Anda di halaman 1dari 68

The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

THE PHILIPPINE QUARTERLY THE OFFICIAL PUBLICATION OF THE


ARELLANO UNIVERSITY SCHOOL OF LAW

IT Law Journal E-LAW CENTER AND IT LAW SOCIETY

VOLUME 2, N UMBER 1

what’s
Inside
INCRIMINATING TEXT
by Mary Ann Ll. Reyes
1I NCRIMINATING TEXT

2E DITORIAL

4 TD L A P
HE EGAL ROFESSION IN THE
IGITAL GE Moral lesson: Do not take text In this case, the SC noted that the

8C
9 MC
10 SC
11 C
V
O
ODERNIZATION
OURTS

14 L M
E-L
L
ITAL
NLINE

EGAL
F
OMPUTER
T
OMPUTERIZATION OF COURTS

OF

IBRARY : D ELIVERING
EGAL I NFORMATION

ORENSICS

INUTIAE ON E-MAILS
THE
messages lightly as they can be used
against you in court.

his was the painful lesson former


Court of Appeals employee Elvira Cruz-
Apao learned when the Supreme Court
found her guilty of grave misconduct and
dismissed her from public service for
extorting P1 million in exchange for a
favorable ruling from the appelate court.
complainant who was the recipient of said
messages and therefore had personal
knowledge thereof testified on their contents
and import.

According to the High Tribunal, Apao herself


admitted that the cellphone number
reflected in complainant’s cellphone from
which the messages originated was hers.

Apao was executive assistant II of the acting “Moreover, any doubt respondent may have
18 P2P:
T
P
PIRATE
OWARDS
EER
A
TO P IRATE
CTUAL P EER -T O -
Division Clerk of Court of the CA’s 5th
division.
had as to the admissibility of the text
messages had been laid to rest when she
and her counsel signed and attested to the
20 V IP: T
O
REGULATE
O REGULATE OR NOT TO
The complainant presented to the court text
messages sent by Apao by which the latter
veracity of the text messages between her
and complainant. It is also well to remember
asked for P1 million in exchange for a that in administrative cases, technical rules
23 G T
AMBLING HROUGH SMS
favorable decision of Zaldy Nuez’s case with of procedure and evidence are not strictly
the CA (Pagcor vs Nuez) which has been applied. We have no doubt as to the
24 GJ T
URISPRUDENCE IN CYBERLAW:
LOBE ELECOM VS. NTC pending for two years now. probative value of the text messages as
evidence in determining the guilt or lack
L
EXICON OF C YBERLAW
26 T ERMINOLOGIES According to the Supreme Court, the text
messages were properly admitted by the
thereof of respondent in this case,” the
Court held.
27 MJS -,GI
URISPRUDENCE IN CYBERLAW:
ETRO
TUDI OS
TUDIOS
O L D W Y N -M A Y E R
NC ., ET . AL . VS .
ad hoc investigating committee created by
the CA since the same are now covered by Nuez initially filed a complaint for extortion
GROKSTER LTR. AND SHERMAN Section 1(k), Rule 2 of the Rules on against Apao with the Presidential Anti-
NETWORKS LTD. Electronic Evidence which defines Organized Crime Commission–Special
ephemeral electronic communication as Projects Group (PAOCC -SPG) in
28 ACS DESCRIPTIVE STUDY ON
YBERSEX , AUDIO-VISUAL SEX
CANDALS , AND C HILD
that referring to telephone conversations, Malacañang. This led to the conduct of an
PRONOGRAPHY: PROSECUTION text messages . . . and other electronic entrapment operation by elements of the
UNDER EXISTING P HILIPPINE forms of communication the evidence of Presidential Anti-Organized Crime Task
LAWS, AND OTHER PROPOSALS AS which is not recorded or retained. Force (PAOCTF) on Sept. 28, 2004 when
A FRAMEWORK FOR FUTURE
LEGISLATION
the supposed hand-over of the money was
Under Section 2, Rule 11 of the Rules on going to take place.
LEGALWEB: WWW.SEC.GOV.PH: Electronic Evidence, “Ephemeral electronic
66 MAKING THE PUBLIC MORE SECURE
communications shall be proven by the Apao was apprehended by the PAOCTF
testimony of a person who was a party to agents prompting then CA Presiding Justice
68 IT
L
LAW SOCIETY-SPONSORED
AGER NIGHT HELD the same or who has personal knowledge Cancio Garcia (now Supreme Court Justice)
ON IT LAW SOCIETY OFFICERS thereof. >> [ 3 ] Incriminating Text
AND MEMBERS

IT LAW JOURNAL WELCOMES 1


NEW EDITOR-IN-CHIEF
Editorial

I
t is not profile is available at the Society’s described in “P2P: Pirate to Pirate
uncommon that certain individuals article “IT Law Journal welcomes new towards actual Peer-to-Peer,” and the
relate Information Technology to be Editor-in-Chief.” Intellectual Property case against P2P
within the exclusive domain of software manufacturers was outlined
computers. It is neither uncommon that This issue also highlights the relevance by Ms. Estrada in “Metro-Goldyn-
certain individuals would shirk from the of technology vis-a-vis the Philippine Mayer Studios Inc. vs. Grokster Ltd.
alleged complexities of computers and government’s thrusts, especially those and Sherman Networks Ltd.”
their systems while at the same time of the judiciary. Justice Vitug’s speech
awed and excited by the new PDA entitled “The Legal Profession in the This issue’s featured article is entitled
features present in their mobile Digital Age” is reproduced herein. The “A descriptive study on Cybersex,
phones. The sign that there is reduced efforts of the Supreme Court (SC)’s Audio-Visual Sex Scandals, and Child
distinction between computers and Management Information System Pronography: Prosecution under
mobile phones, in fact, manifested Office (MISO), led by Atty. Ivan Uy, existing Philippine Laws, and Other
itself years ago by the notification in are described in Ma. Cristina A. Ramos’ proposals as a framework for future
the system tray icons in mobile article “SC E-Library: Delivering Vital legislation,” a paper submitted by Ailyn
computers communicating with old Legal Information Online” as well as L. Cortez, Carlyn Marie Bernadette O.
infrared-equipped mobile phones, i.e. in the reproduction of the Court’s Guerrero, and Reynaldo M. Pijo in their
a message balloon indicating Annual Report articles Advance Legal Writing class. The topic
“Computer found” and followed with “Computerization of Courts” and was chosen and the article was written
the mobile phone model. With “Modernization of the Courts.” An in light of the dismissal of the
computer technology being extensively overview of “Computer Forensics,” asianbabe.com case in Pampanga (a
adopted into mobile phones, and relating evidence and the processes cybersex den case) due to alleged lack
mobile phone technology being employed by the National Bureau of of laws to prosecute; the continuing
incorporated into computers, such as Investigation (NBI), is provided by proliferation of sex videos of certain
Voice over Internet Protocol (VOIP), it Jhonelle S. Estrada’s article. The celebrities, if not, unsuspecting
would appear that future distinctions website of the Philippine Securities and females; and the increase in the
between devices might be limited to a Exchange Commission (SEC) is number of adult websites featuring
contrast of size, and network linkage. featured in the LegalWeb section of roughly 18 Filipino teens.
Further, the legal issues attendant to the Journal, which is now regularly
said devices are similarly and handled by Ms. Ramos. With the release of this first issue of
increasingly becoming common. This Volume 2 of the Journal, and for your
is clear in the banner story entitled An overview on the legal continuing support; I, in behalf of the
“Incriminating Text” by Mary Ann Ll. consequences of e-mails is found in officers and members of the Society,
Reyes, the Journal’s new Editor-in- the article of Atty. Jaime N. Soriano, and in the same jovial spirit manifested
Chief. She also wrote the articles the e-Law Center’s director and the in the Lager Night sponsored by the
“VOIP: To regulate or not to regulate,” Society’s moderator, entitled “Legal Society last February, wish you “Buena
“Gambling through SMS,” and “Globe Minutiae on E-Mails”; while the attitude salud.” - Michael Vernon M. Guerrero
Telecom vs. NTC,” in this issue. Her towards Peer-to-Peer technology is

Editorial Board The Philippine Quarterly IT Law IT Law Society Officers


Journal is the official publication of the e-
C HAIRMAN Michael Vernon M. Guerrero
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

Law Center and the IT Law Society of the


Atty. Jaime N. Soriano, CPA, MNSA Arellano University School of Law. It is PRESIDENT
published quarterly.
E DITOR - IN -C HIEF Jhonelle S. Estrada
Mary Ann Ll. Reyes Contributions to the Philippine Quarterly IT V I C E -P R E S I D E N T
Law Journal express the views of their authors
and not necessarily the views of the Arellano Carlyn Marie Bernadette C. Ocampo-Guerrero
C ONTRIBUTORS
University School of Law. S E C R E TA R Y
Ailyn L. Cortez
Jhonelle S. Estrada For subscriptions, contact: Ailyn L. Cortez
Peter Joseph L. Fauni TREASURER
Carlyn Marie Bernadette C. Ocampo- THE PHILIPPINE QUARTERLY
Guerrero It Law Journal Ma. Cristina A. Ramos
e-Law Center H EAD , R ESEARCH AND S EMINAR
Michael Vernon M. Guerrero
2/F Heilbronn Hall
Reynaldo M. Pijo Arellano University School of Law Peter Joseph L. Fauni
Ma. Cristina A. Ramos Taft Avenue corner Menlo Street H EAD , P UBLICATION
Pasay City 1300 Philippines
Volume 2, Issue 1 Tels. +63 2 404-3089, 404-3090, 404-3091 Aileen T. Forteza
http://www.arellanolaw.net H EAD , A DVOCACY
© 2005. All Rights Reserved. itlawjournal@arellanolaw.net

2
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
<< [ 1 ] Incriminating Text guaranteed a favorable decision only The SC noted that petitioner’s reason
in the CA but did not extend to the was “not compelling” for it to be
to issue an order creating an ad hoc Supreme Court should the case be granted. It said that petitioner’s counsel
investigating committee that will appealed later. When respondent was would not have encountered a problem
investigate the case and recommend asked where the money will go, she if he had been systematic in his work
the proper administrative sanctions claimed that it will go to a male as he could have saved the encoded
against her. The committee researcher whose name she refused petition in a diskette and printed it.
recommended her dismissal from to divulge. The researcher was
service. allegedly a lawyer in the CA 5th Rule 43, sec. 4 of the 1997 Rules of
Division where complainant case was Civil Procedure, as amended provides
Nuez’s case was an illegal dismissal pending. She also claimed that she will that an appeal be taken within 15 days
case against Pagcor. Complainant filed not get any part of the money unless from notice of the award, judgment,
an illegal dismissal case against Pagcor the researcher decides to give her final order, or resolution. The rule
before the Civil Service Commission some. allows only one motion for
(CSC) which ordered his reinstatement reconsideration but the CA may grant
but a writ of preliminary injunction and The SC, in its decision, stressed that an additional period of 15 days within
a temporary restraining order was by soliciting the amount P1 million which to file a petition for review “for
issued by the CA in favor of Pagcor, from complainant, respondent the most compelling reason.”
thus complainant was not reinstated to committed an act of impropriety which
his former job pending adjudication of immeasurably affects the honor and In this case, the Cordillera
the case. dignity of the judiciary and the people’s Administrative Region of the
confidence in it. Department of Environment and
Since he wanted expeditious decision Natural Resources dismissed petitioner
of his case, Nuez sought the assistance Meanwhile, in another case, the Dagdagan’s letter-protest against the
of Apao sometime in July 2004 and Supreme Court ruled that computer townsite sales application of respondent
the latter told him that a favorable and virus is not a valid excuse for delay in Marani Bacolod, holding that the public
speedy decision of his case was the filing of a pleading. land in dispute was alienable and thus
attainable but the person who was to available for disposition.
draft the decision was in return asking The High Tribunal upheld on January
for P1 million. 24, 2005 the Court of Appeals’ denial Petitioner filed a motion for
of Helen Dagdagan’s second motion reconsideration, but it was denied. She
When Nuez told Apao that he did not for extension and dismissing her then elevated her case to the Office
have that kind of money since he had petition for review for having been filed of the President, but then Executive
been jobless for a long time, out of time. The litigant asked for the Secretary Ronaldo Zamora denied
respondent replied, “Eh, ganoon additional extension because a petitioner’s appeal and affirmed the
talaga ang lakaran dito, eh. Kung wala computer virus had caused the deletion decision of the DENR.
kang pera, pasensiya ka.” Respondent of the entire draft of the petition.
even admonished complainant with Consequently, petitioner’s counsel filed
the words “Wala tayo sa palengke iho.” “Deviations from the rules cannot be a motion for extension of time to file a
when the latter bargained for a lower tolerated. The rationale for this strict petition for review under Rule 43 of
amount. attitude is not difficult to appreciate. the 1997 Rules of Civil Procedure with
These rules are designed to facilitate the CA. The CA granted petitioner a
Complainant then asked for time to the orderly disposition of appealed non-extendible period of 15 days
determine whether or not to pay the cases. In an age where courts are within which to file her petition for
money in exchange for the decision. bedeviled by clogged dockets, these review.
Instead, in August of 2004, he sought rules need to be followed by litigants
the assistance of the television program with greater fidelity. Their observance Petitioner’s counsel however filed an
Imbestigador which accompanied him cannot be left to their whims and “urgent ex-parte motion for extension”
to PAOCCF-SPG where he lodged a caprices. Moreover, rules of procedure of five days on the ground that his
complaint against respondent for are tools designed to promote entire draft of the petition was deleted
extortion. efficiency and orderliness as well as from the computer due to computer
to facilitate attainment of justice, such virus. The CA denied petitioner’s
Apao, in his meeting with Nuez that strict adherence thereto is second motion for extension and
explained that the P1 million required,” the court said. dismissed her petition for being filed
out of time.

3
Speeches

THE LEGAL PROFESSION IN THE DIGITAL AGE


By Justice Jose C. Vitug
Senior Professor
Philippine Judicial Academy

T The Legal Profession is 22


Centuries Old

he law profession
had its probable conception about 22
centuries ago when a group of
influential persons who called
themselves experts in the law were said
to have first appeared in ancient Rome
and then Greece well about 200 B.C.
The New Challenge

The lawyer of today and tomorrow


must now also meet the challenges of
cutting edge science and technology
and a borderless society.

Relatively recent events would tell us


that it is no longer possible for the
lawyer to content himself with just the
Palakrishnan, the President at one time
of the Law Society of Singapore,
advises: “Ignoring technology will be
at our peril.”

The Academe

Programs for legal education must


consider a curriculum that is based on
a notion of comprehensive, rather than
Not much later, that conception saw bare ways that he has heretofore an autonomous, legal system that
birth, then infancy towards adulthood know. The lawyer of today and connects to linkage arrangements
- thenceforth – to what ultimately would tomorrow must now also meet the
become a great and noble calling. challenges of cutting edge science and On the academic front, Professor Chin
technology and a borderless society. Tet Yung opines: Increasingly, the
The perception of nobility in the bottom line would require law
profession though could have some The law is expected to evolve well graduates with the ability not only to
unhappy distortions at times. One beyond traditional lines. Senior practise ‘transitionally’ or across
might take the case of a judge who, Associate Justice Reynato S. Puno aptly jurisdictions, but also to have a broad
according to an e-mail passed on to observes that technology interfaces with understanding of world issues that may
us by the Public Information Office of science, and law inevitable enters the be cultivated, if not taught, through an
the Supreme Court, called the equation. Mr. Justice Artemio V. interest in, and a familiarity with, all
contending lawyers to his chambers. Panganiban, in his speech at the Manila social sciences along with modern
Once all were seated, the judge Overseas Press Club in March of technology.
confronted the two lawyers. “So”, he 2000, has acknowledged the
blurted out, “ I have been presented, inevitable interplay between technology During the second quarter of last year,
by each of you, with a bribe.” The and the various aspects of the law. The the Philippines was among the
lawyers were stunned, and they new era, however it might be called, countries invited to attend the New
squirmed uncomfortably in their seats. will impact in unprecedented levels and Orleans conference on legal
“You, Attorney Cruz,” the judge in yet undefined proportions. The education, and an item which caught
continued, “give me a check for P25, onslaught by irresistible forces on the the attention of most of us in that
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

000.00; and you, Attorney Santos, legal profession is now indeed here meeting was a report on the virtual
gave me P20,000.00.” Forthwith, the with us. disappearance of dedicated legal
judge reached into his pocket and mentors. Prof. John W. Reed, a senior
pulled out a check. Handing it over to The Transition has Begun professor of the University of Michigan
Attorney Cruz, he remarked, “ Now, has taken to task lawyers for their lack
then, here is a check for P5, 000.00, Advances in science and technology of persevering loyalty to the academe,
and we are going to decide this case and the idea of globalization usher a likening them to a husband, when
solely on its merits.” I would have new era in the legal system asked if he has been faithful to his wife,
wished that the story were only for a replied “ Frequently.”
good laugh. Unfortunately, the two The new age that has started towards
most publicized scandals in the world, the end of the last century promises a Prof. W. Michael Reisman of Yate Law
the Watergate and Enron, involved system of law that, by sheer magnitude, School stresses that planning and
lawyers. would be global and dominant in its designing programs for legal education
character. that are, at once, professionally
relevant and intellectually enriching

4
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
must consider a curriculum that is The adoption by the Supreme Court Under the terms of the World Trade
based on a notion of a comprehensive, of the Rules on Electronic Evidence has Organization (WTO), trade and
rather than an autonomous, legal re-written in good perspective its ruling services, including legal and other
system that connects to linkage in the 1999 case of IBM vs. NLRC professional services, my not much
arrangements (G.R. 117221, 13 April 1999) and longer be restricted by state borders.
its 2001 decision in Asuncion vs. NLRC
The Bench and the Bar (G.R. 129329, 31 July 2001). I am not saying, at least momentarily,
that there would be no problems to
The response by the Bench and the The response by the legal profession deal with. There are. The exercise of
Bar must be prompt, appropriate and must be equally bold. Local law firms profession is still confined to Philippine
revolutionary. might seriously undertake, add to a few citizens and subject to locally-obtained
already there, to examine the academic qualifications. It is something
The Supreme Court has responded feasibility of developing arrangements that we may have to address. Even
well within its capability and fiscal with off-shore law firms towards now, one might ask, should we treat
constraints. It has established, pursuant becoming global legal service foreign law firms giving their legal
to its Administrative Order No. 35-96, providers. Different strategies might be advice to transnational corporations
on 16 March 1996, the Philippine looked into and developed in order to operating in this country, using the
Judicial academy, to be at the core of commensurate with and meet the Internet, as being an illegitimate law
continuing judicial education. It is increasing needs of a world that knows practice in the Philippines?
fortunate that the educational arm of of no boundaries.
the court has been able to count on In a paper presented at the 14th
many friends to help it, financially and In an article, entitled “ The Legal Annual Meeting and Conference of the
in many other ways, carry out a good Profession in Twenty Years’ “ John Inter-Pacific Bar Association, in Seoul,
number of its projects. The Academy Tredennick, made a compilation of Korea, in May 2004, Steven C. Nelson
has received on 26 February 1998, feedbacks received via a forum has observed that there two principal
statutory recognition in Republic Act organized in the Internet. The barriers in this respect- (1) the
No. 8557. Two years later, on the participants included such names as “qualification barrier” which relates to
recommendation of the court’s Wells Anderson, the President of Active the obstacle on cross-border legal
Committee on Legal Education in Practice LLC and an ABA Tech show services due to the education and other
collaboration with the Integrated Bar Board Member; Robert Denny, requirements generally imposed as a
of the Philippines, the Association of founder of the law firm specializing in condition to admission to the practice
Law Schools (and law deans), the management and strategic planning of law, even by persons who have
association of Law Professors, and the services; Ron Friedman, President of already qualified in another country,
Commission on Higher Education, the PRISM Consulting; and a number of and (2) the “association barrier, ‘
Supreme Court has approved at a others with similar credentials. Two referring to the prohibition found in
special session, called for the purpose areas of concern were highlighted: many countries against the entry
on 21 August 2000, the Mandatory First, only law firms, with more than thereat by lawyers into partnership or
Continuing Legal Education for all 1000 lawyers could have the scale to other forms of common enterprise with
lawyers. It is, since then, being be competitive and have the capability anyone other than another lawyer of
vigorously implemented. to deliver systematized legal services those countries premised on an unduly
that clients would demand; and second, strict application of the rule of
The Supreme Court has had its e-mail computers would play a much larger, professional conduct against legal fee
facilities since 1991. It has put up its but complementary, role for legal sharing.
own website, one of the most visited service providers that would diminish
websites in the country, since 1996. personal contacts with clients. Significantly, WTO members have
Chief Justice Hilario G. Davide, Jr. obligated themselves towards the road
undoubtedly the most reformed- Law firms, like business enterprises, for progressive liberalization of trade
minded Chief Justice perhaps would see themselves as leading to a in services. The International Bar
anywhere else in the world, has “one stop shop” model with offices in Association has identified two main
launched several technology-driven countries around the world capable of approaches to start the process: (a) full
projects for the judiciary, including a handling a wide variety of legal licensing; and (b) limited licensing. In
pilot E-court, an E-Library and E- services concomitant with the demands the “full licensing” approach, the
Learning, and has lately directed the of clients for a “seamless” universal foreign lawyers thus licensed are fully
Philippine Judicial Academy to put up service. The legal profession would assimilated into the domestic legal
the initial foundations for an “On-Line have the globalized village as its venue profession. In “limited licensing,” the
Academy”. and an unconfined society as its scope of a foreign lawyer’s practice is
workplace. restricted to certain areas or under

5
certain specified conditions or that common law would normally in Manila to say likewise in the full view
constraints. work. of each other, including the witnesses,
and of the solemnizing officer.
Keith Clark, the chairman of London’s Allow me to momentarily break the
Clifford Chance which merged with monotony by zeroing down to a few The age of cloning is also here. How
New York’s Rogers and Well and familiar topics in the academe’s should the rules on filiation, parental
Germany’s Pinder, Volhard, Weber drawing board. authority, support and successional
and Axsters “to create the world’s rights be re-structured; if not how
largest law firm, ‘ explaining the The Family code allows a marriage would the courts themselves initially
inevitable, has ratiocinated: The world contact to be entered into by a man take on the matter? The statutory rule
is becoming smaller and yet bigger at and a woman, and not by persons of of interpretation and construction that
the same time. Factors making the the same sex. Would a marriage be makes legislative intent to be a primary
world smaller include, reduced legally feasible if the “marriage” takes factor can here be obsolete not only
barriers to entry, as well as place between a man and a woman, in theory, but likewise in actuality, for
convergence of economies and who used to be a man, whose sexual when Emperor Napoleon ordered the
technological advances, which enable transformation according to medical codification of both civil law and
business to view the world increasingly science, confirmed by medical experts, commercial law neither he nor his
as a single market. Indeed, time zones has been so successful as to even allow legal experts could have been aware
and geographical differences are no him, now her, to be impregnated by a that one day cloning could become a
longer the obstacles they have once man. reality.
been. The Internet is accelerating this
trend and rewriting the rules in a The law requires in the celebration of The Electronic Commerce Act of 2000
manner that reflects the current move marriage, the man and the woman to may have done much to recognize the
from an industrial to a knowledge- personally declare before the universal use of electronic transactions,
based society. The changes, as and solemnizing officer that they take each both commercial and non-
when or even before they occur, make other as husband and wife. The commercial, but it also has spawned
new demands on lawyers who will be statutory provision particularly the term and will spawn new issues. It should
expected to help navigate legal shoals. “ personally” has been so construed be expected that questions, whether
as to disallow “proxy” marriages. The prescinding form, or the result of
A decade ago or so, I have expressed thesis for the construction is not at all obscure, contractual stipulations or
to say that I am seeing an emerging hard to find. In the graduate school statutes, will be asked and will have to
new legal system that would have both discussion we have had just a few be resolved, such as those referring
common law and civil law features weeks ago, here in San Beda, Dean to fundamental personal and property
working hand-in-hand towards a Doming Navarro has said that the rights, the jurisdiction and venue of
universal system. I have failed to reason is clearly due to an obvious courts, rules of procedure, situs of
realize that the idea would begin to danger that the proxy might, wittingly transactions, applicability of tax and
become a reality even now. It should or unwittingly, exceed his authority. regulatory laws, situs of crimes,
be realistic to expect that the enforcement of judgments, and the
enactment of specific laws by various If a marriage has already been set, all like, each of which would require
jurisdictions will not always be timely invitations have gone out all the serious and special attention.
or in cadence with the fast-moving hundreds or so wedding sponsors have
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

environment. been notified but the man would have Electronic contracts, transcends
to suddenly leave for Hongkong on territorial boundaries that can affect,
In the Philippines, the only significant medical advice to immediately observes Attorney Esmeraldo C.
e-law that has been legislated is the undergo an emergency knee Amistad in his article, “Charting the E-
Electronic Commerce Act of 2000, operation, it could be unthinkable for Course of Philippine E-Laws”
which means that the country is seen the prospective couple to re-schedule (published in the Lawyer’s Review issue
to fall behind the times. Placing a the marriage, and to wait even just a of November 2002), even the basic
reliance on judicial precedents could week more. Would the contract be concept of consent and the theory of
thus increasingly become frequent. valid if it were celebrated via and with cognition in the perfection of a
The dearth of enacted law will not the help of the latest technology? A contract. He exemplifies: For instance,
excuse a judge from resolving a case video is set-up in Park Hotel in there are issues relating to the so-
before it; effectively, he, rather than Hongkong to link up in Manila that called shrinkwrap and clickwrap
Congress, may bound to first confront would permit the “groom” to licenses common to software and
and tackle an issue in the same way personally say, “ I do, “ and the “ bride” certain websites. “Shrinkwrap”

6
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
agreements “are unsigned license pregnancy test (Villaflor vs. Summers, Contributions are Welcome
agreements which state that 41 Phil. 62), to expectorate morphine
acceptance on the part of the user of from his mouth (U.S. vs. Ong Sin Hong,
the terms of the agreement is indicated 36 p.735), to accede to foot printing
by opening the shrinkwrap packaging test (U.S. vs. Salas, 25P. 337; U.S. vs.
or other packaging or other packaging Zara 42 P. 305) and to take part in a
of the software, by use of the software, police lineup (U.S. vs. Wade, 388 U.S.

