Você está na página 1de 20

1

V. Privacy of Communications and Correspondence listening to and recording the petitioner’s words violated the privacy upon
which he justifiably relied on while using the telephone booth.
1. KATZ vs. UNITED STATES
Argued October 17, 1967. –Decided December 18, 1967
Justice Black’s Dissenting Opinion:

Facts:
Justice Black agreed that eavesdropping carried on through electronic
Katz, herein petitioner, was convicted under an eight-count indictment, means or wiretapping constitutes a search and seizure. However, he opines
charging him of transmitting wagering information by telephone across state that the opinion upon the decision differs sharply from the case of Berger vs.
lines, and it was said to be in violation of a federal statute. This conversation New York, which held a New York statute authorizing wiretapping on warrants
was heard by FBI agents, who had attached an electronic listening device issued by magistrates on showings of probable cause, as void on its face.
inside the telephone booth that Katz had used for his phone calls. The tapped
audio was used at Katz’s trial. The Court of Appeals affirmed the decision of He does not agree with the Court’s interpretation of the Fourth
the trial court, finding that the Fourth Amendment was not violation and that Amendment, stating the: (1) He does not believe that the words of the
there was “no physical entrance into the area occupied” by Katz. Amendment will bear the meaning given them on the decision of this case, and
(2) He does not believe that it is the proper role of the Court to rewrite the
Amendment in order to “bring it into harmony with the times,” and thus reach
Issue: a result many people believe to be desirable.

Whether a public telephone booth is a constitutionally protected area


so that evidence obtained by attaching an electronic listening recording device The text of the Fourth Amendment is as follows: “The right of people
to the booth is in violation of the right to privacy of the user of the booth. to be secure in their persons, houses, papers, and effects, against
unreasonable searches and seizures, shall not be violated, and no Warrants
shall issue, but upon probable cause, supported by Oath or affirmation, and
Held: particularly describing the place to be searched, and the persons or things to
be seized.” The clauses, according to Justice Black, refers to tangible things,
YES. which a conversation overheard by wiretapping is not tangible and can neither
be searched nor seized. He further believes that if the Court had desired to
The Fourth Amendment of the US Constitution protects people and
outlaw or restrict the use of evidence obtained by eavesdropping, then they
not places, and what a person knowingly exposes to the public is not a subject
would have used appropriate language to do so in the Fourth Amendment.
of Fourth Amendment. However, what he seeks to preserve as private, even
in an area accessible to the public, may be constitutionally protected.
The telephone booth that Katz had used to make his calls were Lastly, the Fourth Amendment, according to Justice Black, protects
constructed of glass, and he was clearly visible even if he was inside the said privacy only to the extent that it prohibits unreasonable searches and seizures
booth. He sought to exclude the “intruding eye” or the “uninvited ear” when he of “persons, houses, papers, and effects,” and there is no general right created
entered the telephone booth, which meant that he wanted to keep his by the Amendment to give the Court an unlimited power to hold
conversations away from people who wants to listen to it and keeps it private. unconstitutional everything which affects privacy.
The Court declares that a person inside the telephone booth may rely upon
the protection of the Fourth Amendment, as when he shut it close and pays
the toll to place the call, he was entitled to assume that the words he utters will
not be revealed to the world. The Government’s activities in electronically It is based on the stated reasons above that Justice Black respectfully
dissents the Court’s decision.
2

No. Republic Act No. 4200 entitled “An Act to Prohibit and Penalize Wire
Tapping and Other Related Violations of the Privacy of Communication, and
2. SALCEDO-ORTANEZ VS COURT OF APPEALS for other purposes” expressly makes such tape recordings inadmissible in
Facts: evidence.

Private respondent Rafael Ortanez filed with the Quezon City RTC a complaint Sec. 1. It shall be unlawful for any person, not being authorized by all the
for annulment of marriage with damages against petitioner Teresita Salcedo- parties to any private communication or spoken word, to tap any wire or cable,
Ortanez, on grounds of lack of marriage license and/or psychological or by using any other device or arrangement, to secretly overhear, intercept,
incapacity of the petitioner. or record such communication or spoken word by using a device commonly
known as a dictaphone or dictagraph or detectaphone or walkie-talkie or tape-
Among the exhibits offered by private respondent were three (3) cassette recorder, or however otherwise described. . . .
tapes of alleged telephone conversations between petitioner and unidentified
persons. Sec. 4. Any communication or spoken word, or the existence, contents,
substance, purport, or meaning of the same or any part thereof, or any
Teresita submitted her Objection/Comment to Rafael’s oral offer of evidence. information therein contained, obtained or secured by any person in violation
However, the trial court admitted all of private respondent’s offered evidence of the preceding sections of this Act shall not be admissible in evidence in any
and later on denied her motion for reconsideration, prompting petitioner to file judicial, quasi-judicial, legislative or administrative hearing or investigation.
a petition for certiorari with the CA to assail the admission in evidence of the
aforementioned cassette tapes. Clearly, respondents trial court and Court of Appeals failed to consider the
afore-quoted provisions of the law in admitting in evidence the cassette tapes
These tape recordings were made and obtained when private respondent in question. Absent a clear showing that both parties to the telephone
allowed his friends from the military to wiretap his home telephone. conversations allowed the recording of the same, the inadmissibility of the
CA denied the petition because (1) Tape recordings are not inadmissible per subject tapes is mandatory under R.A. No. 4200.
se. They and any other variant thereof can be admitted in evidence for certain
purposes, depending on how they are presented and offered and on how the
trial judge utilizes them in the interest of truth and fairness and the even 3. RAMIREZ vs. COURT OF APPEALS
handed administration of justice; and (2) A petition for certiorari is notoriously
248 SCRA 590
inappropriate to rectify a supposed error in admitting evidence adduced during
trial. The ruling on admissibility is interlocutory; neither does it impinge on Facts:
jurisdiction. If it is erroneous, the ruling should be questioned in the appeal
from the judgment on the merits and not through the special civil action A civil case damages was filed by petitioner Socorro D. Ramirez in the
of certiorari. The error, assuming gratuitously that it exists, cannot be anymore Regional Trial Court of Quezon City alleging that the private respondent, Ester
than an error of law, properly correctible by appeal and not by certiorari. S. Garcia, in a confrontation in the latter's office, allegedly vexed, insulted and
humiliated her in a "hostile and furious mood" and in a manner offensive to
Petitioner then filed the present petition for review under Rule 45 of the Rules petitioner's dignity and personality," contrary to morals, good customs and
of Court. public policy."

In support of her claim, petitioner produced a verbatim transcript of the event


Issue:
and sought moral damages, attorney's fees and other expenses of litigation in
Whether or not the recordings of the telephone conversations are admissible the amount of P610,000.00, in addition to costs, interests and other reliefs
in evidence awardable at the trial court's discretion. The transcript on which the civil case
was based was culled from a tape recording of the confrontation made by
petitioner. The transcript reads as follows:
Ruling:
3

Plaintiff Soccoro D. Ramirez (Chuchi) — ESG — Nakalimutan mo na ba kung paano
Good Afternoon M'am. ka pumasok sa hotel, kung on your own merit
alam ko naman kung gaano ka "ka bobo" mo.
Defendant Ester S. Garcia (ESG) — Ano ba Marami ang nag-aaply alam kong hindi ka
ang nangyari sa 'yo, nakalimot ka na kung papasa.
paano ka napunta rito, porke member ka na,
magsumbong ka kung ano ang gagawin ko CHUCHI — Kumuha kami ng exam noon.
sa 'yo.
ESG — Oo, pero hindi ka papasa.
CHUCHI — Kasi, naka duty ako noon.
CHUCHI — Eh, bakit ako ang nakuha ni Dr.
ESG — Tapos iniwan no. (Sic) Tamayo

