious name; (2) the purpose is to conceal a crime, avoid
execution of judgment or cause damage. It is good to note that
fictitious name here means a name, which is non-existent, not one
being used by another person. This is not to be confused with identity
theft, which is another subject matter all together.
The second act punishable under this article is concealment of
true name and other circumstances without any qualification.75 The
elements of this paragraph are the following: (1) concealment of true
name or other circumstances and; (2) for the mere purpose of
concealment. This means that the act of concealment itself, even
though not for the purpose of concealing a crime, avoiding a judgment
or causing damage, is punishable. 76 This is a more general provision,
punishes any form of concealment of name or personal circumstances,
for any reason.77
72RepealingPresidentialDecreesNos.38,942,970,1735,1834,1974,And1996AndArticles142A
And142BOfTheRevisedPenalCodeAndRestoringArticles135,136,137,138,140,141,143,144,
146,147,177,178,And179ToFullForceAndEffectAsTheyExistedBeforeSaidAmendatoryDecrees,
EONo.187,s.1987(1987).
73SeeREVISEDPENALCODEart178.
74Id.atpar.1
75Id.par.2.
76Id.
77Id.
20
To this day, there is only one case, which reached the Supreme
Court as regards punishing someone for concealing a personal
circumstance, more specifically concealment of marital status in his
voters certificate.78 This was however not a criminal proceeding, and
the respondent was merely fined P 12,000.79
On Article 154 of the Revised Penal Code
Another provision, which penalizes acts related to identity
concealment, is Revised Penal Code Article 154 on Unlawful use of
means of publication and unlawful utterances, more specifically under
paragraph 4.
Art. 154. Unlawful use of means of publication and unlawful
utterances. The penalty of arresto mayor and a fine ranging from
P200 to P1,000 pesos shall be imposed upon:
xxx
4. Any person who shall print, publish, or distribute or cause to
be printed, published, or distributed books, pamphlets,
periodicals, or leaflets which do not bear the real printer's name,
or which are classified as anonymous.80 (Emphasis supplied)
Since there was a specific and broader enumeration, which includes (1)
literary, (2) cinema, (3) television, (4) radio or other entertainment
purposes and (5) athletic events where the use of pseudonym is a
normally accepted practice, we follow the Latin maxim expressio unius
est exclusio alterius, which means mentioning one thing implies the
82Crime,availableathttps://www.law.cornell.edu/wex/crime(LastaccessedJuly18,2015).
83MerriamWebsterDictionary,PolicePower,availableathttp://www.merriam
webster.com/dictionary/police%20power(LastaccessedJuly28,2015).
84AnActToRegulateTheUseOfAliases[ANTIALIASLAW]C.A.No.142(1932).
85AnActAmendingCommonwealthActNumberedOneHundredFortyTwoRegulatingTheUseOf
Aliases[ANTIALIASLAWAMENDMENT]1(1969).
22
exclusion of the others not mentioned. 86 This means that the law
punishes the use of pseudonyms for the purposes other than those
enumerated.
There are already a handful of cases decided under this law. The
Supreme Court has laid down two tests to determine whether there has
been a violation of this law, namely: (1) whether there has been a
habitual use of a pseudonym for a purpose not allowed by the law and
(2) whether the pseudonym has caused confusion or prejudice. 87
Ursua v. CA: A case of judicial legislation
Curiously, there is a landmark case decided by the Supreme Court,
which added another qualification as to who may be prosecuted by the
Anti-Alias Law. In Ursua vs CA, the court added another qualification as
to who may be prosecuted under the Anti-Alias Law.88 It held that,
The objective and purpose of C.A. No. 142 have their origin and
basis in Act No. 3883, An Act to Regulate the Use in Business
Transactions of Names other than True Names, Prescribing the
Duties of the Director of the Bureau of Commerce And
Industry in its Enforcement, Providing Penalties for Violations
thereof, and for other purposes, which was approved on 14
November 1931 and amended by Act No. 4147, approved on 28
November 1934.
xxx
The confusion and fraud in business transactions which the antialias law and is related statutes seek to prevent are not present here
as the circumstances are peculiar and distinct from those
contemplated by the legislature in enacting C.A. No. 142 as
amended.89 (Emphasis supplied)
86Atty.MarkNetteE.Concepcion,BIRrulingNo.01412:Istheenumerationofallowabledeductions
exclusive?,availableathttp://www.philstar.com/business/799675/birrulingno01412enumeration
allowabledeductionsexclusive(LastaccessedJuly19,2015).
87LimHokAlbanov.RepublicOfThePhilippines,104Phil.795(1958).