T
or by some other specified 218). These cases have been cited
mechanism. “Clickwrap agreements, with apparent approval by the he Philippine IT Law
on the other hand, work arise a user Supreme Court in People vs. Casinitto Journal welcomes the submission of
comes to a website to locate and (213 SCRA 777). contributions with a view to publication,
download computer software and the which should be sent to:
user can be required to review the Can it thus be said that the tone has
terms of any applicable license already been set; i.e., that the ends of The Board of Editors
agreement and to affirmatively assent justice might justify the means or that, The Philippine Quarterly
IT Law Journal
to those terms by clicking on a in the hierarchy of value, the cause of
Arellano University School of Law
keyboard button at the end of the justice can prevail over individual
Taft Avenue, corner Menlo Street
license before the software is rights? Or, should we invoke again the Pasay City 1300 Philippines
downloaded. so-called “balancing of interest” rule Tels. (2) 404-3089 to 91
or, using another term for it, the “pro Fax. (2) 521-4691
The use of DNA in court proceedings hac vice” approach. The intensity yet eMail: itlawjournal@arellanolaw.net
has been gaining ground after getting increases, with the entry into the legal
an early jurisprudential foothold in the arena of biometrics, brain as should all correspondence, books for
Philippines and in most countries of the fingerprinting and other more recent review, orders and other
world. Among the latest cases in the scientific discoveries. communications.
Philippines to recognize the use of DNA
The Board of Editors will only consider
in proving or disproving the Beyond the Digital age
material which complies with the
commission of a crime is the 2004
following:
case of People vs. Yatar (G. R. No. All that we have is hope and our
150224, 19 May 2004). Thus far, the humanity 1. The submission is an original,
application of DNA has caused a unpublished work which is not
reversal of a number of final It may yet be early to tell how the law, being submitted for publication
convictions in the United State; and as well as the bar and the bench, would elsewhere.
elsewhere where postsentencing DNA lend themselves to the inevitable; if, 2. The manuscript must be typed,
testing is allowed. The decision of the today, we are still unsure, then there double-spaced, on one side only of
Court in a petition for a writ of habeas is even greater uncertainty to aptly a uniform sized paper, and be
corpus by convicted prisoner Reynaldo grasp tomorrow’s complexity. The accompanied by the text on floppy
disk in a recognized software.
de Villa (G.R. 158802), decided last things we can discuss are obvious
3. Footnotes must be numbered
17 November 2004, holding in sum enough to see or to anticipate. The
consecutively throughout the article.
that DNA results would not constitute other ninety-nine percent are yet to 4. Authors may use graphs, tables,
newly discovered evidence, may be discovered, i.e., if we can. Marvin figures, or mathematics only when
require, if it is minded, a statute or a Minsky, said to be the father of artificial its application is necessary for
provision of the rules to adopt a post- intelligence, has once bluntly achieving the stated objective of the
sentencing DNA testing. remarked, “we should be lucky enough paper. When mathematics is used,
if the new machines would be willing the necessity for doing so should
The accuracy of the DNA method to keep us, human beings, as be explained, and the major steps
depends much on the reliability of household pets.” in the argument and the conclusions
DNA samples that could mean a made intelligible to a non-
mathematical reader.
resurgence of an old issue of whether I conclude by expressing the hope that
a person can be compelled to provide the legal profession will not allow itself
Authors are asked to refer to a recent
a DNA sample or to be taken from to become obsolete and a mere relic issue of the Philippine IT Law Journal for
him. Judging from might be invoked of a bygone age; that it will have the style. More detailed guidance will be sent
as broad guideposts, an accused has capability of recognizing, as well as on request. Authors are encouraged to
been required to submit to a test to have the resolute will to survive, the carefully edit their own works.
extract virus from his body (U.S. vs. crossroad when it comes, all despite
Teng, 23 Phil. 145), to undergo a his insatiable quest for the ultimate.

7
Technology and the Courts

COMPUTERIZATION OF COURTS

I n 1989,
Supreme Court embarked on an
ambitious yet necessary project, the

-- from the Supreme Court down to


the Municipal Trial Courts and Shari’a
the

computerization of all Philippine Courts

Circuit Courts. This is one sure way to


combat delays in the judicial system. It
is one of the costliest judicial reforms,
Administration System (CAS), Case
Monitoring System (CMS), Electronic
System on Personnel Record Tracking
(ESPRT), the Payroll System, Personnel
Leave and Attendance Monitoring
System (PSALM) and Supplies and
Property Accountability Monitoring
System (SPAMS). These systems are
being reprogrammed to include some
the Program Management Office,
extended technical assistance in the
design, development and maintenance
of the CFM.

IV. Information Systems


Strategic Plan (ISSP)

A Task Force on ISSP was created to


but the Court believes that catching up functionalities requested by the users. oversee the formulation of a five-year
with innovations brought about by Additionally, the Systems will be more plan that will identify the ICT
computer technology will pave the way user-friendly and aesthetically requirements of the Judiciary. The MIS
to speedier dispensation of justice. improved, as these systems will Office, together with the Program
incorporate functionalities inherent to Management Office and other key
Overseeing the computerization of the Windows-based applications such as offices of the Judiciary assisted the Task
courts is the Committee on icons, font types, styles, formatting and Force in the formulation of the ISSP.
Computerization composed of three sizes, buttons, pictures, etc. The ISSP defines the specifications and
Associate justices, with Hon. Justice design of the ICT systems,
Artemio V. Panganiban as II. Court Administration and infrastructure and resources to be
Chairman, Hon. Justice Consuelo Management Information installed or implemented in the
Ynares-Santiago and Hon. Justice System (CAMIS) Judiciary in the next five years. It
Antonio T. Carpio as Members. prescribes the different technologies
The MISO, in coordination with the that maybe adopted to improve the
The Committee on Computerization is Project Management Office, extended capacity of the Judiciary in managing
tasked with providing direction on technical assistance in the development its physical, financial and human
computerization as well as studying of the CAMIS funded by the Canadian resources and in addressing the
policy issues that may arise from the International Development Agency present problems of its frontline
implementation of new technology on (CIDA). CAMIS aims to improve the services.
established court practices and monitoring of the performance of
procedure. It also recommends lower court judges. Statistical reports The ISSP was reviewed and approved
guidelines to the Court on the proper on caseload and case disposal can be by the National Computer Center on
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

adoption of these technologies. generated by the system to facilitate 29 September 2003.


the evaluation of the performance of
The Court has already adopted and judges. The system will be V. Computer Assisted Legal
implemented several computerized implemented in OCA Court Research (CALR)
information systems through its Management Office. System testing is
computer technology arm, the tentatively scheduled in June 2004. The Computer Assisted Legal Research
Management Information Systems (CALR) is being developed and
Office (MISO) headed by Atty. Ivan III. Case Flow Management maintained by the MISO to provide the
John E. Uy. (CFM) Court with a tool that will aid in the
research of legal cases. Currently, the
I. In-house Developed Funded by the USAID, the CFM project MISO has updated the 1nfoBase on
Computerized Systems aims to facilitate the monitoring of the Supreme Court jurisprudence from
status of lower court cases, from filing May 1996 up to present. `[he Supreme
The MISO continued the migration of until disposal. The system was pilot- Court offices and the Office of the
the major DOS-based applications to tested in Pasay City in December Court Administrator, ,which are
GUI-based application such as Case 2003. The MISO, in coordination with connected to the local area network

8
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
can now access the full text of decisions promulgated decisions and resolutions installed in the Supreme Court which
and resolutions promulgated during as well as administrative circulars and had been infected by computer viruses
this period. orders issued by the Chief Justice and and worms.
the Court Administrator are posted in
VI. The Supreme Court Internet the Supreme Court homepage for the Besides the hardware and software
Homepage expeditious dissemination of services, training and tutorials on
information. Press releases by the application software were also
The MISO designed a homepage Court through the Public Information conducted for the different offices of
Supreme Court for posting in the Office are likewise posted in the the Supreme Court. Lower court
Internet. The Supreme Court homepage for the information of the personnel were also trained on the use
homepage functions as a clearinghouse public. of computer applications. Training was
for information originating from the conducted by the MISO personnel at
judicial branch of the Philippine Also added in the Supreme Court the Supreme Court for those courts
government. website is a link to the PHILJA website within the Metro Manila area while for
which contains information on training courts outside Metro Manila, training
The Supreme Court homepage programs and lectures conducted by sessions were conducted on site.
contains the following information: PHILJA. Technical assistance on computer
orientation and use of the legal
• History of the Supreme Court of The results of the 2002 Bar research facility were also extended
the Philippines Examinations were posted in the to lower court judges.
• The list of incumbent Supreme homepage immediately after the listing
Court Justices was released by the Office of the Bar VIII. Computer Resources
• The list of former Supreme Court Confidant.
Justices In November 2003, the Court
• The organizational structures of The Supreme Court Internet purchased 500 computer sets and a
the Judiciary and of the Supreme homepage address is number of laser printers and dot matrix
Court www.supremecourt.gov.ph. It can be printers for the Supreme Court and
• The Supreme Court Jurisprudence accessed using any Internet facility. selected lower court offices. The
• Authorities promulgated by the computers purchased have installed
Court, i.e., Rules of Court and VII. Computer Services and application packages such as MS Office
Circulars and Orders Maintenance XP and Norton Anti-Virus. Training
• Bar Matters and the Lawlist sessions on computer operations,
• News and Information The MISO conducted maintenance Microsoft Windows and Microsoft
services and repairs of computers in Word for Windows were likewise
The MISO maintains and regularly the Supreme Court and the Lower provided to lower courts personnel
updates the Supreme Court homepage Courts. The MISO also conducted upon delivery of the computers to them.
posted in the Internet. Newly remediation procedures to computers

The Dynamo Within Academy, and the Vice-Chairman of graduating in 1988. He holds the
the Sub-Committee on E-Commerce, distinction of being the youngest person
Committee on the Revision of the Rules to be appointed Chief of Office and in
of Court. He pioneered the 1995 conferred the rank of Regional
introduction of technology in the entire Trial Court Judge in the history of the
judicial system, specifically, those of Philippine Judiciary.
Computerized financial and
administrative systems, Case tracking Notwithstanding the lucrative
systems, Computer aided transcripts, opportunities in the private sector that
and Distance learning, among others. are available that would usually entice
professionals of such sterling
Atty. Ivan John E. Uy is the Director He took his undergraduate studies at background , Atty. Uy remains with the
ofthe Management Information the Ateneo de Manila University, Judiciary, fueled by altruistic
Systems Office (MISO), and the Chief graduating in 1984 with a degree in motivations to contribute further,
Information Officer, of the Supreme B.S. Business Management, Major in through his know-how in technology
Court of the Philippines. He is also the Legal Management (Honors Program); matters, to the development of the
Chairman of the Court Technology and took his law studies at the Philippine legal system and to the
Department of the Philippine Judicial University of the Philippines, enhancement of judicial processes.

9
Technology and the Courts

MODERNIZATION OF THE COURTS

T he mental picture
evoked in most persons by the term
"Supreme Court" or "Highest Tribunal
of the Land" is of fifty-year old, serious,
solemn, unsmiling, grim-visaged
individuals, clad in dark, conservative
togas, moving quietly down long
corridors or conferring with each other
in hushed tones and weighing every
and Cashier. The CAS has relegated
as a thing of the past the tedious and
unreliable function of docketing by
hand in voluminous docket books every
major action in pending cases. Another
case administration system has been
developed for the lower courts to
monitor the status and development of
the cases handled by the trial judges.
The Court Administration Information
System (CAIS) was also developed to
monitor the status of complaints filed
against Judges and court personnel;
the case load and dispositions of trial
court Judges; the movement of Judges
and court personnel and the
administrative clearing of retiring/
resigning Judges and court personnel.
word and expression, or otherwise
working in large, dimly lit offices, while Even earlier, the Court had installed The Court has to a large extent
seated behind big, antique desks IBM S/38 main frame computer to replaced its manual and even electric
surrounded by musty, thick books and prepare the salary checks of typewriters with personal computers or
bulky records. employees in the judiciary, numbering word processors. It has acquired and
some twenty-two thousand at the continues to acquire fax machines and
This may be true to a certain extent, moment, including the Justices and the cellular telephones not only for the
but as with all other human beings Judges. Thereafter, a new Judicial justices and officers and employees of
these justices have lighter sides and Payroll System was developed to the Supreme Court, but also for many
trifling moments. They are replace the existing system. The new Regional Trial Courts. To make
conservative, indeed, but they are not cost efficient system and time saving research easier, it has also acquired a
resistant to change. In fact, the system will make access and encoding full text retrieval system of decisions
Supreme Court, as well as its various easier with the installation of a network of Supreme Court from 1901 to 1995
offices, has been among the first to connecting the Finance and in compact discs known as Philjuris and
use modern technology, and continue Accounting Offices. The Supreme in CD-ROMS known as the
to do so. Court has entered into an agreement Jurisprudence and Lex Libris.
with the Land Bank of the Philippines
As early as 1989, the Supreme Court for the payment of salaries through For the welfare of its employees, it has
geared itself towards the application ATM. In time, this will be used in all acquired nine (9) large airconditioned
of computer technology to its various lower courts. buses for their use in coming to and
functions. It initially created an ad hoc from the office. It has also acquired
Committee to determine policy The Court is also modernizing other vehicles for its officials (e.g., Clerk of
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

directions and a Management equipments. Its Medical Clinic has Court, Assistant Clerk of Court and
Information Systems Office to provide acquired a "1-2-3 channel E.C.G." Division Clerks of Court and their
technical expertise on the formulation machine. The Physiotherapy Section Assistants, and Chiefs of Offices), as
of systems design studies, software of the Medical Clinic has one (1) well as for Members of the Court, the
development, as well as technical Armrex synchrosonic US/50 Judicial and Bar Council and the
support on hardware, software and combination ultrasound/ LV stimulator, PHILJA.
peopleware. In 1991, the first Case an "infraphil machine (Philips NPN), a
Administration System (CAS) was "Birtcher Megason XVI ultrasonic At the same time, it is disposing of
installed and put in operation. An therapy" machine; a "Dickson home/ obsolete and very old equipment such
updated version was set-up in 1995. office paraffin bath" set, and a as desks, chairs, filing cabinets, and
It computerized the docketing functions "Midland whirlpool bath" machine, all typewriters. It is also disposing of very
of the Court to provide the justices with for the use of Justices, Judges and court old cars and other vehicles which are
information on the status of any personnel. Additional Printing 10 to 20 years old. Said cars are
particular case pending in the Supreme Machines were acquired to meet the hardly serviceable, well nigh obsolete
Court. The network connects the offices ever increasing printing requirements and useless, and very expensive to
of the justices, Clerks of Court, Court of justices, Judges and court officials maintain and repair. Disposition of
Administrator, Judicial Records Office and personnel. >> [65]Modernixation of the Courts

10
Technology and the Courts

The Philippine Quarterly IT Law Journal :: Volume 2, Number 1


SC E-LIBRARY: DELIVERING VIT
IBRARY AL LEGAL INFO
ITAL RM
NFORM ATI
RMA ON ONLINE
TION
by Ma. Cristina A. Ramos

C onsistent with its role


of upholding the rule of law through
fair, expeditious and timely judicial
process and effective, efficient and
speedy administration of justice, the
Supreme Court of the Philippines in
October 2004 launched the e-library
to cater to information needs of the
Judiciary, justices, officials and staff of
is limited to SC officials and employees
and the Presidential Electoral Tribunal.
In addition to that, the non-electronic
library is open only 8 am to 12 noon
and 1 to 4:30 p.m. Mondays to Fridays.

With the coming into being of the SC


e-library, anybody can now access the
library anytime he wants to. Not all
legislative enactments. Aside from the
1935, 1873 and the 1987
Constitutions, the e-library also provides
access to the Malolos Constitution, the
1986 Freedom Constitution and a
comparison of the 1935, 1973 and
the 1987 Constitution.

Legislative enactments, on the other


the SC, and judges of the lower courts. the contents of the e-library, however, hand, include 4,275 public acts (cited
are available to the public for free. as Act No.) enacted by the Philippine
The proponents of the e-library The ‘free site’ includes SC decisions Assembly from 1901 to 1935, 733
envision the project to be the model and resolutions. This site, however, is Commonwealth Acts passed from
law library of the Philippines by not provided with a ‘search tool.’ The 1935 to 1946, 2035 Presidential
maintaining the ‘highest standard and other parts of the e-library, particularly Decrees that were enacted from 1972
services’ and creating an ‘information those which are equipped with text to 1986 and more than 9000
highway that will provide the retrieval system, are available only to Republic Acts which include
communication linkages to enhance subscribers. This is the ‘members only’ congressional enactments from the
the delivery of vital legal information’ site. declaration of independence in 1946
not only within the Judiciary but to the until the declaration of Martial law in
general public as well. Contents of the e-library 1972 and also recent enactments of
Congress since the latter was organized
Accessible to the public, anytime, The e-ibrary resources include under the 1987 Constitution.
anywhere jurisprudence, laws, court issuances,
executive issuances, references, and The Rules of Court, circulars and
The major advantage of the e-library memorabilia. These contents or administrative matters can be found
is its being accessible to the general resources are searchable and search under ‘Court Issuances.’ The Rules of
public anytime of the day. Unlike the instructions are available in a mouse- Court therein provided includes the
non-electronic library, any person can click. 1918 Rules of Court, the Rules of Court
use and enjoy the library privileges in of First Instance of 1919, 1940 Rules
front of their computers by simply ‘Jurisprudence’ includes SC decisions of Court, 1964 Rules of Court, Rules
connecting to the Internet. The non- and resolutions. Under it is a link to of Civil Procedure of 1901 (Act No.
electronic library privileges extends information about the poject 190), 1997 Rules of Civil Procedure,
only to the following: COMUSDEC. The latter is an ongoing Rules of Criminal Procedure (1900,
project of the SC library to retrieve 1985, 1988 and 2000), Rules of
1. Members of the bench and the missing SC decisions from 1901 to Evidence (1989) and Special
bar; 1945. Majority of the original Proceedings.
2. Government officials and decisions during the said period were
employees; destroyed during World War II. These Some of the administrative matters
3. Representatives of the diplomatic are the unpublished decisions of the contained in this section are the
and consular services; and, SC. Project COMUSDEC aims to call following: 2004 Rules on Notarial
4. Other persons engaged in highly on the people concerned and the Practice, Code of Conduct for Court
legal or scientific research. public to help the Judiciary locate the Personnel, Proposed Guidelines on
missing decisions to complete the Corporate Surety Bonds and
These users, however, are allowed to compilation of the SC decisions. Conditions on the Commercial
use the library resources only within Exploitation of Supreme Court
the premises of the library. Borrowing Under ‘Law ’” are the different Decisions.
privileges in the non-electronic library Constitutions of the land and various >> [ 65] SC E-Library

11
eLaw Enforcement

COMPUTER FORENSICS 1
by Jhonelle S. Estrada

The National Bureau of Before the donation of said state-of- the computer used was identified, it
Investigation and Computer the-art equipment, the NBI did not will be confiscated and will be taken to
Forensics usually examine computer-related the forensics laboratory. Afterwards,
evidence. However, ff there is really the search warrant will be returned to

T
he National a need to do so, it was examined by the issuing court with the prayer to
Bureau of Investigation (NBI) is the their EDP and, if not, the bureau allow the Bureau to conduct a forensic
government agency that handles requests its counterpart from the examination. Evidence gathered will
computer crime cases. In 1996, the private industry to conduct the not be examined immediately as the
name of its anti-fraud and action examination. Personnel from the approval of the court is necessary, so
division was changed to anti-fraud and Bureau even had to fly to Hongkong as to avoid questions or issues involving
computer crimes division. At first, the to have evidence examined by the tampering of evidence. If the court
division’s mandate was to investigate experts there. allows the examination, it will require
fraud cases, but due to the change of the complainant and representatives
name, the division now handles Computer forensics, defined of the respondent to witness the
computer crime cases for investigation. examination. The examination of the
Computer forensics is the analysis of evidence will thereafter be scheduled.
In 2003, the State Department of the data processing equipment to
United States gave several trainings for determine if the equipment has been In other cases, when there is a private
examination of computer-related used for illegal, unauthorized, or offended party, such as a company,
evidence. Bureau personnel were unusual activities. It can also include where the assistance of the Bureau is
taught to use certain software such as monitoring a network for the same requested, NBI agents would prepare
EnCase 2 and Forensics Toolkit (FTK).3 purpose. 4 It is the scientific an image copy of the hard disk of the
FTK is the software being used by the examination and analysis of data held computer machine which is alleged to
NBI, but what is acknowledged as the on, or retrieved from, computer have been used in a computer crime
software being used by law storage media in such a way that the or in conducting an anomalous
enforcement agencies, in general, is information can be used as evidence transaction. The image copy will be
the EnCase. After several trainings in a court of law. The subject matter brought to the Bureau, and a mirror
sponsored by US State Department, includes (a) the secure collection of copy of which would be examined.
and in order for the knowledge learned computer data, (b) the examination of This is for purposes of knowing of how
to be put into use, it was necessary for suspect data to determine details such the offense was committed and if there
the Bureau to have its own equipment as origin and content, (c) the are existing files.
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

that can be used for examination; presentation of computer based


otherwise the things learned through information to courts of law, and (d) Once the evidence is secured, the
seminars and trainings would have the application of a country's laws to persons most knowledgeable about
been forgotten, rendering them computer practice. 5 the crime or the person who
useless. In order for the Bureau to discovered the offense will be
have its own equipment, it solicited for Gathering electronic evidence interviewed. In the process, the agents
the acquisition of several equipment would look for the owner of the
in November 2003 through donation. If there would be a need to apply for a computer and the officers supposedly
Six forensic workstations were search warrant, the Bureau’s agents responsible for the computer. The
delivered to the Bureau by the US State would first apply for one. If the judge agents may also use logbooks and
Department in January 2004, which would grant the application for the directories of computers, when they
are now being used for examining search warrant, the search warrant will run the computer per se. Sometimes,
computer-related evidence. The be implemented, and the when there were traces left, it would
software donated with the equipment establishment where the staging point give the NBI agents an idea of the
was the FTK but there are plans to for the computer crime was person who used the computer before
include EnCase soon. committed, such as in case of hacking,6 the discovery of the crime.
would be raided. If during the raid,

12
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
Electronic evidence premises allowed the recovery of a criteria, search results and search
information such as when the search was
computer, which maintained records
executed, length of search and more;
Electronic evidence has to be qualified of its customers and suppliers. (11) provides powerful search and
by the Rules on Electronic Evidence. 7 analysis tools that allow investigators to
As far as documentation is concerned, Endnotes view many different types of files in plain-
text format, including registry files, e-
as part of the duties of the Bureau’s
1. Based on an interview with Agent Palmer mail files, and more; (12) attempts to
agents, actions taken in order for them Mallari, Executive Officer of the Anti- interpret file structures and show a
to come up with the findings will have Fraud and Computer Crime Division representation of all files and folders,
to be mentioned in the report. The (AFCCD) of the NBI. supporting thusFAT12 (Floppy), FAT16,
2. EnCase is a product of Guidance FAT32, NTFS, HFS, HFS+, UFS, Sun
software, hardware, and techniques
Software. The integrated functionality Solaris, EXT2, Reiser, Palm, CDFS, Joliet,
used should also be noted therein. The of EnCase allows the examiner to UDF and ISO 9660; (13) offers different
preparation of report is the same as in perform all functions of the computer Views that quickly and easily allow the
documentary evidence, it is in its forensic investigation process. EnCase's investigator to find specific investigation/
EnScript, a powerful macro- case information, through (a) Table view,
presentation that the variation comes
programming language and API where files can be sorted by name,
in. included within EnCase, allows extension, file created date, logical file
investigators to build customized and size and other criteria in a spreadsheet-
Developments in the Philippines reusable forensic scripts. EnCase (1) style format, (b) Gallery view, which
supports the acquisition of virtually all displays images of BMPs, JPGs, GIFs,
media that can be attached to a system: and TIFFs, (c) Timeline view, which
In the Philippines, computer forensics hard drives, Zip disks, USB devices, flash allows the investigator to view a
is still new. Bureau agents cannot really cards, Palm Pilots, etc.; (2) performs calendar-style graphic of all file activity,
be said to be experts in the field, as media acquisitions by producing an illustrating file attributes such as when
exact binary duplicate of data from the files were created, last written or deleted,
they are still exerting all efforts to gain
original media, by generating MD5 hash (d) Report view, wherein reports can be
expertise. They attend trainings in values of both the original media and generated on any file, folder, volume,
forensics, computer crime all data contained within the resulting physical disk or the entire case; and that
investigations, and incidents in smugs. evidence file, and assigning a CRC value reports typically include reference
for each 64K block of the evidence file; information regarding the acquisition,
Although attending seminars and
(3) has an Optimized Search Engine, drive geometry, folder structures,
trainings do not make anyone an wherein the latest algorithm gives bookmarked files and bookmarked
expert, expertise may be gained by multiple-term keyword searches near- images. Encase also has (1) an EnCase
experience, through new computer- identical throughput to single-term Encrypting File System (EFS) Module,
keyword searches; (4) can read PST files, which provides Encrypting File System
related cases being assigned to the
the file format associated to Outlook, (EFS) folder and file decryption
agents. Their growing experience in whether having compressible encryption capabilities, for locally authenticated
investigation will help them in future and full encryption, and extract e-mail users; (2) an EnCase Virtual File System
and more complex cases that will be for plain-text analysis; (5) features (VFS) Module, which enables examiners
multiple case management, allowing to mount computer evidence as a read-
assigned to them. Furthermore, there
investigators to simultaneously run only off-line network drive, which allows
has been a commitment from the US multiple cases on multiple media targets; further examination of the evidence
State Department to upgrade the (6) fully supports Unicode, and thus using Windows Explorer and 3rd party
knowledge of the Bureau’s agents displays the characters in various tools; and (3) a Network Authentication
language correctly; (6) fully supports Server (NAS) Module, which provides
involved in computer forensics.
Dynamic Disk Configurations, i.e. complete flexibility in EnCase software
Dynamic Disks being hard drives that licensing. NAS enables EnCase software
Since the pieces of equipment were are upgraded to Dynamic Disks by licenses to be utilized in 3 ways; local
donated, at least 20 cases have been Microsoft Windows 2000 or XP using the on the Examiner computer, remotely
Disk Manager; (7) comes with both a with Terminal Services, and across the
examined. The tools have been
parallel-port lap-link cable for parallel- network using the License Manager. See
effective and efficient in all cases port cable acquisitions and a crossover http://www.guidancesoftware.com/
wherein a computer is used, allowing network cable for crossover network 3. Forensics Toolkit (FTK) is a product of
evidence coming from formatted hard cable acquisitions; (8) stores evidence Access Data. Forensics Toolkit (FTK)
files on shared media for either data allows one to view over 270 different
disks and systems with deleted files and
retention or examination at a later date; file formats with Stellent's Outside In
changed operating systems to be (9) maintains complete records of all Viewer Technology. Its FTK Explorer
secured and used for investigation. In keyword searches that have been allows one to quickly navigate through
one case involving malicious electronic conducted including the time of the acquired images. It can generate audit
search, the scope of media examined, logs and case reports. Its features include
mails(e-mails), the e-mail was traced
the keyword and GREP expression and (1) Advanced Searching, which includes
through domain check8 and trace the number of search results, with (a) Full text indexing powered by
scouting. The moment the origin was bookmarks being easily displayed and dtSearch® yields instant text search
traced, the Bureau applied for a search incorporated into the final EnCase results, (b) Advance searches for JPEG
report; (10) automatically generates a images and Internet text, (c) Locate
warrant and recovered the computer
customized report that details the binary patterns using Live Search, (d)
used. In another case involving drug contents of the case, including relevant Automatically recover deleted files and
trafficking, a raid upon a syndicate’s evidence, investigator comments, partitions, and (e) Target key files quickly
bookmarks, recovered images, search >> [ 64] Computer Forensics

13
Computing

LEGAL MINUTIAE ON E-MAILS


by Jaime N. Soriano

E
T lectronic mail (or usually
known as ‘e-mail’) is one of the most
popular and widely used features of
present-day Internet technology. In
fact, it is dubbed as the “killer
application” of the Internet. Billions of
people send and receive e-mail
messages everyday. Many studies have
shown that the bulk of network traffic
in the Internet is e-mail related. This
documents, spreadsheets, graphics,
video, pictures, applications or
executable files, or it could be in the
form of encrypted message containing
classified information.