CHUCHI — Hindi m'am, pero ilan beses na ESG — Kukunin ka kasi ako.
nila akong binalikan, sabing ganoon —
CHUCHI — Eh, di sana —
ESG — Ito and (sic) masasabi ko sa 'yo,
ayaw kung (sic) mag explain ka, kasi ESG — Huwag mong ipagmalaki na may
hanggang 10:00 p.m., kinabukasan hindi ka utak ka kasi wala kang utak. Akala mo ba
na pumasok. Ngayon ako ang babalik sa 'yo, makukuha ka dito kung hindi ako.
nag-aaply ka sa States, nag-aaply ka sa
review mo, kung kakailanganin ang
CHUCHI — Mag-eexplain ako.
certification mo, kalimutan mo na kasi hindi
ka sa akin makakahingi.
ESG — Huwag na, hindi ako mag-papa-
explain sa 'yo, makaalala ka kung paano ka
CHUCHI — Hindi M'am. Kasi ang ano ko
puma-rito. "Putang-ina" sasabi-sabihin mo
talaga noon i-cocontinue ko up to 10:00 p.m. kamag-anak ng nanay at tatay mo ang mga
magulang ko.
ESG — Bastos ka, nakalimutan mo na kung
paano ka pumasok dito sa hotel.
ESG — Wala na akong pakialam, dahil
Magsumbong ka sa Union kung gusto mo.
nandito ka sa loob, nasa labas ka puwede ka
Nakalimutan mo na kung paano ka ng hindi pumasok, okey yan nasaloob ka
nakapasok dito "Do you think that on your
umalis ka doon.
own makakapasok ka kung hindi ako.
Panunumbyoyan na kita (Sinusumbatan na
kita). CHUCHI — Kasi M'am, binbalikan ako ng
mga taga Union.
CHUCHI — Itutuloy ko na M'am sana ang
duty ko. ESG — Nandiyan na rin ako, pero huwag
mong kalimutan na hindi ka makakapasok
kung hindi ako. Kung hindi mo kinikilala yan
ESG — Kaso ilang beses na akong
okey lang sa akin, dahil tapos ka na.
binabalikan doon ng mga no (sic) ko.
4

CHUCHI — Ina-ano ko m'am na utang na Consequently, on February 21, 1990, petitioner filed a Motion for
loob. Reconsideration which respondent Court of Appeals denied in its
Resolution dated June 19, 1990. Hence, the instant petition.
ESG — Huwag na lang, hindi mo utang na
loob, kasi kung baga sa no, nilapastangan Petitioner vigorously argues, as her "main and principal issue" that the
mo ako. applicable provision of Republic Act 4200 does not apply to the taping of a
private conversation by one of the parties to the conversation. She contends
CHUCHI — Paano kita nilapastanganan? that the provision merely refers to the unauthorized taping of a private
conversation by a party other than those involved in the communication. In
relation to this, petitioner avers that the substance or content of the
ESG — Mabuti pa lumabas ka na. Hindi na
conversation must be alleged in the Information, otherwise the facts charged
ako makikipagusap sa 'yo. Lumabas ka na.
would not constitute a violation of R.A. 4200. Finally, petitioner argues that
Magsumbong ka.
R.A. 4200 penalizes the taping of a "private communication," not a "private
conversation" and that consequently, her act of secretly taping her
As a result of petitioner's recording of the event and alleging that the said act conversation with private respondent was not illegal under the said act.
of secretly taping the confrontation was illegal, private respondent filed a
criminal case before the Regional Trial Court of Pasay City for violation of
Republic Act 4200, entitled "An Act to prohibit and penalize wire tapping and Issue:
other related violations of private communication, and other purposes."
Whether or not the said taping of the petitioner of the respondent’s voice is
Upon arraignment, in lieu of a plea, petitioner filed a Motion to Quash the illegal
Information on the ground that the facts charged do not constitute an offense,
particularly a violation of R.A. 4200. In an order May 3, 1989, the trial court Ruling:
granted the Motion to Quash, agreeing with petitioner that 1) the facts charged
do not constitute an offense under R.A. 4200; and that 2) the violation The court ruled that YES, it is illegal.
punished by R.A. 4200 refers to a the taping of a communication by a
person other than a participant to the communication. First, legislative intent is determined principally from the language of a statute.
Where the language of a statute is clear and unambiguous, the law is applied
From the trial court's Order, the private respondent filed a Petition for Review according to its express terms, and interpretation would be resorted to only
on Certiorari with this Court, which forthwith referred the case to the Court of where a literal interpretation would be either impossible or absurb or would
Appeals in a Resolution (by the First Division) of June 19, 1989. lead to an injustice.

On February 9, 1990, respondent Court of Appeals promulgated its assailed Section 1 of R.A. 4200 entitled, " An Act to Prohibit and Penalized Wire
Decision declaring the trial court's order of May 3, 1989 null and void, and Tapping and Other Related Violations of Private Communication and Other
holding that: Purposes," provides:

[T]he allegations sufficiently constitute an offense punishable Sec. 1. It shall be unlawfull for any person, not being
under Section 1 of R.A. 4200. In thus quashing the information authorized by all the parties to any private communication or
based on the ground that the facts alleged do not constitute spoken word, to tap any wire or cable, or by using any other
an offense, the respondent judge acted in grave abuse of device or arrangement, to secretly overhear, intercept, or
discretion correctible by certiorari. record such communication or spoken word by using a device
commonly known as a dictaphone or dictagraph or
5

detectaphone or walkie-talkie or tape recorder, or however communications of "meanings or thoughts" which are likely to include the
otherwise described. emotionally-charged exchange, on February 22, 1988, between petitioner and
private respondent, in the privacy of the latter's office.
The aforestated provision clearly and unequivocally makes it illegal for any
person, not authorized by all the parties to any private communication to 4. NAVARRO V. COURT OF APPEALS
secretly record such communication by means of a tape recorder. The law
makes no distinction as to whether the party sought to be penalized by the The tape is admissible in view of RA 4200, which prohibits wiretapping.
statute ought to be a party other than or different from those involved in the Jalbuena's testimony is confirmed by the voice recording he had made.
private communication. The statute's intent to penalize all persons The law prohibits the overhearing, intercepting, or recording of private
unauthorized to make such recording is underscored by the use of the qualifier communications. Since the exchange between petitioner Navarro and Lingan
"any". Consequently, as respondent Court of Appeals correctly concluded, was not private, its tape recording is not prohibited.
"even a (person) privy to a communication who records his private
conversation with another without the knowledge of the latter (will) qualify as a
violator" under this provision of R.A. 4200.
Facts:
A perusal of the Senate Congressional Records, moreover, supports the Two local media men, Stanley Jalbuena, Enrique Lingan, in Lucena City went
respondent court's conclusion that in enacting R.A. 4200 our lawmakers to the police station to report alledged indecent show in one of the night
indeed contemplated to make illegal, unauthorized tape recording of private establishment shows in the City. At the station, a heated confrontation followed
conversations or communications taken either by the parties themselves or by between victim Lingan and accused policeman Navarro who was then having
third persons. drinks outside the headquarters, lead to a fisticuffs. The victim was hit with the
handle of the accused's gun below the left eyebrow, followed by a fist blow,
Second, the nature of the conversations is immaterial to a violation of the resulted the victim to fell and died under treatment. The exchange of words
statute. The substance of the same need not be specifically alleged in the was recorded on tape, specifically the frantic exclamations made by Navarro
information. What R.A. 4200 penalizes are the acts of secretly overhearing, after the altercation that it was the victim who provoked the fight. During the
intercepting or recording private communications by means of the devices trial, Jalbuena, the other media man , testified.
enumerated therein. The mere allegation that an individual made a secret
recording of a private communication by means of a tape recorder would Navarro was charged with homicide with the RTC. The trial court convicted
suffice to constitute an offense under Section 1 of R.A. 4200. As the Solicitor him of the crime charged. Presented in evidence to confirm his testimony was
General pointed out in his COMMENT before the respondent court: "Nowhere a voice recording he had made of the heated discussion at the police station
(in the said law) is it required that before one can be regarded as a violator, between the accused police officer Navarro and the deceased, Lingan, which
the nature of the conversation, as well as its communication to a third person was taken without the knowledge of the two.
should be professed." The court admitted in evidence the recorded tape allegedly containing the
heated exchange between Navarro and the deceased Lingan in the police
Finally, petitioner's contention that the phrase "private communication" in station. The exchange in the voice recording was confirmed by the testimony
Section 1 of R.A. 4200 does not include "private conversations" narrows the of Jalbuena, one who took the recording and witness for the prosecution.
ordinary meaning of the word "communication" to a point of absurdity. The
word communicate comes from the latin word communicare, meaning "to
share or to impart." In its ordinary signification, communication connotes the
act of sharing or imparting signification, communication connotes the act of Issue: WON the tape is admissible in evidence under RA No. 4200.
sharing or imparting, as in a conversation, or signifies the "process by which
meanings or thoughts are shared between individuals through a common
system of symbols (as language signs or gestures)" These definitions are Ruling: Yes, the tape is admissible in evidence. RA No. 4200 prohibits the
broad enough to include verbal or non-verbal, written or expressive overhearing, intercepting, or recording of private communications. Since the
6