88 Ursua, 256SCRAat 155-154.
89 Id.
23
offense.90 However, the court seemed to go a bit too far with its
interpretation of the law. The wording of the Anti-Alias law did not
provide, that an alias should be used for business transactions for it to
be illegal.91 It instead provided for a list of where an alias may be
used.92 It is clear that outside the ambit of such list, one is already in
violation of the Anti-Alias Law. 93
The court failed to recognize that Act No. 3883 is a different law, which
seeks to prevent a different wrong. Although the two statues have
certain similarities, they should still stand separately, the RA 6085
being a more general provision, while Act No.3883 the more specific
one. Thus, the case of Ursua v CA may be said to have resulted into a
judicial legislation.
The court may have exceeded in its jurisdiction in adding another
element to the offense. Although its intention is noble, that is, to
minimize those who might be prosecuted under R.A. 6085, judicial
legislation is never the right way. It is upon the part of the legislative
department to amend or revise the said law, and not upon the judiciary
to change the law.
Two-fold test under Philippine Jurisdiction
The use of pseudonyms is likewise covered under some specific
provisions of the Civil Code.94
Article 379. The employment of pen names or stage names is
permitted, provided it is done in good faith and there is no injury to third
persons. Pen names and stage names cannot be usurped. 95 (Emphasis
supplied)
Under this article, one is allowed to use pen names or stage name, an
idea which was reiterated in C.A. 142, as amended by RA 6085,
allowing the use of pseudonym in literary and/or other entertainment
purposes. This provision implies that the test to know whether a
pseudonym may be used under Philippine jurisdiction may be divided
into two phases.
90 Id.
91 See, AMENDED ANTI-ALIAS LAW 1 .
92 Id.
93 Id.
94 SeeCIVILCODE,art379.
95Id.
24
96Ursua,256SCRAat154.
25
CHAPTER V
Anonymity
Current
Online
Use
of
Pseudonymity
and
26
106JillianYork,TheRighttoAnonymityisaMatterofPrivacy,availableat
https://www.eff.org/deeplinks/2012/01/rightanonymitymatterprivacy(LastaccessedJuly25,2015).
107Id.
27
28
29
30
119ARTICLE19,supranote60.
120 Id.
121Id.
122Limitations,availableathttps://www.article19.org/pages/en/limitations.html(LastaccessedJuly30,
2015).
123ICCPRhttp://www.ohchr.org/en/professionalinterest/pages/ccpr.aspx(LastaccessedJuly26,2015).
31
32
as well as a link leading to his web page where his photo is displayed
together with some other personal information. 134 The European Court
held unanimously that although online anonymity should be respected,
when such right is used to perpetrate a wrong, in this case a violation
of their Article 8 on right to respect for private and family life, then it
will not be upheld.135
134Id.
135Id.
136FreedomofExpressionandtheInternet,availableat
http://www.oas.org/en/iachr/expression/docs/reports/2014_04_08_Internet_ENG%20_WEB.pdf(Last
accessedJuly30,2015).
137Id.
138Id.
139Id.
140 Id at 59-60.
33
141Id.
142 Id.
143 Id at 60.
144 Id.
145 Id.
146 Id.
34
36
THE CHAIRMAN (REP. TINGA). I agree, Mr. Chairman, that you are
defining the newer crimes. But I also agree as was suggested earlier
that there should be an all-encompassing phrase to cover these
crimes in the Penal Code, no. Can that not be matched with a penalty
clause that would cover it as well? Instead of us going line by line
through the
THE CHAIRMAN (SEN. ANGARA). So you may just have to do that by a
reference. The same penalty imposed under the Revised Penal Code
shall be imposed on these crimes committed through computer or
computer systems.152 (Emphasis supplied)
the effects of the penalized acts to the society. Applying now these
penal laws to a world where the effects of the penalized acts are
different was never the intent of the legislature.
Likewise, the C.A. 142 was approved on 1936 and the R.A. 6085
was approved on 1969. Again, during these times, there was no
Internet yet. In fact, Internet only boomed around mid to late 90s. 158
The lawmakers were not aware of the fact that the future lawmakers
would apply the laws enacted way back there to something that did
not even exist yet at that time.
Thus, to extend the applicability of these penal laws to something,
which was different from the context to which the law was made in the
first place, is plain injustice to the people. The laws should adjust to the
present reality it is faced with, and not the other way around. These
laws, which were meant to govern only real-world actions, should not
be extended to apply to those acts done in the cyber world, because
acts done in these different worlds produce different effects.
Use of Anonymity and Pseudonymity as a form of first level privacy
When a person uses an online pseudonym, what happens is the
person avoids being discovered easily. This does not mean, however,
that the person who uses anonymity or pseudonymity is
undetectable.159 With the use of technology nowadays, everything on
the Internet may be traced.160
Thus, the privacy being exercised here is not an absolute onethat is
whenever the authorities should need to go after the anonymous
person, they can do so with the use of advanced technologies. This
means that all it takes is effort, in order for one to know the real
identity of the other. The effect of using a pseudonym in real life differs
from using pseudonyms online, as using a fictitious identity online only
protects a person up to a certain level. A normal Internet user, should
the transaction or interaction with another person be far from risky or
confidential, would not anyway waste his/her time finding out who the
person behind the anonymous post or pseudonym is.