E-mail users must have an email


address consisting of two (2) parts
separated by the symbol @: the user
or account name and the domain
these processes in the same machine:
POP3 (Post Office Protocol 3) and
SMTP (Simple Mail Transfer Protocol).
These processes are linked by an
internal mail delivery system that
moves the mail between POP3 and
SMTP servers.

POP3 servers hold e-mails in a queue


and deliver them to the client when
technology has even posed a serious name (the Internet registered name for requested. SMTP receives outgoing
threat to the viability, if not the the entity). Ex: e-mails from clients and sends and
existence, of postal and facsimile myname@domain.com. receives e-mail from other SMTP
service systems. servers. In order for clients to collect
The e-mail system is based on a e-mail from e-mail servers, they also
It is understandable why e-mail is very “client-server model”. use POP3 servers. Clients must supply
popular. It is fast because transmission a username and password to the server
and exchange of information happens The e-mail client carries the user’s in order to log into their account or
in real time. It is cheaper compared to interaction with the server. It can either POP3 mailbox. The e-mail server will
other forms of communication be: application-based (like Outlook or respond with the number of messages
technology. It can accommodate large Eudora) or web-based (like Hotmail or waiting and the client can initiate a 'de-
streams of data in text and other forms Yahoo). E-mail clients carry other queue' command to download the
of multi-media, as attachments. It is functionalities like an address book and queued e-mails. The messages will
capable of sending messages and data an organized e-mail message display. either be deleted from the e-mail
simultaneously to various recipients. It It also holds the account information server or marked as read so they are
is user friendly because it does not of the user, the IP (Internet protocol) not downloaded again.
require special technical skills or address and the e-mail server to which
knowledge to use e-mail. It can be it communicates in sending and IMAP (Internet Message Access
integrated, or capable of converging, receiving electronic messages. Protocol) may be used in lieu of POP3
with other communication technology for accessing e-mail stored on a server.
like cellular phones. It is capable of The e-mail server is the host computer It is a protocol that allows users to
preserving and following the trail of with a large storage capacity that perform certain e-mail functions on a
data or information transmitted operates a combination of processes, remote server rather than on their local
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

through the network. And it supports lists the users, defines rules and computer. The fundamental difference
the application of data protection and protocols, and sends, receives and between accessing e-mail via IMAP as
security tools, like encryption, stores electronic messages including opposed to POP3 is that the former
password, cryptography, electronic attachments without frequent user does not download the messages and
signature, and anti-virus software, intervention. store them locally as POP3 does. All
which would enhance integrity and message manipulation, such as
reliability of communication. An e-mail server has one or more opening, closing and deleting, is
unique TCP/IP (Transmission Control carried out on the server. This makes
The E-Mail System Protocol/Internet Protocol) address that backup simpler and security tighter
identifies the network address of the since no emails are actually stored
E-mail is the system of transmitting machine or the domain represented locally on the users’ personal
computer-based messages over by 4 block numbers from 0 to 256 computer.
telecommunications technology. separated by dots. TCP/IP uses ports
to allocate different jobs for different SMTP is the language that most mail
An e-mail can be a simple text Internet services like file transfer, servers use to send messages between
message, a hypertext (linked) message, browsing or email. The e-mail server each other. When a message is sent,
or it could include attachments of conducts e-mail services by running it uses DNS (short for ‘domain name

14
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
service’) to convert the domain part of and reply services they require. or distribution of these works as
an email address (i.e. @domain.com) Generally, the use of third party web attachments in e-mail messages
to the TCP/IP network address of the mail is discouraged, unless the service disseminated to the public under
machine that maintains the domain. It is properly controlled and monitored. circumstances defined in Section
then connects to that IP address using 177 of the law may constitute
port 25 and communicate the sender's Legal Risk in Sending E-Mails infringement of copyright. Also,
and recipient's email addresses and the Section 33 (b) of the E-
body of the message. SMTP can only The following are the possible risks in Commerce Act of 2000 (Republic
transmit text. Thus, this creates a sending e-mail messages: Act No. 8792) also penalizes
problem when it comes to sending piracy, and unauthorized copying
images, video and other attachments · the content of e-mail messages and distribution of protected
via e-mail. SMTP gets around this could be the basis for a libel or materials.
problem by using two different damage suit. Over an e-mail that
methods: Uuencode (Unix-to-Unix criticized her talk show and her · sending spam and unsolicited e-
encode) and MIME (Multi-Purpose persona, television personality and mails could be an unfair business
Internet Mail Extension). actress Kris Aquino filed a libel suit practice. In October 2003, the
claiming P80 million in moral Santa Clara County Superior
Uuencode assumes that the file or damages against GMA Channel Court in California ordered PW
attachment contains binary information 7 executives. 1 Marketing and owners Paul Willis
(1s and 0s). It converts this binary and Claudia Griffin to pay $2
information into text using a simple In October 2000, a disgruntled million in civil penalties in an anti-
mathematic equation, similar to ex-employee who made false spam lawsuit for violating state
encryption. Once UUencode has accusations against a former laws prohibiting unsolicited
converted an attachment into text, it employer through a series of e- commercial e-mail, false
can now travel via SMTP. The need mails under a false name using a advertising and unfair business.4
for a system to translate the array of hotmail account has been ordered The Philippines has no anti-spam
constantly changing attachment to pay £26,000 damages and law at the moment.
formats that could not be handled by costs estimated at £100,000 in a
Uuencode led to the development of landmark ruling before the civil · an e-mail message is admissible
MIME. The latter works in a similar courts in UK. Despite the denial as evidence in law as it has the
way as the Uuencode but creates a of having sent the e-mails, expert functional equivalent of a written
header that it wraps around each evidence traced the e-mails back, document and could establish a
encoded attachment that permits the via the IP address, to a laptop used right or extinguish an obligation
encoding of sound and images. The to send the emails. The hunt for in our jurisdiction. With the
choice between using Uuencode or for the ex-employee included enactment of the Rules on
MIME is normally dictated by the disclosure orders being issued Electronic Evidence by the
sending email server. against ISP CompuServe and Supreme Court, 5 an e-mail
Microsoft to force them to hand message can be deemed as
E-mail servers could also be: a local over account information. 2 electronic evidence and is
mail server or a web mail server. admissible as evidence in courts
In another case on September and quasi-judicial bodies for civil,
A local email server provides a single 2001, two London lawyers faced criminal and administrative cases
point where all e-mail traffic can be a lawsuit for sex and racial provided it is competent, relevant
monitored and controlled to prevent discrimination over an e-mail in and can be authenticated in the
the spread of viruses and other which one of them asked for a manner provided for by the Rules.
potentially harmful content. Interaction 'busty blonde' as a replacement for
is application-based using an email their black secretary. 3 Legal Threats in Receiving E-
client. Mails
· sending e-mail attachment of
A web mail server (like Hotmail or copyrighted work could result in In receiving e-mails, the users are
Yahoo), on the other hand, has the infringement suit and criminal exposed to a wide array of on-line
advantage of accessibility and prosecution. Under Section 172.1 fraud, cyber crimes or potential harm
convenience. It is possible to provide of the Intellectual Property Code or damage to the users’ computer
web mail services on a local e-mail (Republic Act No. 8293) certain systems, like the following:
server that can be accessed from off- literary and artistic work are
site locations. Web mail does not have protected from the moment of their · Phishing. On 10 January 2004,
the full feature set of an installed client, creation. This protection includes a Citibank ‘phishing’ e-mail began
such as Outlook or Eudora, but users musical composition and making the rounds, warning
find that it fulfils the basic read, write computer programs. Reproduction Citibank customers of possible

15
fraud affecting their accounts and different computer viruses that interference in a computer
urging them to login to check the proliferate in the Internet. A ‘virus’ system/server or information and
status. "Phishing" is an e-mail scam is a computer program that harms communication system; or any
designed to defraud customers of and halts computer systems and access in order to corrupt, alter,
their credit card numbers and memory. It is capable of steal, or destroy using a computer
other personal information that transmitting itself across the or other similar information and
can then be used for identity theft. network without the knowledge of communication devices, without
Typically, the email message the user even bypassing security the knowledge and consent of the
employs some kind of scare tactic systems. At the moment, owner of the computer or
designed to entice users into visiting computer viruses are easily information and communications
a site and divulging their critical acquired through e-mails. system.
financial and personal details.
Unsuspecting users of Internet · Nigerian E-Mail Fraud. In this Legal Protection in E-Mail Usage
Explorer are duped into believing scheme, the user will receive an
they are on one website when in e-mail message from a stranger There are various means available to
fact they are on another. The purporting to have access to protect e-mail users from risk, legal
exploit involves inserting the hex millions of dollars of funds. The or otherwise. Some of these measures
0x01 between the legitimate site's bait is the fictional millions of include:
address and the actual hosting dollars described in the message
address. This causes the legitimate usually based on verifiable · Entities must adopt a “content
website address historical facts. The goal of this security policy” where employees
(www.citibank.com) to appear in ‘advance fee fraud’ is to get the acknowledged that the web and
the address bar, but the actual site victim to come up with money for email system belong to the
being displayed is that of the the "expenses" required to transfer company and may be monitored.
criminal, in this case a North those millions of funds The victim
Korean website. 6 thinks, a few hundred or a few · Installing enforcement, blocking or
thousand dollars is trivial when filtering tools” to block
· Spam. Spam e-mail is generally $31 million is at stake. Each communications with illegal,
defined as the sending or demand for more money is malicious or spam messages.
transmission of unsolicited e-mail, claimed to be the very last
usually to many people. A obstacle before the big money is · Adopting the use of “legal
message written for, and mailed released. Sometimes, the victim disclaimers” in sending e-mail
to, one individual that is known to is lured to Nigeria, where even messages.
the sender is not spam, and a reply worse things happen. E-mail
to an e-mail is not spam, unless addresses are obtained in the · Implementating an “acceptable
the "reply" repeats endlessly. same way that spammers get use policy (AUP)” for e-mails
Spammers intrude e-mail filtering them. Perpetrators of this fraud
methods by using different email are normally ruthless and violent · Choosing a “reliable ISP” (Internet
address for each mailing, or the criminals. 8 Service Provider) to serve e-mail
most common, by forwarding his requirements.
email through an intermediary to · Stealing Personal Data. In The
conceal the actual origin of the most common type of email fraud · Preferably, using an “application-
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

mail. Spam is basically utilized as include email messages sent to the based e-mail client”.
a marketing tool for business. It user for the purpose of stealing
proliferates because of the personal and financial · Keeping the “confidentiality of
widespread use of e-mails. It information. These emails claim passwords and other vital
virtually costs nothing to send to be from legitimate sources the information”.
emails and spammers find the lack user use and trust and try to entice
of adequate e-mail regulations as him to provide different types of · Installing reputable “anti-virus
a good recipe for exploitation. 7 personal and confidential programs” to screen all e-mails
The Philippines has no specific law information including online ID's, messages and “anti-spyware or
against spammers. But Article 19- passwords, Social Security adware application” when going
21 of the Civil Code on human number and bank account on-line.
relations may be the basis to claim numbers. In this jurisdiction,
damages subject to the issue of Section 33 (a) of the E- · Installing “firewall” systems (both
jurisdiction over the violator. Commerce Act of 2000 (RA hardware and software). Firewall
8792) penalizes “hacking” or is a device that explicitly controls
· Viruses. Almost everyday, e-mail “cracking” which refers to network access to computer
users have to contend with unauthorized access into or network and allows the users to

16
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
monitor the type of traffic passing authorities) are generally exempt from email users even find it bad
in and out of the network and react civil and criminal liabilities with respect netiquette to include more than
accordingly. to electronic messages while acting as the basic level of information
a service provider or content required in each
· Observing the proper “netiquette” mail. Even so it is important to
(or the etiquette-of-the-Net or the Finally, any person who obtained realise that emails cannot be
appropriate behavior to follow access to any electronic key, electronic considered to be private or
when communicating online, data message, or electronic document, confidential and are subject to
particularly in e-mail). book, register, correspondence, both copyright and libel laws.
information, or other materials are Emails should never be
· Exercising and observing proper bound by the rules on confidentiality intimidating, hostile or offensive
“caution in your language” when and cannot convey or share the same on the basis of sex, race,
sending, or replying to, e-mail. with any other party under Section 32 colour, religion, national origin,
of the E-Commerce Act of 2000. sexual orientation or disability.”9
· Adopting the use of “electronic
signature” (any distinctive mark, A Final Word
characteristic and/or sound in Endnotes
electronic form, representing the E-mail is a great wonder of present-
identity of a person and attached day information technology. The 1 Cruz, Marinel R. "Kris Aquino rejects
to or logically associated with the following article culled from the GMA 7 apology." Inquirer News Service,
electronic data message) Internet would verily explain why. 14 July 2004. <http://www.inq7.net/
Thus: ent/2004/jul/15/ent_1-1.htm>
· Investing in the use “digital ID or 2 Morris, Pete. "Court makes landmark
signature” or “cryptographic “Email gave early users – and email libel ruling." VNUnet.com, 13
systems” (devices to encrypt still gives current users – a form October 2000. <http://
messages into a secret code of equality. In a paper www.vnunet.com/news/1112449>
provided by reputable so-called published in 1978 by the 3 Harrison, Linda "‘Busty blonde’ email
certification authorities) Institute of Electrical and lawyers face lawsuit." The Register, 6
Electronic Engineers, two of the September 2001. <http://
· Printing and keeping a file of the important figures in the www.theregister.co.uk/2001/09/06/
printed copy of, vital e-mail creation of the ARPANET, J C R busty_blonde_email_lawyers_face/>
communication or messages. Licklider and Albert Vezza, 4 "Attorney General Lockyer Wins First-
explained the popularity of Ever State Lawsuit Against Spammer:
· If available, obtaining “liability email: ‘One of the advantages Court Curbs PW Marketing's Business
insurance” policies for Internet of the message systems over Practices and Requires Firm to Pay $2
and e-mail. letter mail was that, in an Million." Office of the Attorney General,
ARPANET message, one could State of Californiam 24 October
The foregoing measures are by no write tersely and type 2 0 0 3 . < h t t p : / / w w w. a g . c a . g o v /
means exhaustive but their application imperfectly, even to an older newsalerts/2003/03-130.htm>
in computer systems would certainly person in a superior position 5 A.M. No. 01-7-01-SC effective 1 August
give ample legal protection to e-mail and even to a person one did 2001
users from unscrupulous individuals not know very well, and the 6 Landesman, Mary. "Citibank phishing
and entities in cyberspace. recipient took no offence. email." About.com, 28 March 2004.
Among the advantages of the <http://antivirus.about.com/cs/
Other Legal Points in E-Mail network message services over allabout/a/citiphish.htm>
Usage the telephone were the fact that 7 P. Lutus. The Anti-Spam Home Page
one could proceed immediately <http://www.arachnoid.com/lutusp/
E-mail users must always remember to the point without having to antispam.html>
that there is a way to trace e-mail engage in small talk first, that 8 Kestenbaum, Lawrence. "Nigerian Fraud
identity even if anonymous e-mail the message services produced Email Gallery." <http://
addresses are used. If users think that a preservable record, and that www.potifos.com/fraud/>
they can hide under the cloak of the sender and receiver did not 9 How Wmail Works. British Educational
anonymity in the information have to be available at the Communications and Technology
superhighway, they are mistaken. same time. Agency (BECTA), September 2004.
<http://www.becta.org.uk/subsections/
Under Section 30 of the E-Commerce Email still presents this equality f o i / d o c u m e n t s /
Act of 2000 (Republic Act No. 8792) to users today; it is possible to technology_and_education_research/
value-added service providers (like transcend barriers of race, how_email_works.doc>
ISPs, e-mail servers and certification culture and wealth. Some

17
Computing

P2P: PIRATE TO PIRATE TOWARDS ACTUAL PEER-TO-PEER


by Michael Vernon M. Guerrero

T ransferring files over


the Internet have been normally been
made using email (SMTP) and file
transfer protocol (FTP), for smaller files
and larger files, respectively although
not exclusively. These methods use the
client-server model where
communication is relayed by servers
to clients. With email, data is
the network, by aggregating the
resources of a large number of
independent nodes in P2P systems,
allowing applications to scale without
the need of powerful and expensive
servers, and thus reducing the cost of
sharing data unlike if servers would
be utilized.
distribution of material with little or no
accountability for it, such demand for
such networks increased especially
after the Recording Industry Association
of America (RIAA) clamped down on
individual P2P users in 2003. Such
generation of anonymous networks
includes Freenet, I2P, and GNUnet. 3

transmitted to the server for delivery, Simply said, users of P2P networks Underutilized and imperfect tool
transmitted to the destination between need not be aware of matters involving
servers, and is fetched later by the server administration, but would Although regarded generally as file
receiving client. With FTP, data is merely install P2P software in their sharing networks, most of the
transmitted to the server for storage, regular computer, for them to acquire commonly shared files are either
and is fetched by the receiving client and share various media stored in their copyright-protected materials, such as
from said server. These were the shared folder. P2P users are further mp3 music files and DivX 4 movie files,
modes of file transfer before peer-to- allowed to download component parts or adult-oriented media. The use of
peer computer networks or internet- of a file they are interested in from P2P networks, therefore, is rendered
based file-sharing networks became various users of a P2P network, instead limited by such content; unlike non-
popular. of relying on a single source or website P2P tools, such as email, which has
for the whole file. Anyone who has cut across gossip, protected content,
Peer-to-Peer (P2P) used the first version of Napster and and forwarded feel-good messages
the now popular Kazaa would have towards legitimate and useful
A peer-to-peer (P2P) computer an idea of how P2P networks work. communication purposes. The trend
network is a network that mostly uses does not appear to go to the other
direct connections between peer nodes It was in 1984 that the phrase “peer direction with regard to P2P systems
(clients). Such peer nodes to peer ” was used, with the as content demand remains towards
simultaneously function as both clients development of the “Advanced Peer the illegal and titillating than on the
and servers to other nodes on the to Peer Networking” architecture at legitimate and “boring.” This trend
network. Any node, thus, is able to IBM. This referred to earlier research- may not be overturned in the
initiate or complete any supported and business-oriented peer-to-peer immediate future until there is serious
systems, which predated popular
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

transaction with any other node. Peer initiative towards the legitimate use of
nodes may vary in local configuration, internet-based file-sharing networks. P2P networks, such as for academic
storage quantity, processing speed, The first generation of Internet P2P or research purposes, or even for
and network bandwidth. File sharing networks had a centralized file list, business purposes such as hiring. Such
networks such as FastTrack, FreeNet, which the courts of the United States turnabout is not farfetched, as the
GNUtella, and OpenNap are deemed to be infringement of Internet itself has been transformed
examples of such.1 copyright. This generation includes the from academic and scientific to
first version of Napster. 2 After media proprietary over the years.
P2P networks have become a popular companies prevailed over Napster, a
medium through which users share new generation of P2P networks Considering that increased legitimate
huge amounts of data. The bandwidth emerged. They had decentralized file use of P2P systems may be possible,
of all clients or nodes can be used fully lists, and had improvements like certain challenges must be overcome
and that the available download distributed hash tables (DHT) and other before the potential of such systems
bandwidth may increase due to the optimizations for decentralized search. may be realized. For one, the scale of
increase in the number of nodes. Such This generation includes GNUtella and the network and the autonomy of nodes
networks also distribute the cost of FastTrack (specifically Kazaa). As make it difficult to identify and distribute
sharing data among peers (clients) in anonymous P2P networks allow for the resources that are available. As the

18
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
system is dynamic, with nodes software in interstate commerce; (2) said networks would only highlight the
constantly joining and leaving, the Government Network Security Act fact that there is a shortage of
resources and resource demands are of 2003 [HR3159], which seeks to ingenious solutions to prevent
constantly changing, making it difficult require Federal agencies to develop transmission of prohibited media by
to determine which resources are and implement plans to protect the infringers and perverts. The solution
indeed available. Further, some peers security and privacy of government being proposed, i.e. closing the venue
may be malicious and, thus, peers may computer systems from the risks posed of possible malefactors, is clearly and
receive inauthentic information or may by peer-to-peer file sharing; and (3) arbitrarily desperate. For one, sharing
be victims of denial-of-service (DoS) Piracy Deterrence and Education Act case digests over Kazaa or Limewire
attacks. 5 Due to the anonymity of users of 2004 [HR4077]. is an interesting thought.
in certain networks or due to the ease
Endnotes
of changing profiles, it would be Similar legislation are also pending with
difficult to pinpoint and report the Philippine Congress, although 1 Other examples are those of Applejuice
malicious users at a given time. 6 focusing more the general issues, such (which includes Applejuice Client),
as Internet piracy and child BitTorrent (which includes ABC, Azureus,
BitAnarch, BitComet, BitSpirit,
Moderating the P2P threat pornography, through all Internet
BitTornado, BitTorrent, BitTorrent++,
protocols and not necessarily through BitTorrent.Net, G3 Torrent, mlMac,
Due to the prevailing content provided peer-to-peer networks only. Among MLDonkey, QTorrent, SimpleBT,
by nodes in P2P networks, such these are: (1) An act amending certain Shareaza, TomatoTorrent, and
TorrentStorm), CAKE (which includes
networks pose grave threats to provisions of Republic Act No. 8293,
BirthdayCAKE), Direct Connect (which
established media companies. Thus, entitled “An act prescribing the includes BCDC++, CZDC++, DC++,
these P2P networks have been targeted intellectual property code and NeoModus Direct Connect, and
by industry trade organizations, where establishing the intellectual property JavaDC), eDonkey (which includes
aMule, eMule, LMule, MindGem,
the latter spend large amounts of office, providing for its powers and
MLDonkey, mlMac, Shareaza, and
money attempting to lobby lawmakers functions and for other purposes,” xMule), ed2k or eDonkey 2000 (which
for legal restrictions. Industry [HB00322] which seeks to amend the includes eDonkey, and eMule), FastTrack
organizations have not been successful Intellectual Property Code through the (which includes giFT, Grokster, iMesh,
Kazaa, Kazaa Lite, K++, Diet Kaza,
in its advocacy to subvert the operations integration of comprehensive, efficient
CleanKazaa, Mammoth, MLDonkey,
of P2P networks, but have been and adequate strategies designed to mlMac, and Poisoned), Freenet (which
relatively successful in protecting its respond to Internet piracy, among includes Entropy, Freenet, and Frost),
intellectual property rights before others; and (2) An act seeking to Gnutella (which includes Acquisitionx,
BearShare, Gnucleus, Grokster, gtk-
Unted States courts, as may be seen improve child protection against abuse,
gnutella, Limewire, MLDonkey, mlMac,
in the Napster case (infringement) and exploitation and discrimination, Morpheus, Phex, Poisoned, Swapper,
recently involving Kazaa (as to amending for the purpose Republic Act Shareaza, and XoloX), Gnutella2 (which
infringing users’ identities). No. 7610, as amended by Republic includes Adagio, Gnucleus, MLDonkey,
mlMac, Morpheus, and Shareaza), Joltid
Act No. 7658, otherwise known as the
PeerEnabler (which includes Altnet,
Due to the networks’ parallel “Special Protection and Discrimination Bullguard, Joltid, Kazaa, and Kazaa Lite),
functionality as to other methods of file Act”, appropriating funds therefor and Kademlia (which includes eMule,
transfer, such networks may also for other purposes, [HB01961] which MindGem, MLDonkey, and VarVar),
Manolito/MP2P (which includes
collectively turn into an alternative seeks to impose penalty for child
Blubster, Piolet, and RockItNet), Napster
forum to malefactors, such as terrorists, pornography through the internet and (which includes Napigator, OpenNap,
or may become a medium for the mandates the creation of a central data and WinMX), WPNP (which includes
dissemination of their propaganda. bank to monitor abuses made by WinMX), among other networks
(including Akamai, Alpine, Ares Galaxy,
Further, the networks are increasingly foreigners against children and prevent
Audiogalaxy network, Carracho, Chord,
becoming alternatives to websites their reentry, among others. The Circle, Coral, Dexter, Diet-Agents,
containing child pornography, which EarthStation 5, Evernet, FileTopia,
are currently being effectively clamped Conclusion GNUnet, Grapevine, Groove, Hotwire,
iFolder, konspire2b, MUTE , and
down.
OpenFT). See Peer-to-peer. Wikipedia,
Peer-to-peer systems are tools that the free encyclopedia. http://
Current file-sharing legislation may serve legitimate purposes, en.wikipedia.org/wiki/Peer-to-peer
although they are currently being used 2 For a digest of A &M Records Inc. vs.
Napster, see Volume 1, Issue 2, page 15
The following bills are, as of this writing, more extensively for less than legal
of the Philippine Quarterly IT Law
pending in the United States Congress: ends. Subverting said networks, in Journal.
(1) Protecting Children from Peer-to- general, would negate technological 3 Peer-to-peer. Wikipedia, the free
Peer Pornography Act of 2003 [HR advances as to avenues for Internet- encyclopedia, supra.
4 DivX® is the brand name of the world’s
2885], which seeks to prohibit the aided communication, especially as to
distribution of peer -to-peer file trading distributed file sharing. Shutting down >> [65] P2P: Pirate to Pirate