exchange between petitioner Navarro and Lingan was not private, its tape Petitioner Cecilia Zulueta is the wife of private respondent Alfredo
recording is not prohibited. Martin. On March 26, 1982, petitioner entered the clinic of her husband, a doctor
of medicine, and in the presence of her mother, a driver and private respondent's
Nor is there any question that it was duly authenticated. A voice recording is secretary, forcibly opened the drawers and cabinet in her husband's clinic and
authenticated by the testimony of a witness (1) that he personally recorded the took 157 documents consisting of private correspondence between Dr. Martin
conversations; (2) that the tape played in the court was the one he recorded; and his alleged paramours, greetings cards, cancelled checks, diaries, Dr.
and (3) that the voices on the tape are those of the persons such are claimed Martin's passport, and photographs. The documents and papers were seized for
to belong. In the instant case, Jalbuena testified that he personally made the use in evidence in a case for legal separation and for disqualification from the
voice recording; that the tape played in the court was the one he recorded; and practice of medicine which petitioner had filed against her husband.
that the speakers on the tape were petitioner Navarro and Lingan. A sufficient
Zambales Chromite Mining Corp., Inc. (ZCM, Inc.) sought to be declared the
foundation was thus laid for the authentication of the tape presented by the
rightful and
prosecution.
claims of Martinez and Pabilona. Director Gozon decided in favor of Martinez
The voice recording made by Jalbuena established: (1) that there was a
and
heated exchange between petitioner Navarro and Lingan on the placing in the
police blotter of an entry against him and Jalbuena; and (2) that some form of Issue:
violence occurred involving petitioner Navarro and Lingan, with the latter
getting the worst of it. Whether or not the documents and papers in question are inadmissible in
evidence
Ruling:
5. ZULUETA VS. COURT OF APPEALS
G.R. No. 107383 February 20, 1996 MENDOZA, J., No. Indeed the documents and papers in question are inadmissible in
evidence. The constitutional injunction declaring "the privacy of
The law insures absolute freedom of communication between the spouses by
communication and correspondence [to be] inviolable" is no less applicable
making it privileged. Neither husband nor wife may testify for or against the
simply because it is the wife (who thinks herself aggrieved by her husband's
other without the consent of the affected spouse while the marriage subsists.
infidelity) who is the party against whom the constitutional provision is to be
Neither may be examined without the consent of the other as to any
enforced. The only exception to the prohibition in the Constitution is if there is
communication received in confidence by one from the other during the
a "lawful order [from a] court or when public safety or order requires otherwise,
marriage, save for specified exceptions. But one thing is freedom of
as prescribed by law." Any violation of this provision renders the evidence
communication; quite another is a compulsion for each one to share what one
obtained inadmissible "for any purpose in any proceeding."
knows with the other. And this has nothing to do with the duty of fidelity that
each owes to the other.

The intimacies between husband and wife do not justify any one of
them in breaking the drawers and cabinets of the other and in ransacking them
Facts:
for any telltale evidence of marital infidelity. A person, by contracting marriage,
ZCM then appealed before the CFI of Zambales. The CFI affirmed the does not shed his/her integrity or his right to privacy as an individual and the
decision of Gozon. constitutional protection is ever available to him or to her.

This is a petition to review the decision of the Court of Appeals, affirming


the decision of the Regional Trial Court of Manila (Branch X) which ordered The law insures absolute freedom of communication between the
petitioner to return documents and papers taken by her from private spouses by making it privileged. Neither husband nor wife may testify for or
respondent's clinic without the latter's knowledge and consent. against the other without the consent of the affected spouse while the marriage
subsists. Neither may be examined without the consent of the other as to any
7

communication received in confidence by one from the other during the for the resignation of President Gloria Macapagal-Arroyo and several cabinet
marriage, save for specified exceptions. But one thing is freedom of members.
communication; quite another is a compulsion for each one to share what one
knows with the other. And this has nothing to do with the duty of fidelity that
each owes to the other. Around 7:00 p.m. of the same date, the soldiers voluntarily
surrendered to the authorities after several negotiations with government
emissaries. The soldiers later defused the explosive devices they had earlier
The review for petition is DENIED for lack of merit. planted. The soldiers then returned to their barracks.

On 31 July 2003, Gen. Abaya, as the Chief of Staff of the AFP, issued
a directive to all the Major Service Commanders to turn over custody of ten
6. ALEJANO V. CABUAY
junior officers to the ISAFP Detention Center. The transfer took place while
469 SCRA 168 (2005)
military and civilian authorities were investigating the soldiers involvement in
The Case: the Oakwood incident.

This petition for review seeks to nullify the Decision of the Court of
Appeals dated 17 September 2003 and Resolution dated 13 November 2003
On 1 August 2003, government prosecutors filed an Information
in CA-G.R. SP No. 78545. The Court of Appeals Decision and Resolution
for coup detat with the Regional Trial Court of Makati City, Branch 61, against
dismissed the petition for habeas corpus filed by lawyers Homobono Adaza
the soldiers involved in the 27 July 2003 Oakwood incident. The government
and Roberto Rafael Pulido (petitioners) on behalf of their detained clients
prosecutors accused the soldiers of coup detat as defined and penalized under
Capt. Gary Alejano (PN-Marines), Capt. Nicanor Faeldon (PN-Marines),
Article 134-A of the Revised Penal Code of the Philippines, as amended. The
Capt. Gerardo Gambala (PA), Lt. SG James Layug (PN), Capt. Milo
case was docketed as Criminal Case No. 03-2784. The trial court later issued
Maestrecampo (PA), and Lt. SG Antonio Trillanes IV (PN) (detainees).
the Commitment Orders giving custody of junior officers Lt. SG Antonio
Trillanes IV (Trillanes) and Capt. Gerardo Gambala to the Commanding
Officers of ISAFP.
Petitioners named as respondent Gen. Pedro Cabuay (Gen.
Cabuay), Chief of the Intelligence Service of the Armed Forces of the
Philippines (ISAFP), who has custody of the detainees. Petitioners impleaded
On 2 August 2003, Gen. Abaya issued a directive to all Major Service
Gen. Narciso Abaya (Gen. Abaya), Sec. Angelo Reyes and Roilo Golez, who
Commanders to take into custody the military personnel under their command
are respectively the Chief of Staff of the Armed Forces of the Philippines (AFP),
who took part in the Oakwood incident except the detained junior officers who
Secretary of National Defense and National Security Adviser, because they
were to remain under the custody of ISAFP.
have command responsibility over Gen. Cabuay.

On 11 August 2003, petitioners filed a petition for habeas corpus with


Facts:
the Supreme Court. On 12 August 2003, the Court issued a Resolution, which
Early morning of 27 July 2003, some 321 armed soldiers, led by the resolved to:
now detained junior officers, entered and took control of the Oakwood Premier
Luxury Apartments (Oakwood), an upscale apartment complex, located in the
business district of Makati City. The soldiers disarmed the security officers of (a) ISSUE the WRIT OF HABEAS CORPUS; (b) require
Oakwood and planted explosive devices in its immediate surroundings. The respondents to make a RETURN of the writ on Monday, 18
junior officers publicly renounced their support for the administration and called August 2003, at 10:00 a.m. before the Court of Appeals; (c)
8

refer the case to the Court of Appeals for RAFFLE among the Ruling:
Justices thereof for hearing, further proceedings and decision
thereon, after which a REPORT shall be made to this Court NO. The supreme Court doees not agree with the Court of Appeals
within ten (10) days from promulgation of the decision.
] that the opening and reading of the detainees letters in the present case
violated the detainees right to privacy of communication. The letters were not
in a sealed envelope. The inspection of the folded letters is a valid measure as
it serves the same purpose as the opening of sealed letters for the inspection
Thus, the Court issued a Writ of Habeas Corpus dated 12 August 2003 of contraband.
directing respondents to make a return of the writ and to appear and produce
the persons of the detainees before the Court of Appeals on the scheduled
date for hearing and further proceedings.
JURISPRUDENCE:

On the same date, the detainees and their other co-accused filed with
the Regional Trial Court of Makati City a Motion for Preliminary Investigation, Courts in the U.S. have generally permitted prison officials to open and
which the trial court granted. read all incoming and outgoing mail of convicted prisoners to prevent the
smuggling of contraband into the prison facility and to avert coordinated
escapes. Even in the absence of statutes specifically allowing prison
authorities from opening and inspecting mail, such practice was upheld based
On 18 August 2003, pursuant to the directives of the Court, on the principle of civil deaths. Inmates were deemed to have no right to
respondents submitted their Return of the Writ and Answer to the petition and correspond confidentially with anyone. The only restriction placed upon prison
produced the detainees before the Court of Appeals during the scheduled authorities was that the right of inspection should not be used to delay
hearing. After the parties filed their memoranda on 28 August 2003, the unreasonably the communications between the inmate and his lawyer.
appellate court considered the petition submitted for decision.