158SteveCase,SteveCase:TheCompleteHistoryOfTheInternet'sBoom,Bust,BoomCycle,
availableathttp://www.businessinsider.com.au/whatfactorsledtotheburstingoftheinternetbubbleof
thelate90s20111(LastaccessedJuly25,2015).
159 Jacob Palme & Mikael Berglund, Anonymity on the Internet, available at
http://dsv.su.se/jpalme/society/anonymity.pdf (Last accessed July 30, 2015).
160 Id.
38
With this, to provide a blanket provision stating that the RPC and
special penal laws, which are made originally to contemplate acts done
in real life, be made applicable in online transactions and interactions
is a blatant mistake.
Creation and Determination of Ones Online Identity
In accordance with the principle set by the State, full disclosure
may not always be necessary and may be set aside if done to exercise
ones constitutional right, in this case, the right to privacy and freedom
of expression. Although there is a possibility of using this right in
furtherance of doing a wrong, such as cyber trolling and fraud
perpetration, such instances are just a fraction of the whole picture,
and there are many other reasons why people choose to remain
anonymous or use pseudonyms online. Therefore, it is unjust to
suppress the exercise of right to privacy and freedom of expression of
the people because of these instances.
The creation and determination of ones online identity, one that
is separate and distinct from ones real identity, is often used as ones
expression of his alter ego, or repressed feelings. While creating an
alter ego in the real business setting is against the law, one cannot say
that the same holds true for online expression. It is and it was never a
wrong to find a means of expressing ones self, if done without the
intention of doing and without causing harm unto other people, at least
on a significant level.
On legitimate registration of Pseudonyms
One may argue that the law did not necessarily prohibit the use
of pseudonyms, for as long as they register it with the civil registrar.
The law provides,
Sec. 2. Any person desiring to use an alias shall apply for authority
therefor in proceedings like those legally provided to obtain
judicial authority for a change of name, and no person shall be
allowed to secure such judicial authority for more than one alias. The
petition for an alias shall set forth the person's baptismal and family
name and the name recorded in the civil registry, if different, his
immigrant's name, if an alien, and his pseudonym, if he has such
names other than his original or real name, specifying the reason
or reasons for the use of the desired alias. The judicial authority
for the use of alias the Christian name and the alien immigrant's
name shall be recorded in the proper local civil registry, and no
person shall use any name or names other, than his original or real
39
161SeeANTIALIASLAWAMENDMENT2.
40
41
The current laws in the Philippines does not explicitly say that
one has a right to create an online identity different from ones real life
identity. However, as the technology evolves and as it becomes a huge
part of peoples lives, the need for the extension of right to privacy and
freedom of expression of the people to their activities done online has
becoming more apparent.
In Canada, the court has already recognized the need to
explicitly pronounce that people has indeed the right to online
anonymity by its pronouncement in the case of R v. Spencer.162 Its
decision has been tagged as the landmark case for peoples right to
online anonymity. It provided that,
Informational privacy is often equated with secrecy or confidentiality,
and also includes the related but wider notion of control over, access
to and use of information. However, particularly important in the
context of Internet usage is the understanding of privacy as
anonymity. The identity of a person linked to their use of the
Internet must be recognized as giving rise to a privacy interest
beyond that inherent in the persons name, address and telephone
number found in the subscriber information.
xxx
Some degree of anonymity is a feature of much Internet activity
and depending on the totality of the circumstances, anonymity may
be the foundation of a privacy interest that engages
constitutional protection against unreasonable search and
seizure.163 (Emphasis supplied)
The court of Canada has recognized the fact the one of the essential
parts of Internet usage is the capacity of people to be anonymous. It is
a method of exercising ones privacy online, and not necessarily done
to do a wrong.
In this light, the author recommends that our legislature take a proactive part in the recognition of this specific right, in furtherance and
pursuant to the constitutional guarantee of right to privacy and
freedom of expression.
However, it is good to note that this right, just like any other
right, is not absolute. If a person uses this right to perpetrate a wrong,
do injustice unto others or cause injury to others, then he/she should
be liable for the damage, which resulted from his/her own acts, either
162JacobGershman,CanadiansHaveaRighttoOnlineAnonymity,NationsTopCourtRules,
availableathttp://blogs.wsj.com/law/2014/06/13/canadianshavearighttoonlineanonymitynationstop
courtrules/(LastaccessedJuly30,2015).
163R.v.Spencer,2014SCC43,(2014).
42
43
in
164 DisiniJr,723SCRAat136.
44