19
Telecommunications

VOIP: TO REGULATE OR NOT TO REGULATE


by Mary Ann Ll. Reyes

V oice Over Internet Protocol


(VoIP) is taking the world by storm, not
only because it offers a cheaper
alternative to the voice calls made
through the traditional circuit switches,
but because many governments,
including the Philippines, do not have
a policy in place to deal with this new
technology.
telecommunications players, new
entrants and the general public will not
be an easy regulatory task, particularly
because

VoIP does not fit neatly within the model


provided under Philippine law which
has traditionally treated voice and data
services differently.
VoIP in a nutshell

The NTC in its paper defines VoIP as a


generic term that refers to all types of
voice communication using Internet
protocol (IP) technology, instead of
traditional circuit switched technology.
This includes use of packet
technologies by telecommunications
companies to carry voice at the core
Both the National Telecommunications “As the Internet becomes available over of their networks in ways that are not
Commission and Congress are virtually all technologies and platforms, controlled by or apparent to end users.
currently looking into possible from traditional fixed copper lines to
regulatory frameworks for VoIP. The satellites to mobile phones and to It basically enables users from different
Department of Transportation and cable, to name just the most obvious, parts of the world to engage in voice
Communications as early as Nov. of market dynamics are changing faster conversations, even long distance ones,
2003 directed the National than laws and rules,” the NTC said. without having to pass through part or
Telecommunications Commission all of the telecommunications facilities.
(NTC) to promulgate the necessary In a discussion paper circulated Using VoIP, a person could engage in
implementing rules and regulations recently, the NTC pointed out that in international voice conversations
and guidelines that will govern the coming up with VoIP guidelines, the without having to pass through – and
deployment and use of VoIP by commission is guided by two principles. pay for the use of - the international
businesses and the general public. The first is technological neutrality gateway facilities of telephone
which means that future VoIP companies who charge much higher
More than a year since the DOTC regulation, if at all, should neither fees for the use of their networks.
issued the directive, the NTC has yet impose nor discriminate in favor of the
to come up with the appropriate use of a particular type of VoIP Internet telephony, on the other hand,
guidelines. The task is not easy – there technology, especially considering that is a specialized form of VoIP in which
are the big telephone companies on various methods already exist, and a regular voice telephone call is
the one hand who want exclusive rights indeed, that other methods could still transmitted via the public Internet, thus
to offer VoIP to the public, and there be developed in the near future for bypassing all or part of the public
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

are the Internet service providers and accessing a VoIP network. Second is switched telephone network (PSTN).
other service providers on the other regulatory forebearance. The NTC Internet telephony can occur between
hand who are pushing for a stressed that it must be careful when computers, between a computer and
deregulated approach to VoIP. deciding whether or not to regulate an a phone, and between phones.
emerging technology or service like
The issue however boils down to a VoIP. Given what is admittedly a slow Legal and regulatory framework
determination of the nature of VoIP pace of regulatory change,
under Republic Act no. 7925 or the telecommunications, or more According to NTC commissioner
Public Telecommunications Policy Act appropriately, information technology Ronald Solis, whether or not VoIP should
of 1995 and a resolution of the markets, can easily evolve as a result be regulated and who should be
perplexing question of whether or not not of technological innovation and allowed to offer it would largely
there is legal basis to regulate VoIP. economic forces, but of regulation. This depend on the determination of its
possibility is one which the NTC is classification either as a basic
The NTC itself admits that reconciling seeking to avoid. telecommunications service or a value-
the interests of government, added service (or enhanced service).
And Secretary Virgilio Pena, head of

20
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
the newly created Commission on the transmission, switching, and local Wisconsin requested VoIP providers to
Information Communications and distribution of facilities of the local file an application for authority to
Technology (CICT) to which the NTC exchange and inter-exchange provide telecom services within the
is now an attached agency, believes operators, and overseas carriers, offer state. In contrast, Florida passed
that any set of rules that will ultimately enhanced services beyond those legislation largely exempting VoIP
govern VoIP should be in consonance ordinarily provided by such carriers. services from regulation, but that
with RA 7925, particularly on what Unlike PTEs, VAS providers cannot put legislation did not address the
constitutes basic service and VAS. up their own networks, although they applicability of access charges to VoIP
are not required to obtain their own offerings.
There is no question that duly franchise. They are merely required
enfranchised public to register with the NTC. Canada, meanwhile, makes a
telecommunications entities (PTEs) can distinction between Internet data
and are allowed, under law, to offer The nature of VoIP applications, which are free from
VoIP to the public. But in the context of regulation, and Internet applications
converging technologies and services, In this context, the NTC said that the that provide an alternative to public
it is now also possible for other non- main legal question that it must resolve switched voice services, which are
PTE entities such as cable companies pertains to the legal nature of VoIP – regulated. IP telephony between
and ISPs to also offer VoIP services to whether it should be considered as a telephones, therefore, is subject to
subscribers and the general public. ‘telecommunications service,’ or as a regulation. IP telephony service
‘value added service.’ providers are treated like any other
RA 7925, defines telephony service providers and must
‘telecommunications’ as any process The question is crucial because if VoIP contribute to universal service funds,
which enables a telecommunications is classified a value-added or but only if the service they provide is
entity to relay and receive voice, data, enhanced service, then there would between telephones.
electronic messages, written or printed virtually be no legal restrictions on ISPs
matter, fixed or moving pictures, words, and potential providers other than PTEs In India, VoIP is allowed, but only for
music or visible or audible signs or any to offer VoIP as a separate and distinct communications from computer to
control signals of any design and for service for compensation to the public. computer while Vietnam allows
any purpose by wire, radio, or other outbound Internet-based calls from
electronic, spectral, optical or But if VoIP is deemed to be a computer to computer, and from
technological means. telecommunications service, on the computer to telephone, but prohibits
other hand, ISPs and potential inbound Internet phone calls.
Only PTEs, defined as any person, firm, providers other than duly enfranchised
partnership or corporation, and authorized PTEs can be allowed The European Commission as taken
government or private, engaged in the to offer VoIP for compensation, but only the position that Internet voice services
provision of telecommunications by entering into separate agreements do not constitute voice telephony
services to the public for compensation with duly enfranchised PTEs. unless: they are offered commercially
may provide basic telecommunications and separately to the public as voice
services.RA 7925 also requires all Approaches of Other services; they are provided to and from
persons or entities intending to Jurisdictions PSTN termination points; and, they are
commence or conduct the business of offered in real time at the same level
being a PTE to first obtain a legislative The legal classification of VoIP is a of speech quality and reliability as
franchise, and to apply for a Certificate regulatory puzzle that is not unique to offered by the PSTN.
of Public Convenience and Necessity the Philippines.
(CPCN) from the NTC to engage in a The EU presently holds that VoIP does
particular telecommunications service. In the United States, Minnesota, New not fit the definition of
In the latter case, it must show that it York and Wisconsin have all found VoIP telecommunications because it does not
has the legal, financial and technical to be subject to state involve direct speech transport in real
fitness to operate the service. telecommunications regulation to some time. However, recent improvements
degree. Minnesota in 2003 ruled that in the quality of service and the growth
Under the current legal regime, Vonage’s VoIP offering is a of the European VoIP market could
Internet Service Providers (ISPs) are “telecommunications service” and that eventually induce the EC to review its
not considered as PTEs. They are accordingly, Vonage should comply position.
categorized as value added service with all state telecom regulations. New
(VAS) Providers, defined under RA York found that a VoIP provider was The NTC has laid down several issues
7925 as (entities) which, relying on subject to access charges. And that will have to be resolved in order

21
that it may be properly guided in amendment would supersede any went through the mandated process,
coming up with an acceptable and guidelines issued by the NTC. and they would have no chance in
viable regulatory framework for VoIP. competing with a new breed which will
Among these are: Telcos speak out not be regulated and not required to
pay the numerous taxes and regulatory
* What, under Philippine law, is the The Philippine Chamber of fees to which PTEs now are subjected.
proper regulatory classification Telecommunications Operators, whose It would be not fair for the government
for VoIP services members include the Philippine Long now, after requiring the huge
(telecommunications or value- Distance Co. (PLDT), Globe Telecom, investments, to just say let another
added) Smart Communications Inc., Bayan alternative voice service take over
Telecommunications Inc., Digital because it costs less. This alternative
* Who should be allowed to use, Telecommunications Phils. Inc., want service appears to cost less because it
provide and/or benefit from VoIP VOIP regulated. will ride parasite-like on existing
in the Philippines? infrastructure at very minimal
They argued that VOIP cannot be expense,” Salalima added.
* At this time, should the NTC issue classified as a value-added service
rules and/or guidelines for VoIP? (VAS) simply because VOIP is But ISPs say otherwise
marketed as a telephone service, a
* From a regulatory standpoint, service which is already being offered The Philippine Internet Services
should the various categories (PC by existing carriers who have complied Organization (PISO) maintains that as
to PC, PC to phone, Phone to with the law to put up at least four a product of Internet technology and
phone IP telephony) be subject to million fixed lines before they were as one which uses the Internet Protocol
similar or different treatment? allowed to operate. instead of relying on the traditional
switching mechanism to exist, VoIP is
Congress looks into VoIP “The reality is that VOIP is marketed clearly not a traditional
as a telephone service, that is, a person telecommunication services but an
THE House committee on information using a telephone set can talk over the enhanced service and therefore a
and communication technology has system to another person at the other value-added-service.
formed a technical working group to end using a telephone set. That is why
resolve the long standing debate on it is aptly called Internet Telephony. And It stresses that the general public should
who may deploy VoIP services in the telephony is voice service…The be allowed to use VoIP, in all its forms.
Philippines. moment a VAS provider offers voice PISO has supported the clamor for a
service to the public in exchange for set of rules that will govern VoIP
Committee Chairman and former compensation, such would be a clear because according to its ISP members,
NTC commissioner Simeon Kintanar violation of law, absent compliance because of the uncertainty, incumbent
said that the working group would with the clear statutory requirements,” telephone operators are the only ones
consolidate two bills filed in relation to PCTO head and Globe senior vice benefiting from the technology. The
VoIP into one bill. president Rodolfo Salalima said. NTC, it said, should allow Internet-
based services to develop in an
The dispute, he said, centers on He pointed out that if the NTC allows environment of minimal regulation.
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

whether VoIP services should be VOIP operators to operate freely,


considered voice traffic or a value- without having to comply with the In a position paper submitted to the
added service. Considering VoIP as service area scheme, then they would NTC, the group added that it is
voice traffic would mean that only be riding piggy-bank on the same incorrect to state that
telecommunications companies with a networks constructed by existing telecommunication companies will be
congressional franchise to carry phone carriers who have spent billions of threatened by unfair competition by
calls could offer commercial VoIP pesos to put up the necessary VAS providers especially since
services. infrastructures. providers like ISPs and (hopefully) VOIP
providers, will always use an
He pointed out that the differing “To remove this constitutionally incumbent telecommunication
interpretations of RA 7925 could be mandated rules would be wholly operator for its infrastructure.
resolved by amending the law. An disadvantageous to those entities which

22
Telecommunications

The Philippine Quarterly IT Law Journal :: Volume 2, Number 1


GAMBLING THROUGH SMS
by Mary Ann Ll. Reyes

T he country’s biggest
cellular phone service providers are
opposing an application by the
Philippine Amusement and Gaming
Corp. (Pagcor) with the National
Telecommunications Commission
(NTC) for access codes to engage in
text-based games of chance.
“It is the policy of Globe not to engage
in gambling or to lease its lines for
gambling purposes. Gambling is not
public service,” Salalima pointed out.

Smart Communications legal head


Rogelio Quevedo for his part
emphasized that they are opposing
Pagcor’s application since Smart will
under the law since not all games of
chance involve gambling.

“It is only when there is betting involved


that there is gambling over which
Pagcor has authority to regulate.
Russian roulette is a game of chance.
Does this mean that Pagcor will have
to interfere with private lives. (Pagcor)
Pagcor told the NTC that it is applying not a llow its network to be used for is overexpanding its authority under the
for special access codes (777 and 888 gambling. law but seeking to regulate all games
for authorized play and 787 and 878 of chance when not all promos and
for customer support) in order to While Pagcor representatives games of chance are gambling. Sales
centralize and integrate existing text- maintained that its objective in applying promos for instance are under the DTI
based games of chance, protect the for special access codes it to regulate while it is the NTC that has jurisdiction
public by preventing illegal gambling text games and protect the consumers over telcos,” Salalima noted.
and text scams and eliminating and that it is not its intention to introduce
unregistered gaming providers, and new text games but regulate and As planned by Pagcor, all third party
raise additional revenues for monitor existing ones, they application providers, games
government. nevertheless presented a proposed proponents, and TV games and
Pagcor prepaid card called ‘e-game’ interactive TV programs bef ore they
It is likewise asking NTC that it be with denominations of P500, P1000, can offer text-based gaming will have
furnished a list of all registered value- and P5000. They said that the cards to seek the approval of Pagcor and
added service (VAS) licensees for will only be sold to adults (21 years pass through a Pagcor internet and
purposes of regulating and integrating and above) and that the high card mobile intermediation platform. Only
games of chance providers, even as denominations aim to discourage those Pagcor-approved games will then be
Pagcor pointed out that telcos engaged with limited disposable income from able to use the lines of the telcos.
in gaming activities under VAS are participating.
currently not regulated. Salalima however emphasized that
They said that all players will be there is nothing for Pagcor to regulate
Globe Telecom senior vice president required to register over the air through since text-based gambling does not
Rodolfo Salalima however accused texting with Pagcor and that winners exist. “If Pagcor wants to regulate text-
Pagcor of trying to secure access codes will personally have to claim their based gambling, then going into the
from NTC not for the purpose of prizes by presenting valid government business itself is not the solution,” he
regulating existing games of chance IDs indicating their age. said.
but going into the business itself.
Pagcor said it is mandated under He likewise castigated Pagcor for
He likewise stressed that since there is Presidential De cree no. 1869 to accusing telcos of engaging in
no public service involved but a mere centralize and integrate the right and gambling. “We are not engaged in
attempt of Pagcor to engage in text- authority to operate and conduct gambling and never will. Convict us
based gambling, then Pagcor should games of chance. However, mobile first instead of using us to get your
not secure a special access code from operators and even the Department access code. Do not use the telcos to
NTC but instead get a line from Globe of Trade and Industry claimed that get a line,” he said.
and enter into a commercial Pagcor is overexpanding its authority
relationship with the latter.

23
Jurisprudence in CyberLaw

GLOBE TELECOM VS. NTC


G.R. No. 143964 July 26, 2004

(This section will be a regular feature of the The NTC also declared that both Smart Yet, on Dec. 21, 1999, Globe filed a
journal to highlight significant cases decided
and Globe have been providing SMS motion for partial reconsideration with
in the Philippines and in foreign jurisdictions
relating to information technology) without authority from it, in violation the CA, seeking to reconsider only the
of the said MC which requires public portion of the decision that upheld
by Mary Ann Ll. Reyes telecommunication entities or PTEs NTC’s finding that Globe lacked the
intending to provide value-added authority to provide SMS and its
Facts: The present petition dramatizes services (VAS) to secure prior approval imposition of a fine. Globe reiterated
to a degree the clash of philosophies from NTC. It likewise directed the that it has been legally operating its
between traditional notions of parties to secure the requisite authority SMS system since 1994 and that SMS
regulation and the au corant trend to provide SMS within 30 days, subject being a deregulated special feature of
towards deregulation. to the payment of fine in case of failure the telephone network may be
to do so. operated without prior approval of
Globe Telecom and Smart NTC.
Communications are both authorized Globe filed with the Court of Appeals
under their respective legislative a petition for certiorari and prohibition After the Court of Appeals denied the
franchises to operate a cellular mobile to nullify and set aside the order and motion, Globe elevated the
telephone system (CMTS) using the to prohibit NTC from taking any further controversy to the Supreme Court.
global system for mobile action in the case. The company Smart also now argues that SMS is not
communication or GSM technology. claimed that NTC acted without VAS and that NTC may not legally
Among the inherent services supported jurisdiction in declaring that it had no require either Smart or Globe to
by the GSM network is the short authority to render SMS, pointing out secure prior approval before providing
message service or SMS, also known that the matter was not raised as an SMS.
colloquially as texting which has issue before it at all.
attained immense popularity in the Issue: Is SMS a value-added service
Philippines as a mode of electronic In its memorandum, Globe also called that requires prior approval from the
communication. the attention of the appellate court to NTC before it can be offered?
the earlier decision of NTC pertaining
On June 4, 1999, Smart filed a to the application of Isla Held: In a decision penned by
petition with the National Communications (Islacom) to provide Associate Justice Dante Tinga, the
Telecommunications Commission SMS, allegedly holding that SMS is a Supreme Court held that there is no
(NTC), praying that the commission deregulated special feature of the legal basis under the Public
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

order the immediate interconnection telephone network and therefore does Telecommunications Act or the
of Smart’s and Globe’s GSM not require the prior approval of NTC. memorandum circulars promulgated
networks, particularly their respective Globe alleged that NTC’s departure by the NTC to denominate SMS as
SMS services. According to Smart, from its ruling in the Islacom case VAS, and any subsequent
Globe, with evident bad faith and constitutes a denial of equal protection determination by the NTC on whether
malice, refused to grant Smart’s of the law. SMS is VAS should be made with
request for the interconnection of SMS proper regard for due process and in
as required by law. On Nov. 22, 1999, the CA affirmed conformity with the PTA.
in toto the NTC order. Interestingly, on
NTC then issued the order which is the same day Globe and Smart It added that the NTC may not legally
the subject of the present petition voluntarily agreed to interconnect their require Globe to secure its approval
before the Supreme Court mandating respective SMS systems, and the for Globe to continue providing SMS.
SMS interconnection, since SMS falls interconnection was effected at This does not imply though that NTC
squarely within the definition of “value- midnight of that day. lacks authority to regulate SMS or to
added service” or “enhanced-service” classify it as VAS. However, the move
given in NTC Memorandum Circular should be implemented properly,
No. 8-9-95.

24
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
through unequivocal regulations be secured from it before Globe can the NTC has yet to come out with an
applicable to all entities that are operate SMS. administrative rule or regulation listing
similarly situated, and in an even- which of the offerings in the market
handed manner. The Court noted that instead of today fall under VAS or “enhanced
expressly defining what VAS is, the services.”
In arriving at its decision, the Court first implementing rules defines what
inquired into the PTA, the law that “enhanced services” are, namely: “a Still, there is NTC MC No. 14-11-97,
governs all public telecommunications service which adds a feature or value entitled “Deregulating the Provision of
entities in the Philippines as well as the not ordinarily provided by a public Special Features in the Telephone
authority behind NTC’s cited telecommunications entity such as Network.” Globe invokes this circular
memorandum circular. format, media conversion, encryption, as it had been previously cited by the
enhanced security features, computer NTC as applicable to SMS.
One of the novel introductions of the processing, and the like. Given that
PTA is the concept of a VAS which the the PTA defines VAS as “enhanced An examination of MC No. 14-11-97
law defines as “an entity which relying services,” the definition provided in the further highlights the state of regulatory
on the transmission, switching and local implementing rules may likewise be confusion befalling the NTC. Under the
distribution facilities of the local applied to VAS. Still, the language of said circular, the NTC deregulated the
exchange and inter-exchange the implementing rules is unnecessarily provision of special features inherent
operators, and overseas carriers, offers confusing. Much trouble would have to the telephone network. Special
enhanced services beyond those been spared had the NTC consistently features shall refer to a feature inherent
ordinarily provided for by such used the term “VAS” as it is used in to the telephone network which may
carriers. Section 11 recognizes that the PTA. not be ordinarily provided by a
VAS providers need not secure a telephone service provider such as call
franchise, provided that they do not The definition of “enhanced services” waiting, call forwarding, conference
put up their own network. However, a in the implementing rules, while more calling, speed dialing, caller ID,
different rule is laid down for distinct than that under the PTA, is still malicious call ID, call transfer, charging
telecommunications entities such as too sweeping. Rather than enumerating information, call pick-up, call barring,
Globe and PLDT. The section what possible features could be recorded announcement, no double
unequivocally requires NTC approval classified as VAS or enhanced services, connect, warm line, wake-up call,
for the operation of a value-added the rules instead focus on the hotline, voicemail, and special features
service. characteristics of these features. The offered to customers with PABXs such
use of the phrase “the like,” and its as direct inward dialing and number
Oddly enough, neither the NTC nor implications of analogy, presumes that hunting, and the like; provided that in
the CA cited the above-quoted a whole myriad of technologies can the provision of the feature, no law,
provision in their respective decisions, eventually be subsumed under the rule, regulation or international
which after all, is the statutory premise definition of “enhanced services.” The convention on telecommunications is
for the assailed regulatory action. This NTC should not be necessarily faulted circumvented or violated.& nbsp;
failure, the SC said, is but a mere for such indistinct formulation since it
indicia of the pattern of ignorance or could not have known in 1995 hat Is SMS a VAS, “enhanced service,” or
incompetence that sadly attends the possible VAS would be available in the a “special feature”? The SC noted that
actions assailed in this petition. future. The definition laid down in the even the NTC is unsure. It had told
implementing rules may validly serve Islacom that SMS was a “special
It is clear that the PTA has left open- as a guide for the NTC to determine feature,” then subsequently held that
ended what services are classified as what emergent offerings would fall it was a “VAS.” More significantly, NTC
“value-added,” prescribing instead a under VAS. never required Islacom to apply for
general standard, set forth as a matter prior approval in order to provide SMS,
of principle and fundamental policy by Still, owing to the general nature of even after the order to that effect was
the legislature. The power to enforce the definition laid down in the promulgated against Globe and Smart.
the provisions of the PTA, including the implementing rules, the expectation
implementation of the standards set arises that the NTC would promulgate This inaction, the Court held, indicates
therein, is clearly reposed with the further issuances defining whether or a lack of seriousness on the part of the
NTC. not a specific feature newly available NTC to implement its own rulings. Also,
in the market is a VAS. Such expectation it tends to indicate the lack of belief or
NTC relied on Section 420(f) of the is especially demanded if the NTC is confusion on NTC’s part as to how SMS
implementing rules of the PTA as basis to penalize PTEs who fail to obtain prior should be treated. Given the abstract
for its claim that prior approval must approval in accordance with Section set of rules the NTC has chosen to
11 of the PTA. But the SC noted that implement, this should come as no

25
surprise. Yet no matter how content the is unable to find how exactly does SMS unauthorized provision of SMS, it must
NTC may be with its attitude of sloth “fits into a nicety” with NTC M.C. No. first establish that SMS is VAS.
towards regulation, the effect may 8-9-95, which defines “enhanced
prove ruinous to the sector it regulates. services” as analogous to “format, Thus, the order effectively
media conversion, encryption, discriminatory and arbitrary as it is, was
In short, the legal basis invoked by NTC enhanced security features, computer issued with grave abuse of discretion
in claiming that SMS is VAS has not processing, and the like.” The NTC and it must be set aside. NTC may
been duly established. The fault falls merely notes that SMS involves the not legally require Globe to secure its
squarely on NTC. With the dual “transmission of data over [the] approval for Globe to continue
classification of SMS as a special CMTS,” a phraseology that evinces no providing SMS. This does not imply
feature and a VAS and the varying causal relation to the definition in M.C. though that NTC lacks authority to
rules pertinent to each classification, No. 8-9-95. Neither did the NTC regulate SMS or to classify it as VAS.
NTC has unnecessarily complicated the endeavor to explain why the However, the move should be
regulatory framework to the detriment “transmission of data” necessarily implemented properly, through
of the industry and the consumers. But classifies SMS as a VAS. unequivocal regulations applicable to
does that translate to a finding that the all entities that are similarly situated,
NTC Order subjecting Globe to prior In fact, if “the transmission of data over and in an even-handed manner.
approval is void? There is a fine line MTS” is to be reckoned as the
between professional mediocrity and determinative characteristic of SMS, it The SC however emphasized that the
illegality. NTC’s byzantine approach to would seem that this is already NTC will continue to exercise, by way
SMS regulation is certainly inefficient. sufficiently covered by Globe and of its broad grant, jurisdiction over
Unfortunately for NTC, its actions have Smart’s respective legislative Globe and Smart’s SMS offerings,
also transgressed due process in many franchises. Smart is authorized under including questions of rates and
ways. its legislative franchise to establish and customer complaints. Yet caution must
operate integrated be had. Much complication could have
The very rationale adopted by the NTC telecommunications/computer/ been avoided had the NTC adopted a
in its order holding that SMS is VAS is electronic services for public domestic proactive position, promulgating the
short and shoddy. Astoundingly, the and international communications, necessary rules and regulations to cope
Court of Appeals affirmed the rationale while Globe is empowered to establish up with the advent of the technologies
bereft of intelligent inquiry, much less and operate domestic it superintends. With the persistent
comment, the High Tribunal telecommunications, and stations for advent of new offerings in the
emphasized. transmission and reception of telecommunications industry, the NTC’s
messages by means of electricity, role will become more crucial than at
The Court said that it usually accords electromagnetic waves or any kind of any time before. If NTC’s behavior in
great respect to the technical findings energy, force, variations or impulses, the present case is but indicative of a
of administrative agencies in the fields whether conveyed by wires, radiated malaise pervading this crucial
of their expertise, even if they are through space or transmitted through regulatory arm of the State, the Court
infelicitously worded. However, the other media and for the handling of fears the resultant confusion within the
above-quoted “finding” is nothing any and all types of industry and the consuming public. The
more than bare assertions, telecommunications services. credibility of an administrative agency
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

unsupported by substantial evidence. entrusted with specialized fields subsists


The order that no deep inquiry was It is clear that before NTC could not on judicial doctr ine alone, but
made as to the nature of SMS or what penalize Globe and Smart for more so on its intellectual strength,
its provisioning entails. In fact, the Court adherence to law, and basic fairness.