Eventually, the inmates outgoing mail to licensed attorneys, courts,


On 17 September 2003, the Court of Appeals rendered its decision and court officials received respect. The confidential correspondences could
dismissing the petition. The same declared that while the opening and reading not be censored. The infringement of such privileged communication was held
of Trillanes letter is an abhorrent violation of his right to privacy of to be a violation of the inmates First Amendment rights. A prisoner has a right
communication, this does not justify the issuance of a writ of habeas corpus. to consult with his attorney in absolute privacy, which right is not abrogated by
The violation does not amount to illegal restraint, which is the proper subject the legitimate interests of prison authorities in the administration of the
of habeas corpus proceedings. Nonetheless, the appellate court ordered Gen. institution. Moreover, the risk is small that attorneys will conspire in plots that
Cabuay, who was in charge of implementing the regulations in the ISAFP threaten prison security.
Detention Center, to uphold faithfully the rights of the detainees in accordance
with Standing Operations Procedure No. 0263-04. The appellate court directed
Gen. Cabuay to adhere to his commitment made in court regarding visiting
hours and the detainees right to exercise for two hours a day. American jurisprudence initially made a distinction between the
privacy rights enjoyed by convicted inmates and pre-trial detainees. The
case of Palmigiano v. Travisono recognized that pre-trial detainees, unlike
convicted prisoners, enjoy a limited right of privacy in communication.
Issue: Censorship of pre-trial detainees mail addressed to public officials, courts and
Whether or not the opening, inspection, and reading of the letter of the counsel was held impermissible. While incoming mail may be inspected for
detainees is an infringement of a citizen’s privacy rights. contraband and read in certain instances, outgoing mail of pre-trial detainees
could not be inspected or read at all.
9

for the furtherance of a substantial government interest such as security or
discipline. State v. Dunn declared that if complete censorship is permissible,
In the subsequent case of Wolff v. McDonnell, involving convicted then the lesser act of opening the mail and reading it is also permissible. We
prisoners, the U.S. Supreme Court held that prison officials could open in the quote State v. Dunn:
presence of the inmates incoming mail from attorneys to inmates. However,
prison officials could not read such mail from attorneys. Explained the U.S.
Supreme Court:
[A] right of privacy in traditional Fourth Amendment terms is
fundamentally incompatible with the close and continual
surveillance of inmates and their cells required to ensure
The issue of the extent to which prison authorities can open and institutional security and internal order. We are satisfied that
inspect incoming mail from attorneys to inmates, has been society would insist that the prisoners expectation of privacy
considerably narrowed in the course of this litigation. The prison always yield to what must be considered a paramount interest
regulation under challenge provided that (a)ll incoming and in institutional security. We believe that it is accepted by our
outgoing mail will be read and inspected, and no exception was society that [l]oss of freedom of choice and privacy are
made for attorney-prisoner mail. x x x inherent incidents of confinement.

In Hudson v. Palmer, the U.S. Supreme Court ruled that an inmate The distinction between the limited privacy rights of a pre-trial detainee
has no reasonable expectation of privacy inside his cell. The U.S. Supreme and a convicted inmate has been blurred as courts in the U.S. ruled that pre-
Court explained that prisoners necessarily lose many protections of the trial detainees might occasionally pose an even greater security risk than
Constitution, thus: convicted inmates. Bell v. Wolfish reasoned that those who are detained prior
to trial may in many cases be individuals who are charged with serious crimes
or who have prior records and may therefore pose a greater risk of escape
However, while persons imprisoned for crime enjoy many than convicted inmates. Valencia v. Wiggins further held that it is impractical
protections of the Constitution, it is also clear that imprisonment to draw a line between convicted prisoners and pre-trial detainees for the
carries with it the circumscription or loss of many significant purpose of maintaining jail security.
rights. These constraints on inmates, and in some cases the
complete withdrawal of certain rights, are justified by the
considerations underlying our penal system. The curtailment of American cases recognize that the unmonitored use of pre-trial
certain rights is necessary, as a practical matter, to accommodate detainees non-privileged mail poses a genuine threat to jail security. Hence,
a myriad of institutional needs and objectives of prison facilities, when a detainee places his letter in an envelope for non-privileged mail, the
chiefamong which is internal security. Of course, these detainee knowingly exposes his letter to possible inspection by jail officials. A
restrictions or retractions also serve, incidentally, as reminders pre-trial detainee has no reasonable expectation of privacy for his incoming
that, under our system of justice, deterrence and retribution are mail. However, incoming mail from lawyers of inmates enjoys limited protection
factors in addition to correction. such that prison officials can open and inspect the mail for contraband but
could not read the contents without violating the inmates right to correspond
with his lawyer. The inspection of privileged mail is limited to physical
contraband and not to verbal contraband.
7. [REPUBLIC ACT NO. 10173]
The later case of State v. Dunn, citing Hudson v. Palmer,
abandoned Palmigiano v. Travisono and made no distinction as to the
AN ACT PROTECTING INDIVIDUAL PERSONAL INFORMATION IN
detainees limited right to privacy. State v. Dunn noted the considerable INFORMATION AND COMMUNICATIONS SYSTEMS IN THE
jurisprudence in the United States holding that inmate mail may be censored GOVERNMENT AND THE PRIVATE SECTOR, CREATING FOR THIS
10

PURPOSE A NATIONAL PRIVACY COMMISSION, AND FOR OTHER (f) Information and Communications System refers to a system for
PURPOSES generating, sending, receiving, storing or otherwise processing electronic
data messages or electronic documents and includes the computer system
CHAPTER I or other similar device by or which data is recorded, transmitted or stored
GENERAL PROVISIONS and any procedure related to the recording, transmission or storage of
electronic data, electronic message, or electronic document.
SECTION 1. Short Title. – This Act shall be known as the “Data Privacy Act
of 2012”. (g) Personal information refers to any information whether recorded in a
material form or not, from which the identity of an individual is apparent or
can be reasonably and directly ascertained by the entity holding the
SEC. 2. Declaration of Policy. – It is the policy of the State to protect the
information, or when put together with other information would directly and
fundamental human right of privacy, of communication while ensuring free
flow of information to promote innovation and growth. The State recognizes certainly identify an individual.
the vital role of information and communications technology in nation-building
and its inherent obligation to ensure that personal information in information (h) Personal information controller refers to a person or organization who
and communications systems in the government and in the private sector are controls the collection, holding, processing or use of personal information,
secured and protected. including a person or organization who instructs another person or
organization to collect, hold, process, use, transfer or disclose personal
SEC. 3. Definition of Terms. – Whenever used in this Act, the following terms information on his or her behalf. The term excludes:
shall have the respective meanings hereafter set forth:
(1) A person or organization who performs such functions as instructed by
(a) Commission shall refer to the National Privacy Commission created by another person or organization; and
virtue of this Act.
(2) An individual who collects, holds, processes or uses personal information
(b) Consent of the data subject refers to any freely given, specific, informed in connection with the individual’s personal, family or household affairs.
indication of will, whereby the data subject agrees to the collection and
processing of personal information about and/or relating to him or her. (i) Personal information processor refers to any natural or juridical person
Consent shall be evidenced by written, electronic or recorded means. It may qualified to act as such under this Act to whom a personal information
also be given on behalf of the data subject by an agent specifically controller may outsource the processing of personal data pertaining to a data
authorized by the data subject to do so. subject.