LEXICON OF CYBERLAW TERMINOLOGY


(This will be a regular section to acquaint law practitioners, students and researchers on legal public key can accurately determine:
terms in IT law preferably from the Philippine context). (i) whether the transformation was
“Certificate” means an electronic “Digital Signature” refers to an created using the private key that
document issued to support a digital electronic signature consisting of a corresponds to the signer’s public key;
signature which purports to confirm the transformation of an electronic and (ii) whether the initial electronic
identity or other significant document or an electronic data document had been altered after the
characteristics of the person who holds message using an asymmetric or transformation was made. (Section
a particular key pair.(Section 1[c], Rule public cryptosystem such that a person 1[e], Rule 2, Rules on Electronic
2, Rules on Electronic Evidence) having the initial untransformed Evidence)
electronic document and the signer’s >> [64] Lexicon of Cyberlaw Terminology

26
Jurisprudence in CyberLaw

The Philippine Quarterly IT Law Journal :: Volume 2, Number 1


METRO-GOLDWYN-MAYER STUDIOS, INC., ET. AL. VS. GROKSTER LTR.
AND SHERMAN NETWORKS LTD.
CV-01-08541-SVW (United States)

(This section will be a regular feature of the share digital audio, video, picture, and knowledge required must be
journal to highlight significant cases decided
text files. Some of the files are determined. If the product at issue is
in the Philippines and in foreign jurisdictions
relating to information technology) copyrighted and shared without not capable of substantial or
authorization, others are not commercially significant non-infringing
by Jhonelle S. Estrada copyrighted (such as public domain uses, then the copyright owner need
works), and still others are copyrighted, only show that the defendant had
Facts: The plaintiffs in these but the copyright owners have constructive knowledge of the
consolidated cases (copyright owners) authorized software users in peer-to infringement. In this case, the district
are songwriters, music publishers, and peer file-sharing networks to distribute court found it undisputed that the
motion picture studios or those ‘who their work. software distributed by each defendant
own or control the vast majority of was capable of substantial
copyrighted motion pictures and sound Plaintiffs claim that majority of the noninfringing uses. A careful scrutiny
recordings in the United States.’ information was exchanged in violation of the record indicates that there was
Defendants Grokster Ltd. and of copyright law. The district court no genuine issue of material fact as to
Streamcast Networks, Inc., on the ruled in favor of the defendants by non-infringing use. Indeed, the
otherhand are ‘software distributors.’ stating that such activities do give rise software distributors submitted
They are the companies that freely to liability under the theory of numerous declarations by persons who
distribute software that allow users to contributory copyright infringement permit their work to be distributed via
share computer files with each other, and vicarious copyright infringement the software, or who use the software
including digitized music and motion to distribute public domain works. In
pictures. Plaintiffs alleged that over the case at bar, the software distributors
90 percent of the files exchanged Issue: Whether or not the distributors have not only shown that their products
through use of the ‘peer to peer’ file- of peer-to-peer file-sharing computer are capable of substantial noninfringing
sharing software offered by the networking software may be held uses, but that the uses have commercial
software distributors involve contributorily or vicariously liable for viability. On the other hand, if the
copyrighted material, 70 percent of copyright infringement of the software product at issue is capable of
which is owned by the copyright users. substantial or commercially significant
owners. They contend that defendants noninfringing uses, then the copyright
are liable for vicarious and contributory Held: The decision of the district court owner must demonstrate that the
copyright infringement, and that they was affirmed. defendant had reasonable knowledge
are entitled to monetary and injunctive of specific infringing files and failed to
relief. A. Contributory Copyright act on that knowledge to prevent
Infringement infringement. In this case, the software
Defendants initially used the fast track design is of great import. Under both
technology. But since StreamCast had The three elements required to prove StreamCast’s decentralized, Gnutella-
a licensing dispute with KaZaa, it now a defendant liable under the theory of type network and Grokster’s quasi-
uses its own branded ‘Morpheus’ contributory copyright infringement decentralized, supernode, KaZaa-type
version of the open-source Gnutella are: (1) direct infringement by a network, no central index is
code. StreamCast users connect to primary infringer; (2) knowledge of maintained. Indeed, at present, neither
other users of Gnutella-based peer- the infringement,;and (3) material StreamCast nor Grokster maintain
to-peer file-sharing software. contribution to the infringement. control over index files. And, as the
Grokster and Streamcast both distribute district court observed, even if the
their software free of charge. Once The element of direct infringement is software distributors ‘closed their doors
downloaded onto a user’s computer, present in this case. and deactivated all computers within
the software enables the user to their control, users of their products
participate in the respective peer-to- As regards to knowledge of could continue sharing files with little
peer file-sharing networks over the infringement, in order to analyze its or no interruption.’
internet. The users of the software required element, the level of >> [64] Goldwyn case

27
Featured Article

A DESCRIPTIVE STUDY ON CYBERSE


YBERSE X, AUDI
SEX O-VISU
UDIO AL SEX SCANDALS, AND CHILD
ISUAL
PRONOGRAPHY: PROSECUTION UNDER EXISTING PHILIPPINE LAWS, AND
OTHER PROPOSALS AS A FRAMEWORK FOR FUTURE LEGISLATION
by Ailyn L. Cortez, Carlyn Marie Bernadette C. Ocampo-Guerrero,
Michael Vernon M. Guerrero, and Reynaldo M. Pijo

T ABLE OF C ONTENTS
Part I. Understanding 1. Cyberporn / Non- III. MMS Clips 38
Pornography and an Overview Streaming Internet
of the Technology Available Pornography 31 IV. Child Pornography 39
Today a. BBS 31 A. Overseas Prosecution 40
b. WWW 31 B. Local Prosecution 41
I. Pornography vis-à-vis c. Usenet 32
Obscenity 28 d IRC 32 Part III.
A. Pornography 28 e. Peer-to-Peer 3 2 Prosecuting the Offenses 41
B. Obscenity 29 2. Cybersex / Streaming
Internet I. Criminal Law 41
II. Pornography vis-à-vis Prostitution; Pornography 32 1. In General 41
History of Pornography 29 B. Pornography in Optical 2. Cybersex and Child
Devices / VCD-DVD 32 pornography 42
III. Technology aiding the storage C. Pornography in Mobile A. Act 3815 42
and transmission of Phones / MMS Clips 32 B. RA 9208 42
pornography 29 D. Child Pornography in any C. RA 7610 45
A. Traditional media 29 medium 33 3. Sex Scandal optical discs and
B. Modern Media 30 sexually-explicit MMS clips 4 5
1. Storage devices V. National attitude on
used 30 pornography 34 II. Civil Damages 46
2. Consumer devices
used 30 VI. Offenses instrumental and III. Evidence 46
3. Non-physical transfer incidental to pornography 3 4
methods used 30 1. Sex Tourism 34 IV. Miscellaneous: Convention
a. Electronic 30 2. Sexual Exploitation and and Treaty obligations 48
b. Radio waves 3 0 Child Sexual Abuse 35
c. Infrared Radiation Part IV. Proposals 48
(IR) data Part II. The Philippine Experience
transmission 3 1 I. Cybersex 48
4. File formats used 31 I. Cybersex 35
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

A. Organized 35 II. Sex Scandals and lewd


IV. Digital Pornography 31 B. Unorganized 37 MMS clips 49
A. Pornography in the
Internet 31 II. Sex Scandals 37 III. Child Pornography 49
I
U NDERSTANDING P ORNOGRAPHY AND AN O VERVIEW OF THE T ECHNOLOGY A VAILABLE T ODAY

I. Pornography vis-à-vis images, created with the primary, whatever means, of a person engaged
Obscenity proximate aim, and reasonable hope, in real or simulated explicit sexual
of eliciting significant sexual arousal activities or any representation of the
A. Pornography on the part of the consumer of such sexual parts of a person for primarily
materials.” 2 In legal parlance, sexual purposes.”3 The 1986 Attorney
Pornography is the depiction of erotic pornography “refers to any General Commission on Pornography
behavior intended to cause sexual representation, through publication, of the United States defined it as
excitement. 1 It is “the sexually explicit exhibition, cinematography, indecent material that “is predominantly sexually
depiction of persons, in words or shows, information technology, or by explicit and intended primarily for the

28
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
purpose of sexual arousal.” 4 deviant sexual group, as the case may hand-drawn graphics originating from
be”; (2) whether the given material India and Japan. 14 Some literature
Soft-core pornography features naked “depicts or describes, in a patently which survived – although such are
or scantily clothed persons, focusing offensive way, sexual conduct – e.g. being argued to be artistic and not
mainly on their breasts and genitalia ultimate sexual acts, normal or pornographic, depending on the
but shows no sexual intercourse. Hard- perverted, actual or simulated; community standard being applied –
core pornography includes various masturbation; excretory functions; or includes the Indian “Kama-Sutra” and
forms of sexual penetration, forced and lewd exhibition of the genitals – the Greek treatise “The Art of Love”
unforced, between two or more measured against contemporary by Ovid, among others. With the
people. 5 Hard core pornography is community standards; i.e whether it so advent of printing in 1452,
said to be “sexually explicit in the exceeds the generally accepted limits pornography, existing in the fringes of
extreme, and devoid of any other of candor as to be clearly offensive”; legitimate publishing, proliferated to
apparent content or purpose.” 6 and (3) “whether the material, taken entertain as well as to arouse. The
as a whole, lacks serious literary, development of photography in 1827,
B. Obscenity artistic, political or scientific value.” 11 through the individual efforts of Joseph
If it appeals, thus, to the prurient Nicéphore Niépce and Louis Jacques
Obscenity, on the other hand, is “such interest, is patently offensive, and lacks Mandé Daguerre, 15 and the
indecency as is calculated to promote serious value (artistically, etc.) then the development of moving pictures in
the violation of the law and the general material is considered obscene and is 1867, through the individual efforts
corruption of morals.” 7 The current illegal. of William Lincoln, Louis Lumière, and
legal definition of obscenity is found in the Edison Brothers, 16 although not
the 1973 US Supreme Court case of II. Pornography vis-à-vis intended, contributed to the
Miller v. California, 8 cited in the Prostitution; History of proliferation of pornography, as did the
Philippine Supreme Court case of Pita Pornography Internet, which grew out of the U.S.
vs. Court of Appeals. 9 According to Defense Department program called
the Miller case, material is obscene if Prostitution – that is, “the practice of ARPANET (Advanced Research
all three of the following conditions are engaging in sexual activity, usually with Projects Agency Network) established
met: individuals other than a spouse or in 1969.
friend, in exchange for immediate
1. The average person, applying payment in money or other valuables” III. Technology aiding the
12
contemporary community , or in legal parlance, “any act, storage and transmission of
standards, would find that the transaction, scheme or design pornography
work, taken as a whole, appeals involving the use of a person by
to the prurient interests. another, for sexual intercourse or Pornography exists in different media.
2. The work depicts or describes, in lascivious conduct in exchange for Explicit images and image sequence
a patently offensive way, sexual money, profit or any other may be stored in tangible and
conduct specifically defined by the consideration”13 – has existed since electronic forms.
applicable state (or federal) law, time immemorial. Prostitution and
and pornography are intertwined inasmuch A. Traditional media
3. The work taken as a whole, lacks as pornography originally signified any
serious, artistic, political or scientific artwork or literature depicting the life Pornography in tangible or traditional
value 10 . of prostitutes. Today, pornography media may be subcategorized as those
includes erotic and sexually explicit printed in paper or other surface
The US Supreme Court ruled in the imagery of ordinary persons, who may materials, and those captured in film.
Miller case, which was adopted by the even be unaware that they are Those printed in paper includes
Philippine Supreme Court in the Pita presented to the public in such a photographs – either studio processed
case, that a legal definition of obscenity manner. Pornography has grown or polaroids 17 – besides usual
must meet the three-part test. It must increasingly as a necessary offshoot pornographic publications. Those
be determined, “(1) whether the of prostitution, in light of the increasing stored in film includes those stored in
predominant theme or purpose of the supply of cheap image capturing television and theatrical/cinema-grade
material, when viewed as a whole and devices. films, such as the Super 16 (16mm)
not part by part, and when considered and the 35mm, respectively; film
in relation to the intended and Pornography has existed for centuries, positives or slides; outmoded media
probable recipients, is an appeal to the although imagery and literature of such such as Super 8 (8mm), 18 Betamax,19
prurient interest of the average person nature were not seen to be worthy of VHS, 20 and Compact VHS, 21 among
of the community as a whole, or the preservation or transmission. Rare others. Storage in these media, i.e.
prurient interest of members of a images surviving to the present are printed or in film, may be bulky, and

29
the cost of production and distribution Messaging System (MMS)45 -enabled simultaneous to the widespread use of
is average to high. The potency of mobile telephones,46 digital audio the Internet, through Bulletin Board
distribution is also limited. players 47 (DAP, sometimes also Service (BBS).56
recorder), digital cameras and
B. Modern Media camcorders, digital recorders, 48 When a computer, or the LAN, is
among other digital devices available connected to the Internet, various
Pornography in electronic or modern in the market. Transmission of such methods may be utilized to transfer and
media, on the other hand, may be multimedia files is a function no longer retrieved multimedia files on the
subcategorized – although said media in the exclusive realm of computers. Internet or another peer’s computer.
are identically binary 22 – according The ways to transfer multimedia files Different protocols may be used, such
(1) to the class of storage device used, increase exponentially as new classes as HyperText Transfer Protocol (HTTP)
57
(2) to the class of consumer electronics of digital devices are introduced in the where the World Wide Web58 is
used, or (3) to the multimedia format market. seen; Post Office Protocol version 3
used. (POP3) 59 or Internet Message Access
3. Non-physical transfer Protocol (IMAP),60 and Simple Mail
23
1. Storage devices used methods used Transfer Protocol (SMTP) 61 where
email is received and sent, and File
Electronic documents, especially Multimedia files may be transferred Transfer Protocol (FTP) 62 where large
multimedia files, may be stored in disk from one computer to another, directly, files may be sent to an online
storage,24 magnetic bubble memory, through cables, radio, infrared, and repository or an allocated user folder
25
and flash memory 26 /memory card other analogous means. Such files in a destination server, Discussion
27
or the solid-state semiconductor may be transferred through boards or Usenet,63 among others.
memory type. Disk storage may be intermediary storage devices, such as Multimedia files may be transferred
classified further as optical disc 28 – optical discs, memory cards, and from one computer user to another
which comes in various formats: CD- removable magnetic discs. through Internet Relay Chat (IRC),64
ROM, (through CD-R and CD-RW or through Instant Messaging.65 Said
media, i.e. writeable and rewriteable, a. Electronic files may be transferred by
respectively),29 DVD (through DVD-R, simultaneously connected computer
DVD-RW, DVD+R, DVD+RW, DVD- Multimedia files may be transferred users using peer-to-peer66 software,
RAM media), 30 Blu-ray, 31 and electronically through wires and such as Kazaa, eDonkey, GNUtella,
Minidisc 32 – magnetic (or hard discs), cables. Earlier methods of connecting and the like.
33
removable magnetic such as floppy computers include parallel-to-parallel
34
and zip discs,35 and holographic. port cabling (for one-to-one b. Radio waves
36
Flash memory or memory cards are connection) and Bayonet Neill-
available through different Concelman (BNC)49 cabling (for Local Wireless LAN (WLAN) uses radio
manufacturers as CompactFlash I and Area Network [LAN]) 50 which are now waves as its carrier, although the
II,37 SONY Memory stick (Standard/ passé, due to availability of cheaper network backbone remains to be
Duo/Pro/MagicGate versions), 38 computers and computer network supported by wires and cables. Apple
Secure Digital, 39 MMC, 40 peripherals such as hubs 51 and Macintosh computers use the
41 42
SmartMedia, xD, or USB routers. 52 Current connections pioneering WLAN product called
Keydrive43 a.k.a. Thumb drive. Most AirPort. 67 Apple and most Wi-Fi
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

between computers are normally done


multimedia files are stored in hard through USB-to-USB53 port link, and (Wireless Fidelity) device
discs, optical discs, removable LAN connections using RJ45 manufacturers follow IEEE 802.11 68
magnetic discs, and flash memory or (Registered Jack 45) jacks and cables. WLAN standard, while a few follow the
memory cards. Physical distribution One LAN can be connected to other HomeRF 69 standard (2 Mbit/s,
and transport of digital multimedia files LANs, or one remote computer can intended for home use). “Wired” LAN
are usually made using optical discs be connected to one LAN, or one is preferred with desktop computers,
and flash memory or memory cards. remote computer can be connected while WLAN/Wi-Fi is preferred with
to another remote computer, over any mobile computers whether laptop or
2. Consumer devices used distance via telephone lines and radio personal digital assistant (PDA). WLAN
waves. 54 Multimedia files are is more vulnerable to security breaches
Storage of multimedia files is not transferred in an Intranet55 through the because it enables any person with a
isolated to computers, where data use of shared folders in individual wireless-enabled computer or PDA to
storage devices are widely used, computers or allocated user folders in connect to the network, else the
whether desktop or portable (laptop or the file server. Similar files have been Internet, when in proximity of an
palmtop 44 ). Multimedia files are also transferred from one remote access point called a hotspot, if not
presently stored in Multimedia computer to another, prior to and properly configured.

30
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
On the other hand, Bluetooth 70 IV. Digital Pornography online chat (Internet Relay Chat [IRC]).
provides a way to connect and Explicit contents may also be
exchange information between devices A. Pornography in the Internet transmitted through online messengers
like personal digital assistants (PDAs), – such as Windows Messenger, Yahoo
mobile phones, laptops, personal The Internet has been called the Messenger, and ICQ, among others –
computers, printers and digital network of networks. Over 9,400,000 or through peer-to-peer (P2P)
cameras via a secure, low-cost, host computers are linked worldwide programs – such as Kazaa, among
globally available short range radio of which 60% are estimated to be in others. What was only available to a
frequency, as long as they are within the United States. It is further estimated small number of people willing to drive
10 metres or 32 feet of each other.71 that over 40 million people access the to the bad side of town can now be
Bluetooth may be considered as Internet around the world and that viewed at any time in the privacy of
wireless USB, contradistinguished with figure grew to 200 million in 1999. one’s home.87
Wi-Fi, which may be considered as All Internet users have the ability to
wireless Ethernet.72 Bluetooth does not communicate with one another through In a case conducted by Carnegie
use any telecommunication network various forums such as email, news Mellon, entitled Marketing
resources when files are transferred groups, and information posted on the Pornography on the Information
from one computer or any other World Wide Web. Once material has Superhighway, 88 the researchers
device to a mobile phone, or vice versa, been placed on the Internet, it is therein pulled together elaborate
or from one mobile phone to another. available to all other Internet users computer records of online activity, and
Only when the mobile phone user/ worldwide and cannot be prevented found out that “during their 18- month
subscriber utilizes the phone from entering any community 86 . study, Carnegie Mellon researchers
company’s MMS service does he use found 917,410 sexually explicit
telecommunication network resources 1. Cyberporn / Non-Streaming pictures, descriptions, stories, and clips.
for the transfer of the multimedia Internet Pornography On the Usenet newsgroups where
material to another mobile phone these digitized images are stored, they
subscriber. With sex being indulged in more freely found that 83.5% of the pictures were
these days, it is not surprising that pornographic.” 89 They found
c. Infrared Radiation (IR) data pornography, in a similar trend, individual consumers in at least 2000
transmission 73 becomes highly available in various cities, in all 50 states, and in 40
media, especially Internet-connected countries around the world; and found
The use of infrared for data transfer personal computers. This trend is out that 98.9% of the consumers of
was common between portable imminent inasmuch as the Internet has porn are men, although women do
computers (laptops) and mobile become a vast myriad of participate in “chat” rooms and other
phones, among others, prior to the interconnected channels that provides bulletin boards. 90
popularity and affordability of Bluetooth man with a gateway to the world. In a
and subsequent to the use of serial relatively short time, the Internet’s a. Through Bulletin Board
connections between the two (2) impact and influence on people’s daily Systems (BBS)
devices. Normally, the portable lives is immeasurable. There are
computer recognizes the mobile phone elements or enclaves within it that have Nearly three fourths (71%) of the
device as another computer connected grown to become sources of sexually explicit images surveyed
to it. Integrity of connection, however, consternation within the society. Among originate from adult BBS attempting to
was a drawback to this kind of them is the pervasive availability of lure customers to additional collections
technology. pornography or more commonly of cyberporn. There they can charge
known Cyberporn. Cyberporn has monthly fees and take credit card
4. File formats used been the most controversial topic numbers for individual images. The
arising from the use of the Internet in five largest adult BBS systems have
Multimedia files come in different file recent years and for years to come. annual revenues in excess of $1
formats, and may be subcategorized million. 91
as pictures, video, and audio. Pictures Cyberporn includes hardcore pictures
are usually in JPEG,74 GIF,75 and and movies made available online. b. Through World Wide Web
BMP76 formats, but may also be in Sexually explicit images can be found (WWW)
PNG77 and any other format. Videos on web pages (World Wide Web
are usually in AVI,78 MPEG,79 WMV,80 [WWW]) and in news groups (Usenet), Cyberporn is largely available through
and RM81 formats. On the other hand, and are far too easy for anyone of the World Wide Web (WWW) pages.
audio or sound clips are usually in any age to view. Even live sex acts can These range from pictures, short
MP3, 82 WAV,83 WMA,84 and RA85 be viewed by virtually anyone through animated movies, short and full actual
formats. the Internet, through web-cameras on movies, to sound files and stories.