(c) Data subject refers to an individual whose personal information is (j) Processing refers to any operation or any set of operations performed
processed. upon personal information including, but not limited to, the collection,
recording, organization, storage, updating or modification, retrieval,
(d) Direct marketing refers to communication by whatever means of any consultation, use, consolidation, blocking, erasure or destruction of data.
advertising or marketing material which is directed to particular individuals.
(k) Privileged information refers to any and all forms of data which under the
(e) Filing system refers to any act of information relating to natural or juridical Rules of Court and other pertinent laws constitute privileged communication.
persons to the extent that, although the information is not processed by
equipment operating automatically in response to instructions given for that (l) Sensitive personal information refers to personal information:
purpose, the set is structured, either by reference to individuals or by
reference to criteria relating to individuals, in such a way that specific (1) About an individual’s race, ethnic origin, marital status, age, color, and
information relating to a particular person is readily accessible. religious, philosophical or political affiliations;
11

(2) About an individual’s health, education, genetic or sexual life of a person, (c) Information relating to any discretionary benefit of a financial nature such
or to any proceeding for any offense committed or alleged to have been as the granting of a license or permit given by the government to an
committed by such person, the disposal of such proceedings, or the individual, including the name of the individual and the exact nature of the
sentence of any court in such proceedings; benefit;

(3) Issued by government agencies peculiar to an individual which includes, (d) Personal information processed for journalistic, artistic, literary or
but not limited to, social security numbers, previous or current health records, research purposes;
licenses or its denials, suspension or revocation, and tax returns; and
(e) Information necessary in order to carry out the functions of public
(4) Specifically established by an executive order or an act of Congress to be authority which includes the processing of personal data for the performance
kept classified. by the independent, central monetary authority and law enforcement and
regulatory agencies of their constitutionally and statutorily mandated
SEC. 4. Scope. – This Act applies to the processing of all types of personal functions. Nothing in this Act shall be construed as to have amended or
information and to any natural and juridical person involved in personal repealed Republic Act No. 1405, otherwise known as the Secrecy of Bank
information processing including those personal information controllers and Deposits Act; Republic Act No. 6426, otherwise known as the Foreign
processors who, although not found or established in the Philippines, use Currency Deposit Act; and Republic Act No. 9510, otherwise known as the
equipment that are located in the Philippines, or those who maintain an Credit Information System Act (CISA);
office, branch or agency in the Philippines subject to the immediately
succeeding paragraph: Provided, That the requirements of Section 5 are (f) Information necessary for banks and other financial institutions under the
complied with. jurisdiction of the independent, central monetary authority or Bangko Sentral
ng Pilipinas to comply with Republic Act No. 9510, and Republic Act No.
This Act does not apply to the following: 9160, as amended, otherwise known as the Anti-Money Laundering Act and
other applicable laws; and
(a) Information about any individual who is or was an officer or employee of a
government institution that relates to the position or functions of the (g) Personal information originally collected from residents of foreign
individual, including: jurisdictions in accordance with the laws of those foreign jurisdictions,
including any applicable data privacy laws, which is being processed in the
(1) The fact that the individual is or was an officer or employee of the Philippines.
government institution;
SEC. 5. Protection Afforded to Journalists and Their Sources. – Nothing in
this Act shall be construed as to have amended or repealed the provisions of
(2) The title, business address and office telephone number of the individual;
Republic Act No. 53, which affords the publishers, editors or duly accredited
reporters of any newspaper, magazine or periodical of general circulation
(3) The classification, salary range and responsibilities of the position held by protection from being compelled to reveal the source of any news report or
the individual; and information appearing in said publication which was related in any confidence
to such publisher, editor, or reporter.
(4) The name of the individual on a document prepared by the individual in
the course of employment with the government; SEC. 6. Extraterritorial Application. – This Act applies to an act done or
practice engaged in and outside of the Philippines by an entity if:
(b) Information about an individual who is or was performing service under
contract for a government institution that relates to the services performed, (a) The act, practice or processing relates to personal information about a
including the terms of the contract, and the name of the individual given in Philippine citizen or a resident;
the course of the performance of those services;
12

(b) The entity has a link with the Philippines, and the entity is processing and to collect the information necessary to perform its functions under this
personal information in the Philippines or even if the processing is outside Act;
the Philippines as long as it is about Philippine citizens or residents such as,
but not limited to, the following: (c) Issue cease and desist orders, impose a temporary or permanent ban on
the processing of personal information, upon finding that the processing will
(1) A contract is entered in the Philippines; be detrimental to national security and public interest;

(2) A juridical entity unincorporated in the Philippines but has central (d) Compel or petition any entity, government agency or instrumentality to
management and control in the country; and abide by its orders or take action on a matter affecting data privacy;

(3) An entity that has a branch, agency, office or subsidiary in the Philippines (e) Monitor the compliance of other government agencies or instrumentalities
and the parent or affiliate of the Philippine entity has access to personal on their security and technical measures and recommend the necessary
information; and action in order to meet minimum standards for protection of personal
information pursuant to this Act;
(c) The entity has other links in the Philippines such as, but not limited to:
(f) Coordinate with other government agencies and the private sector on
(1) The entity carries on business in the Philippines; and efforts to formulate and implement plans and policies to strengthen the
protection of personal information in the country;
(2) The personal information was collected or held by an entity in the
Philippines. (g) Publish on a regular basis a guide to all laws relating to data protection;

CHAPTER II (h) Publish a compilation of agency system of records and notices, including
THE NATIONAL PRIVACY COMMISSION index and other finding aids;

SEC. 7. Functions of the National Privacy Commission. – To administer and (i) Recommend to the Department of Justice (DOJ) the prosecution and
implement the provisions of this Act, and to monitor and ensure compliance imposition of penalties specified in Sections 25 to 29 of this Act;
of the country with international standards set for data protection, there is
hereby created an independent body to be known as the National Privacy (j) Review, approve, reject or require modification of privacy codes voluntarily
Commission, winch shall have the following functions: adhered to by personal information controllers:Provided, That the privacy
codes shall adhere to the underlying data privacy principles embodied in this
(a) Ensure compliance of personal information controllers with the provisions Act: Provided, further,That such privacy codes may include private dispute
of this Act; resolution mechanisms for complaints against any participating personal
information controller. For this purpose, the Commission shall consult with
relevant regulatory agencies in the formulation and administration of privacy
(b) Receive complaints, institute investigations, facilitate or enable settlement
codes applying the standards set out in this Act, with respect to the persons,
of complaints through the use of alternative dispute resolution processes,
entities, business activities and business sectors that said regulatory bodies
adjudicate, award indemnity on matters affecting any personal information,
prepare reports on disposition of complaints and resolution of any are authorized to principally regulate pursuant to the law: Provided,
investigation it initiates, and, in cases it deems appropriate, publicize any finally. That the Commission may review such privacy codes and require
such report: Provided, That in resolving any complaint or investigation changes thereto for purposes of complying with this Act;
(except where amicable settlement is reached by the parties), the
Commission shall act as a collegial body. For this purpose, the Commission (k) Provide assistance on matters relating to privacy or data protection at the
may be given access to personal information that is subject of any complaint request of a national or local agency, a private entity or any person;
13

(l) Comment on the implication on data privacy of proposed national or local The Deputy Privacy Commissioners must be recognized experts in the field
statutes, regulations or procedures, issue advisory opinions and interpret the of information and communications technology and data privacy. They shall
provisions of this Act and other data privacy laws; enjoy the benefits, privileges and emoluments equivalent to the rank of
Undersecretary.
(m) Propose legislation, amendments or modifications to Philippine laws on
privacy or data protection as may be necessary; The Privacy Commissioner, the Deputy Commissioners, or any person acting
on their behalf or under their direction, shall not be civilly liable for acts done
(n) Ensure proper and effective coordination with data privacy regulators in in good faith in the performance of their duties. However, he or she shall be
other countries and private accountability agents, participate in international liable for willful or negligent acts done by him or her which are contrary to
and regional initiatives for data privacy protection; law, morals, public policy and good customs even if he or she acted under
orders or instructions of superiors: Provided, That in case a lawsuit is filed
against such official on the subject of the performance of his or her duties,
(o) Negotiate and contract with other data privacy authorities of other
where such performance is lawful, he or she shall be reimbursed by the
countries for cross-border application and implementation of respective
Commission for reasonable costs of litigation.
privacy laws;

SEC. 10. The Secretariat. – The Commission is hereby authorized to


(p) Assist Philippine companies doing business abroad to respond to foreign
establish a Secretariat. Majority of the members of the Secretariat must have
privacy or data protection laws and regulations; and
served for at least five (5) years in any agency of the government that is
involved in the processing of personal information including, but not limited
(q) Generally perform such acts as may be necessary to facilitate cross- to, the following offices: Social Security System (SSS), Government Service
border enforcement of data privacy protection. Insurance System (GSIS), Land Transportation Office (LTO), Bureau of
Internal Revenue (BIR), Philippine Health Insurance Corporation
SEC. 8. Confidentiality. – The Commission shall ensure at all times the (PhilHealth), Commission on Elections (COMELEC), Department of Foreign
confidentiality of any personal information that comes to its knowledge and Affairs (DFA), Department of Justice (DOJ), and Philippine Postal
possession. Corporation (Philpost).