31
Most premium adult WWW sites clients, most users do not abide by the suitable for such content. The marked
require proof of age and payment by stipulation that prohibit such decrease in the price of CDs and DVDs
credit card to access their materials. transmission. allow the proliferation of contraband
92
Marketing webmasters for premium films, whether pirated Hollywood and
adult websites, however, provide 2. Cybersex / Streaming Filipino movies or sexually-explicit X-
samplings of adult materials in Internet Pornography rated movies whether foreign or
unsecured webpages – i.e. without age Filipino. With pornography in VCDs
verification through credit card check Cyber sex, in its shortest and most fetching a price of mere twenty (PhP
– in their individual Thumbnail Gallery explicit definition is, a combination of 20) pesos to fifty (PhP 50) pesos, it is
Posts (TGPs). communication and masturbation. It is not uncommon that porn purchasers
a selfish gratification of one’s sexual would gravitate towards genre fixation
c. Through Usenet desires while sharing one’s most or towards pursuing novel themes,
intimate thoughts and fantasies with some actively pursuing extreme
There are more than 14,000 Usenet someone else. It is nearly identical to perversions while others passively
discussion groups all around the world phone sex, the only difference being pursuing voyeurism or psuedo-
but only around 200 groups are sex the method of communication. As voyeurism, a genre that would include
related, and some of these relate to computer networks become ever more the various sex scandal videos peddled
serious and legitimate discussions, sophisticated and voice chat more nowadays.
such as about homosexuality or sexual common, even this distinction fades.
abuse. Still, sexually explicit forums are The newest problem comes in the form C. Pornography in Mobile
the most popular areas on computer of video conferencing, which adds Phones / MMS Clips
online services. At one university, 13 visual images making the activity even
of the 40 most frequently visited news more addictive 94 . As mobile phones are slowly being
groups had names like alt.sex.stories, transformed into converged
rec.arts.erotica, and alt.sex.bondage. Cyber sexual activity takes many communication devices with
93
forms. One might download explicit capabilities similar to computers,
pictures, or explicit stories. One might contents normally prevalent in the
d. Through Internet Relay Chat partake in the exchange of racy, Internet and in personal computers shift
(IRC) sexually suggestive e-mails. One might venue to mobile phones. The ease of
view sexually arousing videos which converting ordinary pictures and
The Internet, through Internet Relay open up and play on one’s computer movies in their original formats as
Chat (IRC) and online messaging, screen, which may be either pre- MMS content likewise aid to the
makes it possible to discuss sex, see recorded or live. Webcams, cameras immediate shift of computer content
live sex acts, and arrange sexual interfaced with a computer so that one to mobile phones. Further, the
activities from computer screens. Users might broadcasts live streaming images capability of mobile phones to access
therein may exchange messages and of oneself, are increasingly common the Internet directly allows download
files in small groups or in private in the use of cybersexual activity. Chat of Internet content into the phone itself.
channels Like the Usenet discussion rooms, whether general or private, are Other services such as messaging and
groups a small fraction of the IRC as popular as ever and might often chatting, which may altogether swerve
channels are dedicated to sex.. lead to masturbation, cybersex, phone towards adult context, or if not towards
sex, or actual meetings in the flesh95 .
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

solicitation, as practiced in the Internet


e. Peer-to-Peer (P2P) can find a sizeable niche in the mobile
Indeed, cybersex is a phenomenon phone market.
This method of file sharing allows that is neither receding nor going away
every individual running a peer-to- by any stretch of the imagination. The problem does not stop with the
peer client or program to acquire Cybersex is a growing phenomenon, conversion of Internet/computer
sought multimedia files simultaneously with an all too rich and vibrant future. content into MMS content but
and in fragments from different users, aggravates with instances of production
and share his own media without B. Pornography in Optical of new content, using the built-in
having the technical knowledge that Devices / VCD-DVD camera of more advanced mobile
would have been required in the older phones. It is thus easier to capture a
client-server model. Although The popularity and the adaptation of sexual pose or act, with or without the
copyrighted and adult materials are not compact discs (CD-ROM) and digital subject(s)’ consent, by a click of a
allowed to be transmitted in peer-to- versatile discs (DVD), as media for button. The mobile phone may also
peer networks, according to the End- films and data storage, marked the be used to capture images of prank
User License Agreements that comes demise of tape videos – such as those sensual images known as upskirting
with the software used as peer-to-peer stored in Betamax and VHS – as media and/or downblousing of anonymous

32
thirty
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
persons in public places. Inasmuch as the image is completely computer- Protecting Children Online law 100
mobile phones are considered as generated without visual input taken
indispensable accessory to most users, from an actual child – is included also. The degree of gravity, or hardness, of
such phones can be easily taken in The issue as to child pornography child pornography ranges from
places where various stages of becomes further muddled on the
undressing is permitted, such as in definition of a child, in light of the “0. Clothed or portrait.
disco-bars, pool areas, beaches, and varying age of consent in countries,
spas; where images of a sinister context such as the United Kingdom (16) and “1. Naked, but not posed.
may be easily taken, if the Japan (13). Unless a national law Many of these were nudist-
management of such venues do not makes clear definitions and type photographs. The
implement strict measures or delineations, what constitutes child children in these
parameters as to the use of such pornography would be varied photographs gave no sign
devices in said premises. according to various perceptions, of being aware of the
different standards of morality, and camera and were usually
D. Child Pornography in any unclear application in light of depicted engaged in other
medium territoriality issues in International law. activities such as swimming
or playing ping pong, etc.
The Optional Protocol on the Sale of In fact, various countries have different
Children, Child prostitution and Child interpretation as to what constitutes “2. Naked and posing. The
pornography defines “child child pornography. In the United children here were looking
pornography” as any representation States, child pornography is defined at the camera or had
of a child engaged in real or simulated as visual depiction of minors engaged adopted a self conscious
explicit sexual activities or of the sexual in a sex act – such as intercourse, oral pose.
parts of a child for primarily sexual sex, or masturbation as well as the
purposes. Child pornography is a lascivious depictions of the genitals, “3. Naked with genital contact
visual recording of a crime being which do not require the genitals to be or contact with another
committed and the children who uncovered. 97 Federal and state laws body. These included
appear in such pictures are, at the time differ whether mere nudity involving photographs where a hand
the picture is being taken, subjected to minors comes under the definition of was in contact with the
degrading, abusive and humiliating child porn, or if it would necessarily genitals, and photographs
acts of a criminal nature. 96 qualifies as obscene. Prohibitions showing naked children
against simulated child pornography hugging or kissing each
Although it is clear that sexually explicit have been found to be unconstitutional other.
poses or acts of children, below the in the United States – unlike in the
usually accepted 18-year minimum United Kingdom, Germany and the “4. Oral contact with sex
age threshold, are considered largely Netherlands – for being overbroad. organs.
98
as child porn, what altogether In Canada, material that shows
constitutes child pornography remains someone who is or is “depicted as “5. Penetration, either anal or
under debate. It is unclear whether being” under 18, and is engaged or vaginal.
photographs of naked children would “depicted as engaged” in explicit
ipso facto be considered as child sexual activity, is classified as “child “6. Bizarre. This last category
pornography. It is unclear whether the pornography”. Materials judged to contained material with a
child’s genitals require to be exposed have “artistic merit,” however, are sadomasochistic character,
before images may be considered as excluded. On the other hand, a written urine sex, and photographs
such. It is likewise unclear whether only text that advocates or counsels sex with on which objects were
images and movies may be only form a child is also included. In Germany, introduced into the body
of child pornography, or whether it the definition does not differ from that orifices.” 101
includes sounds and texts as well. of conventional pornography. Sound
Further, it is unclear whether child and text can also be considered For obvious underage girls, levels 2
nudity, which is imbued with artistic pornography. In the United Kingdom, to 6 are manifest instances where child
merit, would not be exempted from a “child pornography” image is an pornography exists. Level 1 provides
such class of pornography. “indecent photograph of a child”; there the gray area on the debate whether
Furthermore, it is unclear whether is no specific requirement of sexual such nudist-type photographs would
simulated child pornography – content, as nudity is sufficient for an constitute child porn. The inclusion of
whether due to the convincing image to be indecent. In Japan, child Level 0 as a degree of gravity of child
appearance of non-underage females erotica 99 only became illegal in 1999 pornography in itself is debatable, as
to appear as if under 18, or whether following the country’s passing of its some proponents distinguish between

33
child pornography and prêt art. Pret ensures that there will V. National attitude on
Art (Pre-teen Art) or Lolita Art is an always be an image of the pornography
erotic form of art, in which clothed child at the age of sexual
adolescent or pre-pubescent girls pose preference. The attitudes of various nationalities
for photos or videos. 102 The fact that vary on the issue of pornography.
models in Pret Art are not nude and “5. Blackmail: Sexually explicit Western countries have relaxed
the poses are not overtly sexual or images are used to ensure restrictions on pornography. The
otherwise harmful provides a fertile the lifelong silence of the sanctity of the freedoms of speech and
ground for debate whether Pret Art victimised child by information in the United States, for
itself encourages pedophilia or threatening to show the one, appear to be paramount, and
whether it only depicts attractive minors pictures to parents, peers thus the Courts therein finds censorship
similar to mainstream entertainment. or others. Child victims will a greater threat than pornography. 104
not always report pictorial Other countries, such as the
Experts cite several reasons why records—even if they Philippines, largely relate pornography
individuals collect child pornography. report sexual abuse— with obscenity, and thus continue to
These are: because they may be strictly regulate, if not totally prohibit,
ashamed of what such practice. 105 Still, child
“1. Arousal and gratification: happened to them as well pornography – or kiddie porn – is
Individuals use as of their participation in almost universally prohibited, and faces
pornography to stimulate the pornography. the disapproval of most members of
their sexual drive and to society.
aid in sexual stimulation. “6. A medium of exchange:
Some may only fantasise Child pornography is used Child pornography exists due to
and others may use it as a as a means of establishing production, distribution, and possession
prelude to actual sexual trust and camaraderie with of materials relevant thereto. Laws in
activity with minors. other paedophiles and different countries differ on these
molesters and as proof of matters. Production and sale of child
“2. Validation and justification their good intentions when pornography is generally illegal in
of paedophile behaviour: establishing contact with most countries. Mere possession,
The paedophile uses other exploiters. It is a however, is illegal in the United States,
pornography to convince medium of communication United Kingdom, and Netherlands. In
him/her self that their with fellow exploiters in contrast, downloading and possession
behaviour or obsession is public and private sex of child pornography is not specifically
not abnormal, but is shared markets. prohibited in Russia. 106
by thousand of other
sensitive, intelligent and “7. Access: Some exploiters VI. Offenses instrumental and
caring people. exchange pornography to incidental to pornography
gain access to other
“3. To lower a child’s markets and to other 1. Sex Tourism
inhibitions: Child abusers children.
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

use pictures of other Sex tourism is “tourism, partially or fully


children having sex to assist “8. Profit: Although most do for the purpose of having sex, often
in the seduction of a child not sell child pornography, with prostitutes.” Legally, Sex Tourism
and encourage reluctant there are some “refers to a program organized by
children to freely paedophiles and child travel and tourism-related
participate. Images are molesters who sell home- establishments and individuals which
often used as a way to made videos and photos consists of tourism packages or
show a child what the on a one-to-one basis. activities, utilizing and offering escort
offender wants the child Some child exploiters sell and sexual services as enticement for
victim to do. Pornography their self-produced tourists. This includes sexual services
may be used under the materials to finance trips and practices offered during rest and
guise of “sex education” to overseas to popular sex recreation periods for members of the
create sexual arousal in the tourist destinations. 103 military.”107 Certain individuals seek
child. sex in another country or region,
possibly, due to (1) more relaxed
“4. Preservation of the child’s morality laws, (2) less rigorous
youth: Child pornography enforcement of laws, (3) cheaper

34
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
rates, (4) more anonymity / privacy, debt bondage, fraud or through abuse sexuoerotic age is discordant with his
(5) finding certain ethnic groups more of a victim’s vulnerability.”109 Child or her actual chronological age and is
attractive, (6) preferring the “work sexual abuse denotes sexual abuse of concordant with the age of the partner.
ethics” of foreign prostitutes to those or sexual activity with children. In (1) Pedophilia, or pedosexuality, is the
of one’s own country, or (7) finding addition to activities that would be condition of people whose primary
sex in tropical surroundings and a hot considered sexual abuse between sexual attraction is toward
climate more arousing, among others. adults, it includes (1) sex between prepubescent children; and it is often
While most sex tourists only engage in adults older than a predefined age of used informally to describe people
this activity with other adults, a small majority and children below a attracted to adolescents, or to describe
percentage actively looks for predefined age of consent (generally child sex offenders. (2) Ephebophilia,
adolescent or even younger prostitutes. between 12 and 18 years), (2) acting or hebephilia, is the condition of adults
108
as a pimp for child prostitution, (3) who are attracted to postpubescent
inducing a child to behave sexually in adolescents; pederasty if toward male
2. Sexual Exploitation and a performance, or to appear in child adolescents or lolita syndrome if toward
Child Sexual Abuse pornography, and (4) lewd action female adolescents. 111 (3)
towards children, including Infantophilia, or nepiophilia, is the
Sexual Exploitation “refers to disseminating pornography to a minor. sexual attraction of adults to small
110
participation by a person in prostitution children (0-5 years old), inasmuch as
or the production of pornographic interest in a 10-year old and a 2-year
materials as a result of being subjected Pedophilia, Ephebophilia, and old seem rather to be different
to a threat, deception, coercion, Infantophilia involve Chronophilia, i.e. preferences. 112
abduction, force, abuse of authority, a paraphilia in which the paraphile’s
II
T HE P HILIPPINE E XPERIENCE
I. Cybersex in Las Piñas arrested January 2005 Computer Crimes Division (AFCCD),
was earning at least 100,000 dollars and on 8 May 2003, the NBI-AFCCD
Cybersex is sexual activity of arousal a day. 115 Atty. Elfren Meneses Jr., raided three residential apartments in
through communication by computer; chief of the NBI-AFFCD states that the Cliff Townhomes on Roberts Street,
and Cybersex-for-pay substantially degree of the proliferation of internet Pasay City, owned by a John Bagcal
employs the Internet, and utilizes pornography in the country is doubly (37 years old, Filipino), due to alleged
computer cameras and microphones increasing since year 2000. Financiers operation of internet pornography. The
that allow clients to see and talk to girls or investors of such business, usually NBI-AFCCD team arrested around 15
doing the role play with or for them.113 foreign nationals, are investing largely pornography female models during
Such form of Internet pornography in the Philippines since they have the raid, four of them caught in the
works when (1) an Internet surfer contacts already with some Filipinos act of performing in front of Web
accesses a certain website on sex and who will host the site.116 Senior Supt. cameras, but not the Filipino owner,
chooses a woman through the photos Rodolfo “Boogie” Mendoza, officer in who was said to be hiding in a province
shown in the site; (2) the surfer then charge of the PNP Criminal near Manila. The team seized several
contacts the operator to chat online with Investigation and Detection Group personal computers, digital cameras,
the selected woman; (3) the operator, (CIDG), identified the cities of Angeles telephones, and sex toys such as
through transactional tools in the adult and San Fernando in Pampanga, Las vibrators. Bagcal was arrested
website, asks for the surfer’s credit Pi¤as and Davao as cybersex “hot subsequently.119
card number and the surfer will be spots.”117 It is also claimed that Internet
charged for anywhere from $2 sex rings have spread all over the 2. Asianbabes.com; Angeles
upwards a minute; and (4) the surfer country, with satellite centers in Visayas City, Pampanga (4 October
thereafter asks the woman to perform and Mindanao, specifically in Cebu and 2004)
sexual acts to be shown on the screens Surigao.118
of the surfer’s, now subscriber’s, On 4 October 2004, the Criminal
computer.114 A. Organized Investigation and Detection Group
(CIDG) agents arrested Roland Thys
Philippine Senator Maria Ana Consuelo 1. John Bagcal; Pasay City (8 (Belgian), Dean Punke Arthur
“Jamby” Madrigal claims that Cybersex May 2003) (American), Ali Dimanlao Bonjoc and
has become a billion dollar are pursuing other suspects – Morley
underground industry in the After a month of Internet and physical Arthur Everly, Simon Thorpe and other
Philippines, emphasizing that the surveillance by the National Bureau of still unidentified members of the
operator of the Orgasmic Ventures Inc. Investigation (NBI)’s Anti-Fraud and cybersex ring who escaped during the

35
raid made on the houses of the Ann O. Galantes (21), Rose Mary P. 5. Orgasmic Studios Inc.; Las
suspects. The policemen, armed with Quibec (24), Michelle V. Nuevo (18), Pinas, Metro Manila (21
14 search warrants issued by Judge Monica M. Chua (19), Deanne C. January 2005)
Maria Angelica Paras Quiambao of the Duero (19), Jennifer Ellaine Pasay
Angeles City Regional Trial Court, (20), Marian Estrada (23), Jenny On 21 January 2005, Criminal
swooped down on the houses located Ompad (18), Raquel V. Abala (23), Investigation and Detection Group
at 115 Nile Street, barangay Anunas; Estephanie Agasite (18), Analiza R. (CIDG) agents rescued twenty (20)
240 Narciso Street; 112-A Sarmiento Rosario (22), Ivory Washington (Gay, persons engaged in live sex acts over
Street, Plaridel Subdivision, and Apple 19), Kim webcams in a raid of a cybersex shop,
corner Pear Streets, all in Angeles City; Cereno (25); Arthur Eric Javier (21); located at apartment units A, D, F and
and were able to rescue 23 “sex Reynaldo Quillao, a computer G on Lead st., and apartment D and F
goddesses,” including four minors. 120 technician; Nestor Layda, a janitor- Daisy st., Barangay Pilar, Las Piñas,
employee; and Eldon Lopez, pursuant to a search warrant issued
On 2 November 2004, the reportedly the operator and manager by Judge Joselito Vibandor, of the
Department of Justice had ruled in a of the internet café. Charges of Regional Trial Court Branch 199. The
resolution that mere possession of violation of Republic Act (RA) 9208 or police agents arrested Aloysious
accessories used in the illegal activity the Anti-trafficking of Persons Act were Galvez of the Orgarmic Studios Inc.,
was not enough to elevate the case being prepared against the along with nine employees, during the
against the Belgian, Roland Thys, in suspects.122 raid and seized 23 computer units and
court. It is in the opinion of Senior Supt. peripherals, compact discs, sex toys,
Rodolfo “Boogie” Mendoza, officer in 4. Clifford Hacket, et. al.; San lingerie, and other paraphernalia (or
charge of the PNP CIDG that materials Fernando, La Union (23 in other accounts, 30 computers and
like pictures and messages found in a November 2004) 100 cameras). Galvez reportedly
computer seized during a raid would yielded a number of foreign and local
have to be “reconstituted” by police On 23 November 2004, Clifford bank accounts that will be investigated
authorities to actually prove that Hacket, 40, from Colorado, USA, and by the police.
someone is being used for trafficking his wife, Jaqueline, 24, along with
purposes .121 three of their female employees – most The girls were distributed in fourteen
of them minors: one was 15, another rooms that served as studios where
3. Eldon Lopez, et. al.; Angeles was 16 – were arrested during a raid they performed various role playing
City, Pampanga (8 November on a rented house at Barangay acts for clients, and sometimes did
2004) Catbangen, San Fernando, La Union, live sex with a partner in front of a
where they had been operating the camera, mostly from the United States
As part of police’s operation cybersex den. Seized during the raid and Germany. Inside each studio at
“Operation Magdalena” – a campaign were three computers with complete Orgasmic was a bed and an air-
plan against prostitution – twenty (20) accessories, three Web cameras and conditioned unit. The walls were
persons (17 young women or so- speakers, assorted diskettes, draped with multicolored, pastel
called “cybermodels,” an employee, pornographic VCDs and CDs, a CD curtains. Each room had a distinct look,
a computer technician, and the Internet writer, payrolls and the daily time like one was decorated with neon lights
café operator-manager – were records of the Hackets’ employees. and plastic flowers, while others were
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

arrested by police 8 November 2004 made to appear like a typical girl’s


during a raid on a suspected cybersex The spouses were arraigned on 14 room. Scattered in some of the rooms
den in Angeles City, Pampanga. The January 2005 at the Regional Trial were sex toys, costumes and skimpy
policemen belonging under the Court Branch 30, presided upon by lingerie. 124 Among the chat hosts,
Central Luzon police, in tandem with Judge Alpino Florendo. The two have Sherry Passion was able to hit the
agents of the Criminal Investigation and been transferred to the La Union longest video chat of two hours and
Detection Group (CIDG), raided the provincial jail from the Poro Point police 25 minutes on 14 Nov. 2004. As a
house owned by one Sol Mesias assistance center after they failed to result, Sherry was entitled to an
pursuant to a search warrant issued post bail. It was alleged that the additional 50% of her earnings as
by Judge Maria Angelica Paras employees were paid only P50 for incentive and to a clothing allowance
Quiambao of the Angeles City Regional working eight hours a day, and that of $30. The incentive rate for best chat
Trial Court. The policemen confiscated some of them posed nude and did hosts like Sherry Passion ranges from
15 computers with video cameras, sexual acts in front of the computer 50% to 100%. A daily earning from
communication devices and for their foreign customers abroad. $1,001 to $1,800 entitles a chat host
pornographic material. Arrested were The couple pleaded not guilty. 123 to an additional 50%; $1,801 to
Rocell C. Palo (27), Michelle M. Chua $2,500 entitles her to 70%; and the
(20), Merlinda A. Atibagos (18), Mary incentive for $2,501 up is 90%. The

36
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
four other top chat hosts in Orgasmic B. Unorganized “Cebu,” “Dumaguete,” “Mindoro,”
Studios Inc., as listed on the bulletin and the like. Others use prominent
board were Lolita, who had earned There are increasing incidents, on the school names, such as “La Salle” to
$1,856.38; Crissy Mae, $1,479.26; other hand, of individuals exposing increase interest in the film inasmuch
Tanya, $1,186; and Sofia Paola, themselves to others for free or fee, as it would suggest degeneracy of
$1,127. The names of 30 chat hosts through web cameras, without the middle-class and higher-class
were listed in one of three status benefit of a website exclusively made teenagers in the eyes of the masses.
reports as of 20 January 2005.125 for that purpose. Said exhibitionists are The Mindoro Scandal appears to be
found in most popular chatrooms such latest video that circulated in the
The girls are said to be composed as those of Yahoo! Chat. Inasmuch as market. There are reports of other
mostly of high school students who web camera access may either be set video scandals involving persons from
belong to rich and middle-class by the broadcasting exhibitionist as St. Theresa College, University of San
families, after more documents were either open (free) or by permission, it Carlos, and the Philippine Amusement
recovered from the office of Orgasmic is possible to require payment before and Gaming Corporation, among
Ventures upon the execution of a new permission is given. 128 Inasmuch as others.
search warrant. Aside from the girls’ these exhibitionists do not have
130
bio-data, contracts, vouchers and licensed credit card transaction facilities 1. Dumaguete Sex Scandal
financial statements, CIDG agents also of their own, the mode of payment is
recovered notices of meetings of made through “pasa-load” or “e- The Dumaguete Sex Scandal is a video
stockholders, attesting that other people load,” or similar methods of money- which shows three women having sex
were behind the syndicate.126 remittances over mobile phones. The with their boyfriends on different
price range goes as low as fifteen (PhP occasions in a bunkhouse in
6. Unverified reports 127 15) pesos to the usual three hundred Dumaguete. This scandal, which
(PhP 300) pesos. Others require pre- caught the ire of women in
Cebu: According to Senator paid phone cards access numbers of Dumaguete, seemed to be a
Madrigal’s group, prior to the raid in certain phone load values or pre-paid connivance between the male partners
La Union last 22 November 2004, Internet access information of specified and the cameraman in taking the
Cebu police allegedly swooped down value, before anyone interested may video, with the girlfriends completely
on a cybersex den. According to them, be given permission to view the unaware of the whole setup. The
the cybersex den had strong links with exhibitionist exposing herself. Dumaguete Scandal video appears to
the two Luzon-based cybersex have been filmed as early as 1999.
syndicates. They alleged that said case II. Sex Scandals At that time the film was taken, the
allegedly did not even reach the women were still single. One of them
prosecutor’s office, inasmuch as the Generally, a sex scandal is a scandal tried to commit suicide, while the two
suspects and the rescued girls were in which a public figure – usually movie others have left the city with their
released from police custody after an stars, politicians, or priests – becomes reputation torn or ruined. The women
influential politician allegedly embroiled in a situation where were victims of their love for their boy
intervened. The senator’s office has embarrassing sexual activities or friends at that time, not knowing that
yet to complete the details about the allegations thereof are publicized. 129 they were made mere commodities in
raid. However, in Philippine context, the a business venture of merchandising
term “sex scandal” is usually associated a pornographic video.
Surigao: According to Senator to videos and images clandestinely
Madrigal’s group, an Internet café acquired either of famous or even It appeared that the businessman who
owner in Surigao has reported the ordinary persons. What is necessary runs the lodging house placed a hidden
rampant cybersex operations there. to constitute such videos as being camera in one room that he allowed
sexually scandalous is that the actors to be rented at a very low price or
Makati City: According to Senator therein are not aware that their acts discounted rate. This businessman
Madrigal’s group, as early as two years are being caught on tape, or that the recorded the sexual acts of lovers
ago, an alleged cybersex den was actors therein intended that the video inside this room. In some occasions,
raided in an exclusive subdivision in or images being generated remain for without the knowledge of the
Makati City. They are now verifying the personal consumption of the businessman, his cameraman invited
reports about another cybersex den in actor’s and not of the public but which male friends to bring their girlfriends
another exclusive Makati village where eventually leaked. to do the sexual acts as the camera
most of the chat girls reportedly drive rolled on. The cameraman and the
their own car and live in posh houses. The title of the videos are generally male friends then put several recorded
named according to the places where sessions together into one-hour shows,
the acts were committed, such as duplicated and sold these initially in

37
Mindanao. Four years later, the main female was from St. Scholastica. due to CD technology, the Internet, and
pornographic videos had reached local Some believed that the video was first the resourcefulness of video pirates.
video shops. The popularity of the uploaded on the Internet inasmuch as
video increased after politicians started a couple of yahoogroups or e-groups III. MMS Clips
to denounce the video and started had a copy of such video before the
investigating and charging people who video pirates in Quiapo and Greenhills The widespread use of mobile phones
were believed to be responsible for its got hold of it. Another account provides with image/video-capturing
production. that the video, supposedly in the private capabilities; the technology shift
collection of “Leo,” along with other towards Multimedia Messaging System
Subsequently, the city filed charges pornographic materials, was (MMS), which provides messaging of
against Engineer Jonathan Lim, owner mistakenly lent to a friend, who dynamic content, over the usual Simple
of the bunkhouse, Noli Banagudos circulated the video to the public. There Messaging System (SMS), which only
and Nicolas Siloterio, after a “vital are conflicting rumors whether the provides text messaging; and the
witness” surfaced. Witness Victor main actress actually committed adoption of the Bluetooth technology
Empleo – who claimed to be a close suicide, or not, after the scandal broke as a standard feature in mobile
friend of Engr. Jonathan Lim, the owner out. phones; provide the latticework for the
of the house in Barangay Daro where increased incidents of sexually-explicit
the sexual activities were supposedly 3. Boarding House Scandal, 132 content that are transmitted among
filmed – presented to the media some also known as Cebu Scandal or mobile phone subscribers.
revelations of the businessman’s Bisaya Bang-Bang
“operations” at the bunkhouse. 1. Diana Zubiri MMS clip
However, Empleo later withdrew his The show Correspondent exposed the
affidavit. The case against Lim, secret porn activities of a father- The Diana Zubiri MMS clip circulated
Banagudos, and Siloterio is pending. daughter team. The daughter would in late 2004 and was the first to
Empleo, on the other hand, was invite her classmates over at their place generate interest as to the use of the
charged for perjury. for a swimming party or a cozy retreat mobile phones as a conduit of such
(“tambayan”), making sure they were kind of content. The short video
2. La Salle Sex Scandal 131 , couples. Couples get lustful and do it appears to have been clandestinely
also known as Secret of Makati in the bathroom while taking shower, captured through a video-capturing
or in the bedroom. The father films enabled mobile phone by one of the
Two teenagers captured their sexual the whole thing from peepholes; the crew participating in a photo-shoot,
tryst in a video. The usual circulated videos becoming part of the private featuring Diana Zubiri, possibly for a
copy contains 3 scenes, although the collection of the father. The modus calendar or a magazine. The camera
1st and 2nd scenes are sometimes operandi of the father was exposed showed the layout of the studio and
taken as a single scene. The first when the friends of the daughter heard focused mainly on the breasts and
(combined) scene involves a bald guy movements in the next room, when pubic areas of Miss Zubiri.
“Leo” and her girlfriend having sex in they were assured that they were
a motel, while the second scene alone in the house. The friends called 2. Francine Prieto MMS Clip
involves a lesbian scene by the upon neighbors who apprehended the
girlfriend and another female, with father, while attempting to escape by The Francine Prieto MMS clip
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

“Leo” outside of the room. The tape climbing a wall, and after he has tossed circulated not long after Diana Zubiri
runs for about 70 minutes. Some a bag-full of pornographic tapes over MMS clip circulated in late 2004. The
unverified reports provide that there the fence. Tricycle drivers got hold of video features segments of the photo-
is a third scene, which involves the two VHS tapes, and these were sold to shoot of Francine Prieto that was made
teenagers again but now inside the enterprising video pirates who mass- in South Korea. The individual who
guy’s room. The tape was meant for produced them. circulated the clip to Philippine mobile
the couple’s enjoyment, not for mass phone users even incorporated music
consumption. The video was said to 4. Quezon City Scandal 1 to 3 to the video.
133
have been videotaped in 2001, and
was allegedly sold for P35,000. 3. The Mahal MMS Clip
This scandal comes complete with cast
The identity of the actors and actresses and crew, starring GROs, shot in KTVs The Mahal MMS clip circulated soon
are not known publicly. The public in and around Metro Manila and after, with Mahal (a midget actress)
assumes the actors to be students of produced by Silverado Entertainment. sitting on the toilet bowl. Mahal
La Salle when the video was taken. A The videos appear to have long been appears to be aware of the camera as
popular rumor is that the male was a in circulation, except that it is only now she waved to it. A lot of media
student of DLSU-St. Benilde while the that it proliferates in increased rates practitioners and showbiz personalities

38
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
lambasted the circulation of the clip in of prostitution and pornography, sex The Online Protection Act for Children
the market, emphasizing that it was tourism, availability of advanced was pushed by Senator Tessie Aquino-
“outrageous, not delicious.” communication technology, lack of Oreta in 2003 but it never passed the
stringent laws against child Senate. 141 Although similar bills have
4. Ethel Booba MMS Clip(s) pornography, and inefficient been submitted in the present House
prosecution of perpetrators. Advances of Representatives and Senate, it must
The Ethel Booba MMS clip circulated in technology, especially the Internet, be noted, to emphasize the time such
widely early February 2005, with an have made it possible for the easier issue has been a continuing concern,
image of Ethel Booba (although her production, reproduction and that an international conference on
hands and arms were covering her dissemination of pornographic images pornography has been held in Manila
face for most of the video) stimulating of children. 137 Sexual exploitation of as early as 1995, calling for
herself with her fingers. Other clips minors is frequent, in the form of child committed and effective law
appear to be less circulated, such as prostitution, child pornography, and sex enforcement to combat the growing
those which show Alex Crisano, with tourism. Crimes related to sex tourism abuse and exploitation of children and
his prominent tattooed arm, lying are difficult to prosecute because they the pornography that is a integral part
beside Ethel Booba. The video(s) originate or transpire outside the of it. 142
circulated allegedly after Crisano had geographic borders and legal
his phone repaired in Greenhills, jurisdiction of the Philippines. 138 The issues on child prostitution, child
where the technician handling it pornography, and sex tourism is shared
discovered, took, and circulated the The phenomenon is aggravated as it, by the Philippines with neighboring
videos to other people.134 more than not, involves family and Southeast Asian countries, such as
close friends. The findings released Thailand, Cambodia, Laos, Vietnam,
IV. Child Pornography by End Child Prostitution, Child and Indonesia.
Pornography and Trafficking of
The claim, that the Philippines is the Children for Sexual Purposes (ECPAT), An observation of circulating child
fourth largest producer of child which support this conclusion, are pornography on the Internet – utilizing
pornography, 135 however, is open to based on the detailed study of 74 cases the search tool in the Peer-to-Peer file-
debate, inasmuch as that it is not of former and active child prostitutes sharing program “Kazaa,” from
supported by any accurate empirical across the country, the total number Sharman Networks, or its competing
data. Sales figures for this particular of which is estimated to be around version “Kazaa Lite Resurrection,”
genre of porn is hard to come by as 60,000 child prostitutes (ECPAT from Filesharing.com, and using
sales thereof is largely informal 1996). Recruiters – immediate family pedophiliac search keys would point
inasmuch as mainstream members [or] people known to family to the fact that an average of 1 out of
pornographers in developed countries and friends – often justify getting 10 would involve Asian teenagers (the
do not involve themselves in producing children into the sex trade by saying other 9 in the ratio involving
such genre, in light of regulations that they are “helping” them and their Caucasians), and that an average of
imposed upon the adult entertainment families. Preventing child prostitution 1 out of 10 of those Asians would
industry. In the United States is hindered by a code of silence that involve non-Japanese. Most of the
particularly, it would not be good rules the sex trade and by ineffective Caucasian child pornography files
business sense for established and law enforcement. The fight against available would appear to have been
upcoming adult entertainment firms to child prostitution is further hampered created in the 1970s and the 1980s,
branch out to child pornography as by the victims’ reluctance to testify and more likely before developed countries
such will deny them the usual harbor the inexperience of prosecutors. 139 overwhelmingly condemned child
found in the First Amendment of the pornography as illicit. It can be
US Constitution and expose them to In 2002, a series of articles published concluded from the above that Filipino
countless and expensive legal hassles, in the People’s Journal narrated the child pornography is not circulated
136
if not the total deprivation to extent of child pornography in the freely and substantially in open
exercise their industry. Such criticism Philippines, and in effect, boldly networks. It would be more likely that
of the claim, which is limited to its exposed the country as a leading Filipino child pornography is circulated
accuracy, should not be construed to producer and distributor of child in exclusive peer groupings, or else,
dissuade any effort to curb child pornography, particularly on the taken only for personal gratification as
pornography. Internet. The Philippine Senate took if in the form of a souvenir shot.
notice of this phenomenon but it Definitive statistics, as to the volume of
In the Philippines, child pornography resulted only in several committee Filipino child porn, may further be
– along with sex tourism and child hearings, a resolution for further study muddled by confusion arising from the
prostitution – thrive because of of the issue, and a Senate Bill authored similarity of the features of Thais and
widespread poverty, public tolerance by the then Sen. Loren Legarda. 140 Indonesians to those of the Filipinos.

39
Ephebophiliac images and movies, or a letter for Philippines immigration 5. In April 2003, Gordon
Asian adults simulating to appear officials stating he was of good Thomas, 29 years old from Glen
ephebophiliac, on the other hand, are character and was going abroad Burnie, Baltimore, USA was
available freely on the Internet, through to get married. He instead went arrested after investigators
hypertext transfer protocol (HTTP), and to a resort outside Manila and discovered he’d made a sexually
not necessary confined to peer-to-peer filmed boys between 8 and 16 in explicit videotape of a child who
(P2P) networking. A sampling of his hotel bedroom. Wragg was lived next door to him., a child he
pornographic images, largely involving caught at Manchester airport in was baby-sitting at the time.
Filipino and Thai females, would easily May 2000 when police, searching Investigators also found that he’d
be found at explicit image thumbnail his bag, found a camcorder. 144 ordered child porn videos from the
(TGP) websites. The thumbnail site Philippines and had thousands of
does not require age authentication to 3. On 7 June 2002, Raymond images on his computer. He
prevent minors from viewing its Colin Smith, of New South pleaded guilty in June 2003 to
contents. Wales, Australia, was convicted sexually exploiting a minor by
under the child sex tourism law producing child pornography. He
A. Overseas Prosecution for committing 3 sexual acts with faces 10-year term in federal
two (2) 6-year old girls in the prison for producing child
Accounts of perpetrators charged due Philippines. Smith traveled to the pornography, and is to serve three
to child pornography are found in Philippines on the Christian Charity years of supervised release after
various online newspapers from the Mercy Ship. He sexually he gets out of prison, when he will
Australia, United States, and the United molested 2 girls and produced have to register as a sex offender.
147
Kingdom. Among them are pornography. Smith’s manager
discovered this abuse and sent him
1. In October 1995, Anthony back to Australia for prosecution 6. In October 2003, John W.
Richard Carr, 43 years old from fearing Smith may receive a death Seljan, 85 years old, was
Seaforth, New South Wales, sentence if prosecuted in the arrested in Los Angeles,
Australia, was the first person Philippines. Smith was sentenced California, USA as he attempted
charged under the Child Sex by an Australian court to 3 years to board a flight to the Philippines.
Tourism Law of Australia for jail and will be eligible for parole The Immigration and Customs
offenses committed against a 5- after 21 months. 145 Enforcement (ICE) began its probe
year old girl in the Philippines. in August 2003 after border
Carr was initially arrested for 4. In October 2002, Bernard inspectors intercepted
offenses committed in Australia. Lawrence Russell, a resident of correspondence to two Philippine
A search of his home by the police San Diego, California, USA, girls with ages 9 and 12 indicating
yielded child pornography traveled to the Philippines with the that he planned to have sex with
involving children in the intent to engage in sexual activity them there. At the time of his
Philippines. A joint Australian and with minors and, while in the arrest, Seljan was found to have
Philippine investigation team found Philippines, produced child pornographic materials, sexual
that Carr visited the Philippines to pornography for the purpose of aids, and nearly 100 pounds of
have sex with children and had importation into the United States. chocolates in his luggage. On 19
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

paid money to a man to use his 5 On 3 December 2003, he was November 2004, Seljan was
year old niece in a pornographic charged in California with convicted on a total of 6 counts.
video. Carr was sentenced to 6 traveling in foreign commerce Sentencing is scheduled for March
years in jail by an Australian court with intent to engage in a sexual 2005. Seljan faces a maximum
for offenses committed in the act with a juvenile, producing child sentence of 270 years in
Philippines and Australia. 143 pornography, and possessing child prison.148
pornography for importation into
2. On 10 January 2001, the United States. He faces up to 7. In July 2004, Ronald Morris
Durham Wragg, 56 years old 45 years imprisonment if King, 54 years old from Nelson
from Sheffield, United Kingdom, convicted on all counts. In Bay, New South Wales, Australia
was convicted in the England for addition, he is subject to a fine of was arrested by the Armed Forces
indecency and smuggling obscene $250,000, a mandatory special of the Philippines (AFP) and
material for 30 months. It assessment of $100.00, and a charged with 8 offenses, including
appeared that, in 2000, he used three-year term of supervised 6 child sex tourism offences and
Home Office headed paper, release per count.146 offences relating to the importation
belonging to the former prime of child pornography. The charges
minister, Sir Edward Heath, to type involve the alleged sexual abuse

40
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
152
of two Filipino girls which found to contain approximately This incident prompted the
allegedly occurred during a recent 100 sexually explicit images of Representative to the Philippines of the
trip to the Philippines. King was Filipino boys. A search of Datan’s United Nations Children’s Fund
first identified at the airport on his home later revealed an extensive (UNICEF) to issue a statement
return from the Philippines with a child pornography collection. highlighting the widespread reality of
range of photographic material in Datan denied any inappropriate child pornography in the Philippines.
his luggage. He was later arrested sexual contact with them.150
after his home was searched and Still, according to Alex Ramos, a
explicit photographs were found. B. Local Prosecution member of the technical working group
King was refused bail and is due pursuing the bill being introduced by
to face court. 149 In July 2004, seventy (70) children, Senator Maria Ana Consuelo “Jamby”
aged 5 to 14, were rescued from a Madrigal – to mete stiffer penalties on
8. On 19 November 2004, child pornography ring during a raid people caught distributing, creating,
Edilberto Datan, 60 years old, in Los Banos, Laguna, resulting in the and purveying child pornography in
was indicted on child sex tourism arrest of seven people, including a the Philippines in various media
and charges of producing, Japanese national, 151 a certain including the Internet – many cases
importing and possessing child Noritaka Ota, alias Tony. The involving child pornography have
pornography. He was arrested on children were lured into having an been dismissed; and claimed that
4 November 2004 as he returned excursion, where thirty (30) children more than 20 cases involving child
from a two-month trip to the were later separated from their pornography that have been dismissed
Philippines. Four (4) memory chaperons and were being filmed. The by courts in the last three years. Most
sticks, taped inside a jeans pocket children were made to believe that they of the courts’ ruling implied that mere
of Datan’s luggage, were found were modeling and are being paid possession of child pornography is not
by U.S. Customs and Border P10,000. Only 6 nude pictures were illegal.153
Protection officers at Los Angeles taken but were sufficient to prove that
International Airport and were the perpetrators were into illegal trade.

III
P ROSECUTING THE O FFENSES
I. Criminal Law Article 201. 154 Immoral materials, including child
doctrines, obscene pornography, and
Act No. 3815, or the Revised Penal publications and exhibitions distribution of which,
Code (RPC), was promulgated way and indecent shows. — The especially in optical disks)
back in 1930, decades before the penalty of prision mayor 155 or a
advent of computers and the Internet fine ranging from six thousand to b. Those who, in
and before the proliferation of cheap twelve thousand pesos, or both theaters, fairs,
image capturing devices, such video such imprisonment and fine, shall cinematographs or any
recorders and cameras. A number of be imposed upon: other place, exhibit,
special laws have provided means to indecent or immoral
protect both children and women from 1. Those who shall publicly plays, scenes, acts or
exploitation, such as Republic Act No. expound or proclaim shows, whether live or
7610, otherwise known as the “Special doctrines openly contrary to in film, which are
Protection And Discrimination Act,” as public morals; prescribed by virtue
amended by Republic Act No. 7658 hereof, shall include
and Republic Act No. 9231, and 2. those which
Republic Act No. 9208 or the “Anti- a. The authors of obscene
Trafficking of Persons Act of 2003,” literature, published 1. glorify criminals or
among others. with their knowledge in condone crimes;
any form; the editors
1. In General publishing such 2 . serve no other
literature; and the purpose but to satisfy
The Revised Penal Code provision owners/operators of the market for
applicable in common to cybersex, sex the establishment violence, lust or
scandal, MMS sex clips, and child selling the same; pornography;
pornography is Article 201, which (emphasis supplied, for (emphasis supplied, for
provides: production of pornographic exhibition in the practice

41
of cybersex and other participating in such, as they lack Persons who are responsible in
forms of streaming maturity and lack legal capacity to employing or inducing minors into
pornography) provide legal consent. prostitution may, in addition, be
pursued through Article 340 of
3. offend any race or In contrast, chat hosts (cybersex the Revised Penal Code.
religion; models), who are above 18 years old
and who conduct themselves in such Article 340. 159 Corruption
4. tend to abet traffic in and practice in a lewd or lustful manner, of minors. — Any person who
use of prohibited drugs; although there may be no physical shall promote or facilitate the
and sexual intercourse at all, are within the prostitution or corruption of
purview of Article 202 (5) of the persons underage to satisfy the
5. are contrary to law, Revised Penal Code, which provides: lust of another, shall be punished
public order, morals, by prision mayor, and if the culprit
and good customs, Article 202. Vagrants and is a public officer or employee,
established policies, prostitutes; penalty. – xxx including those in government-
lawful orders, decrees owned or controlled corporations,
and edicts; xxx he shall also suffer the penalty of
temporary absolute
3. Those who shall sell, give 5. Prostitutes. — For the disqualification.
away or exhibit films, prints, purposes of this article,
engravings, sculpture or women who, for money or Other acts of lasciviousness, which may
literature which are offensive profit, habitually indulge in have been committed in line with child
to morals. (emphasis sexual intercourse or abuse, may also be penalized as
supplied, for production and lascivious conduct, are provided by Article 339 of the Revised
distribution of pornographic deemed to be prostitutes. Penal Code, which states:
materials, especially in
optical disks) Any person found guilty of any Article 339. Acts of
of the offenses covered by this lasciviousness with the
In case Article 201, by certain articles shall be punished by consent of the offended
circumstances, does not apply; Article arresto menor156 or a fine not party. — The penalty of arresto
200 of the Revised Penal Code exceeding 200 pesos, and in mayor shall be imposed to punish
provides: case of recidivism, by arresto any other acts of lasciviousness
mayor in its medium period to committed by the same persons
Article 200. Grave scandal. prision correccional 157 in its and the same circumstances as
– The penalties of arresto mayor minimum period or a fine those provided in Articles 337
and public censure shall be ranging from 200 to 2,000 and 338.
imposed upon any person who pesos, or both, in the discretion
shall offend against decency or of the court. B. Republic Act 9208
good customs by any highly
scandalous conduct not expressly Persons who are responsible in Section 3(a), of Republic Act No. 9208
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

falling within any other article of employing or inducing these persons (RA 9208, or the Anti- Trafficking of
this Code. into prostitution may be pursued Persons Act of 2003) provides that
through Article 341 of the Revised
2. Cybersex and Child Penal Code: “Trafficking in persons” shall mean the
Pornography recruitment, transportation, transfer,
Article 341. 158 White slave harbouring or receipt of persons, by
A. Act No. 3815, the Revised trade. — The penalty of prision means of the threat or use of force or
Penal Code mayor in its medium and other forms of coercion, of abduction,
maximum period shall be of fraud, of deception, of the abuse of
Article 201, else Article 200, of the imposed upon any person who, power or of a position of vulnerability
Revised Penal Code likewise applies in any manner, or under any or of the giving or receiving of
as to the photographs and videos that pretext, shall engage in the payments or benefits to achieve the
may have been produced and business or shall profit by consent of a person having control
distributed in the commission of child prostitution or shall enlist the over another person, for the purpose
abuse. The minors depicted therein services of any other for the of exploitation. Exploitation shall
are properly victims in the crime, even purpose of prostitution. include, at a minimum, the
if they may have been willing in exploitation of the prostitution of

42
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
others or other forms of sexual servitude or debt bondage; issues these certificates and
exploitation, forced labour or stickers as proof of
services, slavery or practices similar (d) To undertake or organize compliance with government
to slavery, servitude or the removal of tours and travel plans regulatory and pre-departure
organs.160 (emphasis supplied) consisting of tourism requirements for the purpose
packages or activities for the of promoting trafficking in
Various acts and circumstances in RA purpose of utilizing and persons;
9208 are specifically penalized. First, offering persons for
Section 4 of said Act enumerates the prostitution, pornography or (c) To advertise, publish, print,
acts constituting trafficking in persons, sexual exploitation; broadcast or distribute, or
particularly involving prostitution, cause the advertisement,
pornography and sexual exploitation, (e) To maintain or hire a person publication, printing,
as to engage in prostitution or broadcasting or distribution by
pornography; any means, including the use
Section 4. Acts of Trafficking of information technology
in Persons. - It shall be unlawful (f) To adopt or facilitate the and the internet, of any
for any person, natural or adoption of persons for the brochure, flyer, or any
juridical, to commit any of the purpose of prostitution, propaganda material that
following acts: pornography, sexual promotes trafficking in
exploitation, forced labor, persons;
(a) To recruit, transport, transfer; slavery, involuntary servitude
harbor, provide, or receive or debt bondage; (d) To assist in the conduct of
a person by any means, misrepresentation or fraud
including those done under xxx for purposes of facilitating the
the pretext of domestic or acquisition of clearances and
overseas employment or A violation of any act enumerated in necessary exit documents
training or apprenticeship, Section 4 penalizes the person guilty from government agencies
for the purpose of of committing said act(s) to suffer “the that are mandated to provide
prostitution, pornography, penalty of imprisonment of twenty (20) pre-departure registration
sexual exploitation, forced years and a fine of not less than One and services for departing
labor, slavery, involuntary million pesos (P1,000,000.00) but not persons for the purpose of
servitude or debt bondage; more than Two million pesos promoting trafficking in
(P2,000,000.00).”161 persons;
(b) To introduce or match for
money, profit, or material, Second, Section 5 of the same Act (e) To facilitate, assist or help in
economic or other enumerates the acts that promote the exit and entry of persons
consideration, any person or, trafficking in persons, to wit: from/to the country at
as provided for under international and local
Republic Act No. 6955, any Section 5. Acts that Promote airports, territorial boundaries
Filipino woman to a foreign Trafficking in Persons. - The and seaports who are in
national, for marriage for the following acts which promote or possession of unissued,
purpose of acquiring, facilitate trafficking in persons, tampered or fraudulent travel
buying, offering, selling or shall be unlawful: documents for the purpose of
trading him/her to engage in promoting trafficking in
prostitution, pornography, (a) To knowingly lease or persons;
sexual exploitation, forced sublease, use or allow to be
labor, slavery, involuntary used any house, building or (f) To confiscate, conceal, or
servitude or debt bondage; establishment for the purpose destroy the passport, travel
of promoting trafficking in documents, or personal
(c) To offer or contract persons; documents or belongings of
marriage, real or simulated, trafficked persons in
for the purpose of acquiring, (b) To produce, print and issue furtherance of trafficking or
buying, offering, selling, or or distribute unissued, to prevent them from leaving
trading them to engage in tampered or fake counseling the country or seeking redress
prostitution, pornography, certificates, registration from the government or
sexual exploitation, forced stickers and certificates of any appropriate agencies; and
labor or slavery, involuntary government agency which

43
(g) To knowingly benefit from, exercises authority over the all circumstances for the best
financial or otherwise, or trafficked person or when the interest of the parties, order a
make use of, the labor or offense is committed by a closed-door investigation,
services of a person held to a public officer or employee; prosecution or trial. The name
condition of involuntary and personal circumstances of the
servitude, forced labor, or (e) When the trafficked person trafficked person or of the
slavery. is recruited to engage in accused, or any other information
prostitution with any member tending to establish their identities
Any person found guilty of committing of the military or law and such circumstances or
any of the acts enumerated in Section enforcement agencies; information shall not be disclosed
5 of RA 9208 “shall suffer the penalty to the public.
of imprisonment of fifteen (15) years (f) When the offender is a
and a fine of not less than Five member of the military or In cases when prosecution or trial
hundred thousand pesos law enforcement agencies; is conducted behind closed-
(P500,000.00) but not more than One and doors, it shall be unlawful for any
million pesos (P1,000,000.00).”162 editor, publisher, and reporter or
(g) When by reason or on columnist in case of printed
Third, Section 6 of the same Act occasion of the act of materials, announcer or producer
enumerates the ways how trafficking trafficking in persons, the in case of television and radio,
in persons may be deemed qualified, offended party dies, becomes producer and director of a film
to wit: insane, suffers mutilation or in case of the movie industry, or
is afflicted with Human any person utilizing tri-media
Section 6. Qualified Trafficking Immunodeficiency Virus facilities or information
in Persons. - The following are (HIV) or the Acquired technology to cause publicity of
considered as qualified trafficking: Immune Deficiency any case of trafficking in persons.
Syndrome (AIDS).
(a) When the trafficked person Any person who violates Section 7 of
is a child; Any person found guilty of qualified the law suffers “the penalty of
trafficking under Section 6 suffers “the imprisonment of six (6) years and a
(b) When the adoption is penalty of life imprisonment and a fine fine of not less than Five hundred
effected through Republic Act of not less than Two million pesos thousand pesos (P500,000.00) but not
No. 8043, otherwise known (P2,000,000.00) but not more than more than One million pesos
as the “Inter-Country Five million pesos (P5,000,000.00).” (P1,000,000.00).” 164
163
Adoption Act of 1995” and
said adoption is for the Certain persons, natural or juridical,
purpose of prostitution, Lastly, Section 7 of the same Act are meted additional penalties or
pornography, sexual provides for the protection of the right limitations when they violate RA 9208,
exploitation, forced labor, of privacy of trafficked persons and that is:
slavery, involuntary servitude the accused, to wit:
or debt bondage; 1. C o r p o r a t i o n ,
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

Section 7. Confidentiality. - partnership, and other


(c) When the crime is committed At any stage of the investigation, juridical persons
by a syndicate, or in large prosecution and trial of an
scale. Trafficking is deemed offense under this Act, law If the offender is a
committed by a syndicate if enforcement officers, corporation, partnership,
carried out by a group of prosecutors, judges, court association, club,
three (3) or more persons personnel and medical establishment or any juridical
conspiring or confederating practitioners, as well as parties to person, the penalty shall be
with one another. It is the case, shall recognize the right imposed upon the owner,
deemed committed in large to privacy of the trafficked person president, partner, manager,
scale if committed against and the accused. Towards this and/or any responsible
three (3) or more persons, end, law enforcement officers, officer who participated in
individually or as a group; prosecutors and judges to whom the commission of the crime
the complaint has been referred or who shall have knowingly
(d) When the offender is an may, whenever necessary to permitted or failed to prevent
ascendant, parent, sibling, ensure a fair and impartial its commission.165
guardian or a person who proceeding, and after considering