SEC. 9. Organizational Structure of the Commission. – The Commission CHAPTER III


shall be attached to the Department of Information and Communications PROCESSING OF PERSONAL INFORMATION
Technology (DICT) and shall be headed by a Privacy Commissioner, who
shall also act as Chairman of the Commission. The Privacy Commissioner SEC. 11. General Data Privacy Principles. – The processing of personal
shall be assisted by two (2) Deputy Privacy Commissioners, one to be information shall be allowed, subject to compliance with the requirements of
responsible for Data Processing Systems and one to be responsible for this Act and other laws allowing disclosure of information to the public and
Policies and Planning. The Privacy Commissioner and the two (2) Deputy adherence to the principles of transparency, legitimate purpose and
Privacy Commissioners shall be appointed by the President of the proportionality.
Philippines for a term of three (3) years, and may be reappointed for another
term of three (3) years. Vacancies in the Commission shall be filled in the
Personal information must, be:,
same manner in which the original appointment was made.

(a) Collected for specified and legitimate purposes determined and declared
The Privacy Commissioner must be at least thirty-five (35) years of age and
of good moral character, unquestionable integrity and known probity, and a before, or as soon as reasonably practicable after collection, and later
recognized expert in the field of information technology and data privacy. The processed in a way compatible with such declared, specified and legitimate
Privacy Commissioner shall enjoy the benefits, privileges and emoluments purposes only;
equivalent to the rank of Secretary.
(b) Processed fairly and lawfully;
14

(c) Accurate, relevant and, where necessary for purposes for which it is to be functions of public authority which necessarily includes the processing of
used the processing of personal information, kept up to date; inaccurate or personal data for the fulfillment of its mandate; or
incomplete data must be rectified, supplemented, destroyed or their further
processing restricted; (f) The processing is necessary for the purposes of the legitimate interests
pursued by the personal information controller or by a third party or parties to
(d) Adequate and not excessive in relation to the purposes for which they are whom the data is disclosed, except where such interests are overridden by
collected and processed; fundamental rights and freedoms of the data subject which require protection
under the Philippine Constitution.
(e) Retained only for as long as necessary for the fulfillment of the purposes
for which the data was obtained or for the establishment, exercise or defense SEC. 13. Sensitive Personal Information and Privileged Information. – The
of legal claims, or for legitimate business purposes, or as provided by law; processing of sensitive personal information and privileged information shall
and be prohibited, except in the following cases:

(f) Kept in a form which permits identification of data subjects for no longer (a) The data subject has given his or her consent, specific to the purpose
than is necessary for the purposes for which the data were collected and prior to the processing, or in the case of privileged information, all parties to
processed: Provided, That personal information collected for other purposes the exchange have given their consent prior to processing;
may lie processed for historical, statistical or scientific purposes, and in
cases laid down in law may be stored for longer periods: Provided, (b) The processing of the same is provided for by existing laws and
further,That adequate safeguards are guaranteed by said laws authorizing regulations: Provided, That such regulatory enactments guarantee the
their processing. protection of the sensitive personal information and the privileged
information: Provided, further, That the consent of the data subjects are not
The personal information controller must ensure implementation of personal required by law or regulation permitting the processing of the sensitive
information processing principles set out herein. personal information or the privileged information;

SEC. 12. Criteria for Lawful Processing of Personal Information. – The (c) The processing is necessary to protect the life and health of the data
processing of personal information shall be permitted only if not otherwise subject or another person, and the data subject is not legally or physically
prohibited by law, and when at least one of the following conditions exists: able to express his or her consent prior to the processing;

(a) The data subject has given his or her consent; (d) The processing is necessary to achieve the lawful and noncommercial
objectives of public organizations and their associations: Provided, That such
(b) The processing of personal information is necessary and is related to the processing is only confined and related to the bona fide members of these
fulfillment of a contract with the data subject or in order to take steps at the organizations or their associations: Provided, further, That the sensitive
request of the data subject prior to entering into a contract; personal information are not transferred to third parties: Provided,
finally, That consent of the data subject was obtained prior to processing;
(c) The processing is necessary for compliance with a legal obligation to
which the personal information controller is subject; (e) The processing is necessary for purposes of medical treatment, is carried
out by a medical practitioner or a medical treatment institution, and an
(d) The processing is necessary to protect vitally important interests of the adequate level of protection of personal information is ensured; or
data subject, including life and health;
(f) The processing concerns such personal information as is necessary for
the protection of lawful rights and interests of natural or legal persons in court
(e) The processing is necessary in order to respond to national emergency,
to comply with the requirements of public order and safety, or to fulfill
15

proceedings, or the establishment, exercise or defense of legal claims, or (6) The identity and contact details of the personal information controller or
when provided to government or public authority. its representative;

SEC. 14. Subcontract of Personal Information. – A personal information (7) The period for which the information will be stored; and
controller may subcontract the processing of personal
information: Provided, That the personal information controller shall be (8) The existence of their rights, i.e., to access, correction, as well as the
responsible for ensuring that proper safeguards are in place to ensure the right to lodge a complaint before the Commission.
confidentiality of the personal information processed, prevent its use for
unauthorized purposes, and generally, comply with the requirements of this
Any information supplied or declaration made to the data subject on these
Act and other laws for processing of personal information. The personal
matters shall not be amended without prior notification of data
information processor shall comply with all the requirements of this Act and
subject: Provided, That the notification under subsection (b) shall not apply
other applicable laws. should the personal information be needed pursuant to a subpoena or when
the collection and processing are for obvious purposes, including when it is
SEC. 15. Extension of Privileged Communication. – Personal information necessary for the performance of or in relation to a contract or service or
controllers may invoke the principle of privileged communication over when necessary or desirable in the context of an employer-employee
privileged information that they lawfully control or process. Subject to existing relationship, between the collector and the data subject, or when the
laws and regulations, any evidence gathered on privileged information is information is being collected and processed as a result of legal obligation;
inadmissible.
(c) Reasonable access to, upon demand, the following:
CHAPTER IV
RIGHTS OF THE DATA SUBJECT
(1) Contents of his or her personal information that were processed;

SEC. 16. Rights of the Data Subject. – The data subject is entitled to:
(2) Sources from which personal information were obtained;

(a) Be informed whether personal information pertaining to him or her shall


(3) Names and addresses of recipients of the personal information;
be, are being or have been processed;
(4) Manner by which such data were processed;
(b) Be furnished the information indicated hereunder before the entry of his
or her personal information into the processing system of the personal
information controller, or at the next practical opportunity: (5) Reasons for the disclosure of the personal information to recipients;

(1) Description of the personal information to be entered into the system; (6) Information on automated processes where the data will or likely to be
made as the sole basis for any decision significantly affecting or will affect
the data subject;
(2) Purposes for which they are being or are to be processed;
(7) Date when his or her personal information concerning the data subject
(3) Scope and method of the personal information processing;
were last accessed and modified; and

(4) The recipients or classes of recipients to whom they are or may be


(8) The designation, or name or identity and address of the personal
disclosed;
information controller;

(5) Methods utilized for automated access, if the same is allowed by the data
subject, and the extent to which such access is authorized;
16

(d) Dispute the inaccuracy or error in the personal information and have the confidentiality and shall be used only for the declared purpose. Likewise, the
personal information controller correct it immediately and accordingly, unless immediately preceding sections are not applicable to processing of personal
the request is vexatious or otherwise unreasonable. If the personal information gathered for the purpose of investigations in relation to any
information have been corrected, the personal information controller shall criminal, administrative or tax liabilities of a data subject.
ensure the accessibility of both the new and the retracted information and the
simultaneous receipt of the new and the retracted information by recipients CHAPTER V
thereof: Provided, That the third parties who have previously received such SECURITY OF PERSONAL INFORMATION
processed personal information shall he informed of its inaccuracy and its
rectification upon reasonable request of the data subject; SEC. 20. Security of Personal Information. – (a) The personal information
controller must implement reasonable and appropriate organizational,
(e) Suspend, withdraw or order the blocking, removal or destruction of his or physical and technical measures intended for the protection of personal
her personal information from the personal information controller’s filing information against any accidental or unlawful destruction, alteration and
system upon discovery and substantial proof that the personal information disclosure, as well as against any other unlawful processing.
are incomplete, outdated, false, unlawfully obtained, used for unauthorized
purposes or are no longer necessary for the purposes for which they were (b) The personal information controller shall implement reasonable and
collected. In this case, the personal information controller may notify third appropriate measures to protect personal information against natural
parties who have previously received such processed personal information;
dangers such as accidental loss or destruction, and human dangers such as
and unlawful access, fraudulent misuse, unlawful destruction, alteration and
contamination.
(f) Be indemnified for any damages sustained due to such inaccurate,
incomplete, outdated, false, unlawfully obtained or unauthorized use of
(c) The determination of the appropriate level of security under this section
personal information. must take into account the nature of the personal information to be protected,
the risks represented by the processing, the size of the organization and
SEC. 17. Transmissibility of Rights of the Data Subject. – The lawful heirs complexity of its operations, current data privacy best practices and the cost
and assigns of the data subject may invoke the rights of the data subject for, of security implementation. Subject to guidelines as the Commission may
which he or she is an heir or assignee at any time after the death of the data issue from time to time, the measures implemented must include:
subject or when the data subject is incapacitated or incapable of exercising
the rights as enumerated in the immediately preceding section. (1) Safeguards to protect its computer network against accidental, unlawful
or unauthorized usage or interference with or hindering of their functioning or
SEC. 18. Right to Data Portability. – The data subject shall have the right, availability;
where personal information is processed by electronic means and in a
structured and commonly used format, to obtain from the personal
(2) A security policy with respect to the processing of personal information;
information controller a copy of data undergoing processing in an electronic
or structured format, which is commonly used and allows for further use by
the data subject. The Commission may specify the electronic format referred (3) A process for identifying and accessing reasonably foreseeable
to above, as well as the technical standards, modalities and procedures for vulnerabilities in its computer networks, and for taking preventive, corrective
their transfer. and mitigating action against security incidents that can lead to a security
breach; and
SEC. 19. Non-Applicability. – The immediately preceding sections are not
applicable if the processed personal information are used only for the needs (4) Regular monitoring for security breaches and a process for taking
of scientific and statistical research and, on the basis of such, no activities preventive, corrective and mitigating action against security incidents that
are carried out and no decisions are taken regarding the data can lead to a security breach.
subject: Provided, That the personal information shall be held under strict
17

(d) The personal information controller must further ensure that third parties whether domestically or internationally, subject to cross-border arrangement
processing personal information on its behalf shall implement the security and cooperation.
measures required by this provision.
(a) The personal information controller is accountable for complying with the
(e) The employees, agents or representatives of a personal information requirements of this Act and shall use contractual or other reasonable means
controller who are involved in the processing of personal information shall to provide a comparable level of protection while the information are being
operate and hold personal information under strict confidentiality if the processed by a third party.
personal information are not intended for public disclosure. This obligation
shall continue even after leaving the public service, transfer to another (b) The personal information controller shall designate an individual or
position or upon termination of employment or contractual relations. individuals who are accountable for the organization’s compliance with this
Act. The identity of the individual(s) so designated shall be made known to
(f) The personal information controller shall promptly notify the Commission any data subject upon request.
and affected data subjects when sensitive personal information or other
information that may, under the circumstances, be used to enable identity CHAPTER VII
fraud are reasonably believed to have been acquired by an unauthorized SECURITY OF SENSITIVE PERSONAL
person, and the personal information controller or the Commission believes INFORMATION IN GOVERNMENT
(bat such unauthorized acquisition is likely to give rise to a real risk of serious
harm to any affected data subject. The notification shall at least describe the
SEC. 22. Responsibility of Heads of Agencies. – All sensitive personal
nature of the breach, the sensitive personal information possibly involved,
information maintained by the government, its agencies and instrumentalities
and the measures taken by the entity to address the breach. Notification may shall be secured, as far as practicable, with the use of the most appropriate
be delayed only to the extent necessary to determine the scope of the
standard recognized by the information and communications technology
breach, to prevent further disclosures, or to restore reasonable integrity to
industry, and as recommended by the Commission. The head of each
the information and communications system. government agency or instrumentality shall be responsible for complying with
the security requirements mentioned herein while the Commission shall
(1) In evaluating if notification is unwarranted, the Commission may take into monitor the compliance and may recommend the necessary action in order
account compliance by the personal information controller with this section to satisfy the minimum standards.
and existence of good faith in the acquisition of personal information.
SEC. 23. Requirements Relating to Access by Agency Personnel to
(2) The Commission may exempt a personal information controller from Sensitive Personal Information. – (a) On-site and Online Access – Except as
notification where, in its reasonable judgment, such notification would not be may be allowed through guidelines to be issued by the Commission, no
in the public interest or in the interests of the affected data subjects. employee of the government shall have access to sensitive personal
information on government property or through online facilities unless the
(3) The Commission may authorize postponement of notification where it employee has received a security clearance from the head of the source
may hinder the progress of a criminal investigation related to a serious agency.
breach.
(b) Off-site Access – Unless otherwise provided in guidelines to be issued by
CHAPTER VI the Commission, sensitive personal information maintained by an agency
ACCOUNTABILITY FOR TRANSFER OF PERSONAL INFORMATION may not be transported or accessed from a location off government property
unless a request for such transportation or access is submitted and approved
SEC. 21. Principle of Accountability. – Each personal information controller is by the head of the agency in accordance with the following guidelines:
responsible for personal information under its control or custody, including
information that have been transferred to a third party for processing, (1) Deadline for Approval or Disapproval – In the case of any request
submitted to the head of an agency, such head of the agency shall approve
18

or disapprove the request within two (2) business days after the date of SEC. 26. Accessing Personal Information and Sensitive Personal Information
submission of the request. In case there is no action by the head of the Due to Negligence. – (a) Accessing personal information due to negligence
agency, then such request is considered disapproved; shall be penalized by imprisonment ranging from one (1) year to three (3)
years and a fine of not less than Five hundred thousand pesos
(2) Limitation to One thousand (1,000) Records – If a request is approved, (Php500,000.00) but not more than Two million pesos (Php2,000,000.00)
the head of the agency shall limit the access to not more than one thousand shall be imposed on persons who, due to negligence, provided access to
(1,000) records at a time; and personal information without being authorized under this Act or any existing
law.
(3) Encryption – Any technology used to store, transport or access sensitive
personal information for purposes of off-site access approved under this (b) Accessing sensitive personal information due to negligence shall be
subsection shall be secured by the use of the most secure encryption penalized by imprisonment ranging from three (3) years to six (6) years and a
standard recognized by the Commission. fine of not less than Five hundred thousand pesos (Php500,000.00) but not
more than Four million pesos (Php4,000,000.00) shall be imposed on
persons who, due to negligence, provided access to personal information
The requirements of this subsection shall be implemented not later than six
(6) months after the date of the enactment of this Act. without being authorized under this Act or any existing law.

SEC. 27. Improper Disposal of Personal Information and Sensitive Personal


SEC. 24. Applicability to Government Contractors. – In entering into any
Information. – (a) The improper disposal of personal information shall be
contract that may involve accessing or requiring sensitive personal
penalized by imprisonment ranging from six (6) months to two (2) years and
information from one thousand (1,000) or more individuals, an agency shall
require a contractor and its employees to register their personal information a fine of not less than One hundred thousand pesos (Php100,000.00) but not
more than Five hundred thousand pesos (Php500,000.00) shall be imposed
processing system with the Commission in accordance with this Act and to
on persons who knowingly or negligently dispose, discard or abandon the
comply with the other provisions of this Act including the immediately
personal information of an individual in an area accessible to the public or
preceding section, in the same manner as agencies and government
has otherwise placed the personal information of an individual in its container
employees comply with such requirements.
for trash collection.
CHAPTER VIII
(b) The improper disposal of sensitive personal information shall be
PENALTIES
penalized by imprisonment ranging from one (1) year to three (3) years and a
fine of not less than One hundred thousand pesos (Php100,000.00) but not
SEC. 25. Unauthorized Processing of Personal Information and Sensitive more than One million pesos (Php1,000,000.00) shall be imposed on
Personal Information. – (a) The unauthorized processing of personal persons who knowingly or negligently dispose, discard or abandon the
information shall be penalized by imprisonment ranging from one (1) year to personal information of an individual in an area accessible to the public or
three (3) years and a fine of not less than Five hundred thousand pesos has otherwise placed the personal information of an individual in its container
(Php500,000.00) but not more than Two million pesos (Php2,000,000.00) for trash collection.
shall be imposed on persons who process personal information without the
consent of the data subject, or without being authorized under this Act or any
SEC. 28. Processing of Personal Information and Sensitive Personal
existing law.
Information for Unauthorized Purposes. – The processing of personal
information for unauthorized purposes shall be penalized by imprisonment
(b) The unauthorized processing of personal sensitive information shall be ranging from one (1) year and six (6) months to five (5) years and a fine of
penalized by imprisonment ranging from three (3) years to six (6) years and a not less than Five hundred thousand pesos (Php500,000.00) but not more
fine of not less than Five hundred thousand pesos (Php500,000.00) but not than One million pesos (Php1,000,000.00) shall be imposed on persons
more than Four million pesos (Php4,000,000.00) shall be imposed on processing personal information for purposes not authorized by the data
persons who process personal information without the consent of the data subject, or otherwise authorized under this Act or under existing laws.
subject, or without being authorized under this Act or any existing law.
19

The processing of sensitive personal information for unauthorized purposes (b) Any personal information controller or personal information processor or
shall be penalized by imprisonment ranging from two (2) years to seven (7) any of its officials, employees or agents, who discloses to a third party
years and a fine of not less than Five hundred thousand pesos sensitive personal information not covered by the immediately preceding
(Php500,000.00) but not more than Two million pesos (Php2,000,000.00) section without the consent of the data subject, shall be subject to
shall be imposed on persons processing sensitive personal information for imprisonment ranging from three (3) years to five (5) years and a fine of not
purposes not authorized by the data subject, or otherwise authorized under less than Five hundred thousand pesos (Php500,000.00) but not more than
this Act or under existing laws. Two million pesos (Php2,000,000.00).

SEC. 29. Unauthorized Access or Intentional Breach. – The penalty of SEC. 33. Combination or Series of Acts. – Any combination or series of acts
imprisonment ranging from one (1) year to three (3) years and a fine of not as defined in Sections 25 to 32 shall make the person subject to
less than Five hundred thousand pesos (Php500,000.00) but not more than imprisonment ranging from three (3) years to six (6) years and a fine of not
Two million pesos (Php2,000,000.00) shall be imposed on persons who less than One million pesos (Php1,000,000.00) but not more than Five million
knowingly and unlawfully, or violating data confidentiality and security data pesos (Php5,000,000.00).
systems, breaks in any way into any system where personal and sensitive
personal information is stored. SEC. 34. Extent of Liability. – If the offender is a corporation, partnership or
any juridical person, the penalty shall be imposed upon the responsible
SEC. 30. Concealment of Security Breaches Involving Sensitive Personal officers, as the case may be, who participated in, or by their gross
Information. – The penalty of imprisonment of one (1) year and six (6) negligence, allowed the commission of the crime. If the offender is a juridical
months to five (5) years and a fine of not less than Five hundred thousand person, the court may suspend or revoke any of its rights under this Act. If
pesos (Php500,000.00) but not more than One million pesos the offender is an alien, he or she shall, in addition to the penalties herein
(Php1,000,000.00) shall be imposed on persons who, after having prescribed, be deported without further proceedings after serving the
knowledge of a security breach and of the obligation to notify the penalties prescribed. If the offender is a public official or employee and lie or
Commission pursuant to Section 20(f), intentionally or by omission conceals she is found guilty of acts penalized under Sections 27 and 28 of this Act, he
the fact of such security breach. or she shall, in addition to the penalties prescribed herein, suffer perpetual or
temporary absolute disqualification from office, as the case may be.
SEC. 31. Malicious Disclosure. – Any personal information controller or
personal information processor or any of its officials, employees or agents, SEC. 35. Large-Scale. – The maximum penalty in the scale of penalties
who, with malice or in bad faith, discloses unwarranted or false information respectively provided for the preceding offenses shall be imposed when the
relative to any personal information or personal sensitive information personal information of at least one hundred (100) persons is harmed,
obtained by him or her, shall be subject to imprisonment ranging from one (1) affected or involved as the result of the above mentioned actions.
year and six (6) months to five (5) years and a fine of not less than Five
hundred thousand pesos (Php500,000.00) but not more than One million SEC. 36. Offense Committed by Public Officer. – When the offender or the
pesos (Php1,000,000.00). person responsible for the offense is a public officer as defined in the
Administrative Code of the Philippines in the exercise of his or her duties, an
SEC. 32. Unauthorized Disclosure. – (a) Any personal information controller accessory penalty consisting in the disqualification to occupy public office for
or personal information processor or any of its officials, employees or agents, a term double the term of criminal penalty imposed shall he applied.
who discloses to a third party personal information not covered by the
immediately preceding section without the consent of the data subject, shall SEC. 37. Restitution. – Restitution for any aggrieved party shall be governed
he subject to imprisonment ranging from one (1) year to three (3) years and a by the provisions of the New Civil Code.
fine of not less than Five hundred thousand pesos (Php500,000.00) but not
more than One million pesos (Php1,000,000.00). CHAPTER IX
MISCELLANEOUS PROVISIONS
20

SEC. 38. Interpretation. – Any doubt in the interpretation of any provision of SEC. 45. Effectivity Clause. – This Act shall take effect fifteen (15) days after
this Act shall be liberally interpreted in a manner mindful of the rights and its publication in at least two (2) national newspapers of general circulation.
interests of the individual about whom personal information is processed.

SEC. 39. Implementing Rules and Regulations (IRR). – Within ninety (90)
days from the effectivity of this Act, the Commission shall promulgate the Conclusion:
rules and regulations to effectively implement the provisions of this Act.

SEC. 40. Reports and Information. – The Commission shall annually report The letters alleged to have been read by the ISAFP authorities were
to the President and Congress on its activities in carrying out the provisions not confidential letters between the detainees and their lawyers. The petitioner
of this Act. The Commission shall undertake whatever efforts it may who received the letters from detainees Trillanes and Maestrecampo was
determine to be necessary or appropriate to inform and educate the public of merely acting as the detainees personal courier and not as their counsel when
data privacy, data protection and fair information rights and responsibilities. he received the letters for mailing. In the present case, since the letters were
not confidential communication between the detainees and their lawyers,
SEC. 41. Appropriations Clause. – The Commission shall be provided with the officials of the ISAFP Detention Center could read the letters. If the
an initial appropriation of Twenty million pesos (Php20,000,000.00) to be letters are marked confidential communication between the detainees and
drawn from the national government. Appropriations for the succeeding years their lawyers, the detention officials should not read the letters but only open
shall be included in the General Appropriations Act. It shall likewise receive the envelopes for inspection in the presence of the detainees.
Ten million pesos (Php10,000,000.00) per year for five (5) years upon
implementation of this Act drawn from the national government.
That a law is required before an executive officer could intrude on a
SEC. 42. Transitory Provision. – Existing industries, businesses and offices citizens privacy rights is a guarantee that is available only to the public at large
affected by the implementation of this Act shall be given one (1) year but not to persons who are detained or imprisoned. The right to privacy of
transitory period from the effectivity of the IRR or such other period as may those detained is subject to Section 4 of RA 7438, as well as to the limitations
be determined by the Commission, to comply with the requirements of this inherent in lawful detention or imprisonment. By the very fact of their detention,
Act. pre-trial detainees and convicted prisoners have a diminished expectation of
privacy rights.
In case that the DICT has not yet been created by the time the law takes full
force and effect, the National Privacy Commission shall be attached to the
Office of the President.

SEC. 43. Separability Clause. – If any provision or part hereof is held invalid
or unconstitutional, the remainder of the law or the provision not otherwise
affected shall remain valid and subsisting.

SEC. 44. Repealing Clause. – The provision of Section 7 of Republic Act No.
9372, otherwise known as the “Human Security Act of 2007”, is hereby
amended. Except as otherwise expressly provided in this Act, all other laws,
decrees, executive orders, proclamations and administrative regulations or
parts thereof inconsistent herewith are hereby repealed or modified
accordingly.

Você também pode gostar