44
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
The registration with the retirement and other benefits Any ascendant, guardian, or
Securities and Exchange shall likewise be forfeited. 168 person entrusted in any capacity
Commission (SEC) and with the care of a child who shall
license to operate of the 4 . Adopter cause and/or allow such child to
erring agency, corporation, be employed or to participate in
association, religious group, Conviction by final judgment an obscene play, scene, act or
tour or travel agent, club or of the adopter for any movie shall be imposed a penalty
establishment, or any place offense under RA 9208 shall of prison mayor in its medium
of entertainment shall be result is the immediate period.” 170
cancelled and revoked rescission of the decree of
permanently. The owner, adoption. 3. Sex Scandal optical discs
president, partner or and sexually-explicit MMS clips
manager thereof shall not be 5 . Person who engages
allowed to operate similar services of trafficked Article 201, or Article 200 of the
establishments in a different persons Revised Penal Code, are the provisions
name.166 applicable to these forms of
Any person who buys or pornography. It is only by certain
2 . Foreigners engages the services of circumstances, such as that a
trafficked persons for pornographic material is included to
If the offender is a foreigner, prostitution shall be an otherwise ambivalent statement,
he shall be immediately penalized, on his/her first that Articles 355 and 359 of the
deported after serving his offense for six (6) months of Revised Penal Code may attach, as the
sentence and be barred community service, as may issue as to “imputation” is emphasized.
permanently from entering be determined by the court, Article 355 provides:
the country.167 and a fine of Fifty thousand
pesos (P50,000.00). On Article 355. Libel means by
3 . Government employees his/her second and writings or similar means. —
or officials subsequent offenses, such A libel 171 committed by means
person may be penalized to of writing, printing, lithography,
Any employee or official of imprisonment of one (1) year engraving, radio, phonograph,
government agencies who and a fine of One hundred painting, theatrical exhibition,
shall issue or approve the thousand pesos cinematographic exhibition, or
issuance of travel exit (P100,000.00).169 any similar means, shall be
clearances, passports, punished by prision correccional
registration certificates, C. Republic Act 7610 in its minimum and medium
counseling certificates, periods or a fine ranging from
marriage license, and other In addition, Article V, Section 9, of 200 to 6,000 pesos, or both, in
similar documents to Republic Act No. 7610 establishes that addition to the civil action which
persons, whether juridical or “Obscene Publications and Indecent may be brought by the offended
natural, recruitment Shows” involves party.
agencies, establishments or
other individuals or groups, “Any person who shall hire, Article 359, on the other hand, of the
who fail to observe the employ, use, persuade or coerce Revised Penal Code provides:
prescribed procedures and a child to perform in obscene
the requirement as provided exhibitions and indecent shows, Article 359. Slander by
for by laws, rules and whether live or in video, pose, or deed. — The penalty of arresto
regulations, shall be held model in obscene publications or mayor in its maximum period to
administratively liable, pornographic materials or to sell prision correccional in its
without prejudice to criminal or distribute the said materials minimum period or a fine
liability under RA 9208. The shall suffer the penalty of prison ranging from 200 to 1,000
concerned government mayor in its medium period. pesos shall be imposed upon any
official or employee shall, person who shall perform any act
upon conviction, be If the child used as a performer, not included and punished in this
dismissed from the service subject or seller/distributor is title, which shall cast dishonor,
and be barred permanently below twelve (12) years of age, discredit or contempt upon
to hold public office. His/her the penalty shall be imposed in another person. If said act is not
its maximum period. of a serious nature, the penalty

45
shall be arresto menor or a fine (4) Vexing or humiliating another pending after the date of effectivity,
not exceeding 200 pesos. on account of his religious and was a direct result of the enactment
beliefs, lowly station in life, of Republic Act No. 8792173 , or the
II. Civil Damages place of birth, physical Electronic Commerce Act. The
defect, or other personal Supreme Court notes at the head of
Civil damages, clearly, may be had condition.” the Rules (Administrative
for sex clip leakages that occur with Memorandum No. 01-7-01-SC) that
sex scandal optical disc and MMS clips Article 32 of the Civil Code, in turn,
distribution. provides that Acting on the Memorandum
dated 18 June 2001 of the
The right to dignity, and the right to “Any public officer or employee, Committee on the Revision of the
privacy of communication and or any private individual, who Rules of Court to Draft the Rules
correspondence, are rights protected directly or indirectly obstructs, on E-Commerce Law [R.A. No.
by the Constitution. Section 11 of defeats, violates or in any manner 8792] submitting the Rules on
Article II of the 1987 Constitution impedes or impairs any of the Electronic Evidence for this
(Declaration of Principles and State following rights and liberties of Court’s consideration and
Policies”states that the another person shall be liable to approval, the Court Resolved to
the latter for damages: APPROVE the same.
“The State values the dignity of
every human person and xxx The Rules on Electronic Evidence
guarantees full respect for human shall apply to cases pending after
rights.” (11) The privacy of their effectivity. These Rules shall
communication and take effect on the first day of
Section 3(1) states that the correspondence; August 2001 following their
publication before the 20th of
“privacy of communication and xxx July in two newspapers of general
correspondence shall be circulation in the Philippines.
inviolable except upon lawful In any of the cases referred to in (17th July 2001.)174
order of the court, or when public this article, whether or not the
safety or order requires defendant’s act or omission The Rules were amended on 24
otherwise, as prescribed by law.” constitutes a criminal offense, the September 2002 to include criminal
aggrieved party has a right to cases in its coverage, effective 24
In consonance to these, Article 26 of commence an entirely separate October 2002.175 Section 2, Rule 1,
the Civil Code provides that and distinct civil action for of AM No. 01-7-01-SC, now reads
damages, and for other relief. as
“every person shall respect the Such civil action shall proceed
dignity, personality, privacy and independently of any criminal Section 2. Cases covered. -
peace of mind of his neighbors prosecution (if the latter be These Rules shall apply to the
and other persons. The following instituted), and may be proved by criminal and civil actions and
and similar acts, though they may a preponderance of evidence. proceeding, as well as quasi-
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

not constitute a criminal offense, judicial and administrative


shall produce a cause of action The indemnity shall include moral cases.176
for damages, prevention and damages. Exemplary damages
other relief: may also be adjudicated. Electronic document is defined by
Section 1 (h), Rule 2, of the Rules on
(1) Prying into the privacy of The responsibility herein set forth Electronic Evidence as
another’s residence; is not demandable from a judge
unless his act or omission (h) “Electronic document” refers to
(2) Meddling with or disturbing constitutes a violation of the Penal information or the
the private life or family Code or other penal statute.” representation of information,
relations of another; data, figures, symbols or other
III. Evidence modes of written expression,
(3) Intriguing to cause another to described or however
be alienated from his The Rules on Electronic Evidence 172 represented, by which a right is
friends; was made effective on 1 August 2001 established or an obligation
and initially applied to civil, quasi- extinguished, or by which a fact
judicial and administrative proceedings may be proved and affirmed,

46
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
which is received, recorded, and the fact that a privilege was a party to the same or has
transmitted, stored, processed, communication is in the form of an personal knowledge thereof. In
retrieved or produced electronic document does not lose the the absence or unavailability of
electronically. It includes digitally confidential character, as provided for such witnesses, other competent
signed documents and any by Section 3, of the same Rule: evidence may be admitted.
print-out or output, readable by
sight or other means, which Section 3. Privileged A recording of the telephone
accurately reflects the electronic communication. – The conversation or ephemeral
data message or electronic confidential character of a electronic communication shall be
document. For purposes of privileged communication is not covered by the immediately
these Rules, the term “electronic lost solely on the ground that it is preceding section.
document” may be used in the form of an electronic
interchangeably with “electronic document. If the foregoing communications
data message”. are recorded or embodied in an
Electronic documents are admissible electronic document, then the
In relation thereto, “Electronic data as evidence, according to Section 2, provisions of Rule 5 shall apply.
message” is defined by Section 1 (g), Rule 3 of the said Rules, which
Rule 2, of the same Rules as provides: Electronic videos, audios and images,
whether in electronic or optical
(g) “Electronic data message” refers Section 2. Admissibility. – An medium, although strictly not
to information generated, sent, electronic document is admissible “Electronic documents” according the
received or stored by electronic, in evidence if it complies with the first sentence of Section 1(h), Rule 2,
optical or similar means. rules on admissibility prescribed may be argued by technologically-
by the Rules of Court and related inclined professionals to be within its
On the other hand, “Ephemeral laws and is authenticated in the context in light of the second sentence
electronic communication,” is defined manner prescribed by these of said section in relation to Section 1
by Section 1(k), of the same Rule, Rules. (g) of the same Rule, inasmuch as basic
which provides electronic formats of written
Particularly, the manner audio, video documents, images, audio files, and
and similar evidence is made video remain in binary 177 and
(k) “Ephemeral electronic admissible is provided by Section 1 of ASCII178 modes (the latter with proper
communication” refers to Rule 11, of the Rules on Electronic file format identifiers at the start of its
telephone conversations, text Evidence, to wit: code), which are merely interpreted
messages, chatroom sessions, as user-viewable text, sound, images,
streaming audio, streaming Section 1. Audio, video and and videos by appropriate computer
video, and other electronic similar evidence. – Audio, programs or applications. This
forms of communication photographic and video evidence argument, however, may result to the
the evidence of which is not of events, acts or transactions same outcome as to the issue as to the
recorded or retained. shall be admissible provided it definition of “hacking,”179 which favors
(emphasis supplied) shall be shown, presented or a legal conclusion without
displayed to the court and shall consideration to technical persuasion.
Electronic documents are functional be identified, explained or It thus may be said that electronic
equivalents of paper-based authenticated by the person who video, images and audio, and similar
documents, as provided by Section 1, made the recording or by some forms are not “Electronic documents”
Rule 3 of the said Rules, to wit: other person competent to testify although they constitute “Electronic
on the accuracy thereof. evidence” nonetheless; in the same
Section 1. Electronic manner that photographs, videos, and
documents as functional Section 2 of Rule 11, of the said Rules, phonographic records are not
equivalent of paper-based on the other hand, provides for the considered as part of such class of
documents. – Whenever a rule admissibility of ephemeral electronic evidence which are documentary, but
of evidence refers to the term of communications, to wit: rather are included as object evidence.
writing, document, record,
instrument, memorandum or Section 2. Ephemeral The question remains whether the
any other form of writing, such electronic communications. application of the Rules of Electronic
term shall be deemed to include – Ephemeral electronic Evidence is limited to cases based on
an electronic document as communications shall be proven its original context, that which relates
defined in these Rules. by the testimony of a person who to the Electronic Commerce Act and

47
thus which involves purely business applicability of the Rules. (a) The inducement or coercion
transactions, but which has been of a child to engage in any
extended to include criminal cases; or IV. Miscellaneous: Convention unlawful sexual activity;
whether the application of the Rules of and Treaty obligations
Electronic Evidence is to be broadly (b) The exploitative use of
applied to be deemed an extension of The Philippines is a signatory of the children in prostitution or
Rules 128 to 134 of the Revised Rules United Nations Convention on the other unlawful sexual
of Court, and thus the Rules apply to Rights of the Child and thus is obligated practices;
criminal cases even those without to protect children from all forms of
business complexion. A perusal of sexual exploitation and sexual abuse. (c) The exploitative use of
Section 1, Rule 1 of the Rules of Article 34 of said Convention requires children in pornographic
Electronic Evidence – which provides that parties must protect children from performances and
being coerced to engage in any materials.”180
Section 1. Scope. – Unless unlawful sexual activity, from being
otherwise provided herein, these exploited in prostitution, and from In addition to this, the Philippines also
Rules shall apply whenever an being used in pornographic ratified in 2002 the “Optional Protocol
electronic document or electronic performances and materials. Article to the Convention on the Rights of the
data message, as defined in Rule 34 of the Convention specifically Child on the sale of children, child
2 hereof, is offered or used in provides: prostitution and child pornography,”
181
evidence. which calls for governments to
“States Parties undertake to ensure that adults involved in the
– and a perusal of the general protect the child from all forms exploitation of children are punished,
definitions of electronic data message of sexual exploitation and sexual and that children who have been
and electronic documents in Section 1 abuse. For these purposes, States sexually exploited, abused, or
(g) and (h) of Rule 2, respectively – as Parties shall in particular take all trafficked receive services to allow for
quoted earlier – do not suggest data appropriate national, bilateral their full social reintegration and their
transmission to be exclusively confined and multilateral measures to physical and psychological recovery.
to business transactions, and thus favor prevent:
the second conclusion as to the

IV
PROPOSALS

Dealing with computer-related crimes prosecution. 182 The question of Internet, in light of the anti-trafficking
in the Philippines is still in its infancy. enforcement is a constant, and the law, certain sectors remain to see them
The law enforcement agencies and the outcome of such relies upon the as inadequate and lax. Still, there is
judicial system are still ill-equipped to political will of public authorities. The an agreement that proper agencies
handle high-tech cases, both in terms question of the existence of law should should pursue the drive against
of experience and equipment. As never laxly taken, and should be cybersex vigorously. Supplementary to
computer-related crimes exist across revised and reconciled with the reality this, legislators propose that said
borders, technical assistance is agencies should be adequately
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

of the situation, inasmuch as the ones


necessary among countries, with who aim to violate the law are active equipped in terms of technology,
equipment and training being provided and crafty in finding ways to bend, if human resources, state-of-the-art
by more developed countries. For not break, or go around the law. equipment and the necessary facilities
one, the United States of America set and logistics. 184
up a computer crime unit in the I. Cybersex
Philippines in 2003. Atty. Ivan John Certain measures are proposed
E. Uy, chairman of the subcommittee The prominence of organized herein:
on e-commerce of the Rules of Court cybersex business, with the recent raid
committee and Director of the on Orgasmic Studios Inc., highlighted 1. There should be stricter fines
Management Information System the need for stricter laws against against operators of organized
Office of the Supreme Court, said that obscenities. 183 Although certain cybersex business, and effectively
the computer crime unit was envisioned senators, such as Senate President classify such operators in the same
to supervise all computer-related Franklin Drilon and Senator Mar level as other participants in
crimes that will be manned by Roxas, claim that there are enough organized crime.
Philippine government officials skilled laws to prosecute prostitution and
in computer crime investigation and sexual exploitation through the

48
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
2. There should be better system of of Article 201 of the Revised Penal Thus, there should be an
facilities inspection to determine Code. Stiffer fines should be made equivalent law to the Wire Tapping
whether a cybercafe, indeed inasmuch as the reputation and dignity Law – as the latter dwells solely
operates for the benefit of public, of those who took part in the film, on sound recordings – that would
or is being used as a front to cater particularly the women, are forever apply to videos and pictures. This
to private indulgences. ruined. Producers and distributors of is necessary inasmuch as a
such film or videos should be fined University instructor in Bacolod
3. There should be a central registry more harshly inasmuch as they have City, to illustrate, installed
of all mobile phone numbers, the financial means and the boldness surveillance equipment or a
whether pre-paid or post-paid, to to mass produce the films, and hidden camera inside his boarding
determine the identity of the therefore magnifies the damage that house’s bathroom.185
person who used said SIM card in would be inflicted upon the ad hoc porn
the perpetuation of prohibited acts. actors depicted in the video/film/clip. 5. Proper laws must be made in
Said registry should also include preventing voyeurs from utilizing
transaction dates of transfer of Further, some other measures are any camera-like devices to acquire
SIM. proposed herein: images of strangers, especially for
malicious reasons (such as
4. There should also be proper 1. Further regulation must be made downblousing and upskirting), in
regulations as to the operation of in the proper use of public places and communal
money transfers over mobile telecommunication networks, spaces.
phones, inasmuch as mobile especially as to the transmission
phones may be utilized to acquire of objectionable content. 6. Proper laws must be made to
remote remittance of money strengthen the rights of people to
generated by illicit means, in a 2. There should be a central registry dignity and privacy.
degree lesser than what may be of all computer peripherals and
placed within the purview of the consumer devices which are able 7. Laws regulating data handling by
money laundering law. to transfer electronic data into technicians, whether as to
optical media. A system to computers, mobile phones or
5. There should be proper mapping determine the relation, or impose analogous devices, must be in
of Philippine websites, featuring the determination of a relation, place.
adult content, even if such do not between the optical disc writer
espouse the .ph domain. (CD-R, CD-RW, DVD-R, DVD+R, III. Child Pornography
Pornography is not condoned DVD-RW, and DVD+RW) and the
within Philippine jurisdiction, and optical disc written, should be The disturbing fact involving websites
thus there is no reason to mitigate made. containing Filipino teens is that this
or qualify the issue with arguments conclusively shows that pornography
involving financial viability, or 3. There should be an tailor-fit article involving Filipino females exists, and
implication as to lost taxes. within the Revised Penal Code as the volume of which is increasingly
to crimes against honor that would growing. The other disturbing fact is
6. There should be a central registry shield persons from dishonor, that the models appearing therein,
of all MAC addresses for discredit, or contempt, even especially in the Filipina 18 and Manila
computers (and similar devices) to without manifest imputation by 18 websites, are in the borderline of
determine the identity of the user- words or writing, but by imputation legal, depending on the proper
owner of the computer which may by analogous deed (such as appraisal of the models’ age. The
be used in the perpetuation of unconsented distribution). Stiff costumes use by the models, i.e. high
prohibited acts. Said registry penalties should be imposed school uniforms, provide a confusing
should also include transaction against persons who leak personal assessment as to the real age of such
dates of sale of the computer (and sexual documents, which models, taking into mind that most high
allied devices). incriminates other persons besides school students graduate usually at the
the distributor himself/herself, to age of 17 to 18. 186 The two
II. Sex Scandals and lewd MMS the public. conclusions that can be made from the
clips images are that (1) the models are by
4. There should be a law imposing themselves underage, or that (2) the
The penalty of prision mayor or a fine higher penalties against people models simulate to appear to be
ranging from six thousand to twelve who install hidden cameras and underage. Such dilemma provides a
thousand pesos or both is obviously other paraphernalia to spy upon good debate ground, therefore,
inadequate to impose upon a violator people in their intimate moments. whether child pornography would

49
him to take flight from the Philippines,
and to make him liable to his crime in 7. That proper laws be made or
necessary include simulated child
the Philippines even if his native country strengthened to effectively prevent
pornography.
has acquired custody of the perpetrator foreigners who committed
and has punished him accordingly with criminal acts in the Philippines
Although child pornography may be
their laws. from leaving the country, and that
prosecuted according to Article 201
stiff sanction be given to other
of the Revised Penal Code and
Thus, in fine, the following are being individuals who advice, aid, or by
Republic Act 7610, the laws are
proposed: such analogous act, the felon to
obviously inadequate to specifically
take flight.
handle such evil. It is necessary that a
1. That simulated child pornography
specific law pertaining to child
should be included in the class of 8. That Philippine courts be given
pornography should be promulgated,
pornography determined to be jurisdiction, through the enactment
to distinguish such phenomenon from
child pornography. of the proper law, over instances
regular pornography, and to provide
of publication of child
harsher measures against those who
2. Registration of computer users in pornography, whether stored in
indulge in it, in light of the clear
Internet cafés should be servers outside the country, as long
vulnerability of children to such illicit
mandatory, to facilitate the as the individual depicted therein
practice. The law should include
apprehension of law offenders is a Filipino. (A proposal to
simulated child pornography as part
who transmit illicit materials enforce global jurisdiction, which
of child pornography. Arguments as
through anonymous webmail is recognized in acts enumerated
to valid role-playing cannot even be
accounts through these facilities. in Article 2 of the Revised Penal
taken into consideration inasmuch as
Code.)
pornography, and not just child
3. That stiff penalties be made against
pornography, is illegal in our
adults who distribute pornographic 9. That proper laws be made to curb
jurisdiction; such materials being
materials or encourage the the current situation that the
obscene and do not easily attach to
viewing of such materials to Philippines is made a prime
the concept of freedom of expression
minors. destination due to sex tourism.
as in the United States. The law should
provide the proper penalties for its
4. That stiffer penalties be made 10. That extradition treaties with
production, possession, and/or
against pedophiles who take developed countries, especially
distribution; not necessarily as a
theatrical and photographic Australia, United States, and the
compound act but such acts taken
mementos of the children that they United Kingdom, be strengthened
individually; but with proper provisions
ravish, and that further stiffer fines to acquire jurisdiction over
to provide consideration to child abuse
be made against pedophiles who foreigners who, although remotely
investigators, enforcers, and legitimate
distribute these pornographic done in their respective countries,
researchers. The penalty should be
materials to other individuals. are cultivating child and women-
more than prision mayor, or a Php
related crimes in the Philippines.
6,000 to Php 12,000 fine. The penalty
5. That mere possession of child
should be per count of illicit material
pornography be made to 11. That the culpability of foreigners
and not as a lump sum of all the acts.
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

constitute a crime, and that who have taken flight from the
Our present laws pale in comparison
production and distribution be Philippines from crimes committed
to the penalties provided to similar
considered as separate counts of within Philippine jurisdiction
cases in the United States. 187
committed crime. remain even if the foreigner has
been charged in their own country
It is also necessary to provide certain
6. That civil penalties be determined for violation of their laws, and
laws or amendments 188 to existing
not by the lump sum of confiscated thereby be subjected to extradition
laws to strengthen and further facilitate
materials but per piece of after they have served their
the successful acquisition of the custody
photograph (and its electronic sentence in their country, if not yet
of the perpetrator, especially if the
equivalent), and per determined dead.
perpetrator is a foreigner, and prevent
duration for videos.

Endnotes w w w. b r i t a n n i c a . c o m / e b c / “Pornography.” Encyclopedia of Ethics.


article?tocId=9376014>. New York: Garland Publishing. <http:/
1 Prostitution. Britannica Concise 2 Hogg, Charles. What is Pornography? /www.slais.ubc.ca/courses/libr500/
Encyclopedia. Retrieved January 27, Pornography and the Internet in the fall1999/www_presentations/c_hogg/
2005 from Encyclopædia Britannica United States. Citing the definition of define.htm>
Premium Service. <http:// VanDeBeer, Donald. 1992. 3 Section 3(k), Republic Act 9208. RA 9208

50
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
is entitled “An Act to Institute Policies to Strom, Leslie. Sex Manuals in stood for Vertical Helical Scan, after the
Eliminate Trafficking in Persons Relationship Hell. Get Lost Magazine relative head/tape scan technique.
especially Women and Children, .Com <http:// Several improved versions of VHS exist,
establishing the necessary institutional www.getlostmagazine.com/reviews/ most notably S-VHS, an improved analog
mechanism for the protection and 1999/9904relbooks/eroticbooks.html>, standard, and D-VHS, which records
support of trafficked persons, providing and The Art of Loving. Shunga - digital video onto a VHS form factor
penalties for its violations, and for other Japanese Erotic Art. <http:// tape. (VHS. Wikipedia, the free
purposes.” See the Philippine Laws and www.theartofloving.ca/art.asp> encyclopedia. Retrieved 10 February
Jurisprudence Databank - The Lawphil 15 Bellis, Mary. “History of Photography and 2005 from Wikipedia. <http://
Project. <http://www.lawphil.net/ the Camera - Pinhole Camera to en.wikipedia.org/wiki/VHS>)
statutes/repacts/ra2003/ Daguerreotype.” Retrieved January 27, 21 VHS-C (C for compact) is used in some
ra_9208_2003.html>. 2005 from About, Inc. <http:// camcorders. Since VHS-C tapes are
4 Anderson, Kerby. The Pornographic inventors.about.com/library/inventors/ based on the same magnetic tape as full
Plague. Probe Ministries. Citing the blphotography.htm> size tapes, they can be played back in
Final Report of the Attorney General’s 16 Bellis, Mary. “The History of the Motion standard VHS players using an adapter.
Commission on Pornography, ed. Picture.” Retrieved January 27, 2005 (VHS. Wikipedia, the free encyclopedia.
Michael McManus (Nashville, Tenn.: from About, Inc. <http:// Retrieved 10 February 2005 from
Rutledge Hill Press, 1986), 8. <http:// inventors.about.com/library/inventors/ Wikipedia. <http://en.wikipedia.org/
www.leaderu.com/orgs/probe/docs/ blmotionpictures.htm> wiki/VHS>)
pornplag.html> 17 Polaroid® (a trademark of the Polaroid 22 Binary, in mathematics, is “Base two;
5 Olson, Jeff. When A Man’s Eye Wanders. Corporation) is “the name of a type of i.e. a number representation consisting
What is pornography? Retrieved 10 synthetic plastic sheet which is used to of zeros and ones used by practically all
February 2005 from RBC Ministries. polarise light,” while a Polaroid camera computers because of its ease of
<http://www.gospelcom.net/rbc/ds/ is “a type of camera with self-developing implementation using digital electronics
cb991/page1.html> film usually called an ‘instant camera’. and Boolean algebra.” (Binary -
6 Anderson, Kerby. The Pornographic The invention of modern instant definition by Dict.die.net <http://
Plague. Probe Ministries. Supra, see cameras is generally credited to dict.die.net/binary/>, citing the
note 4. American scientist Edwin Land, who definition by the Free On-line Dictionary
7 Legal Definition of Obscene, Obscenity. unveiled the first commercial instant of Computing (10 October 2003). <http:/
Retrieved 10 February 2005 from The camera, the Land Camera, in 1947, 10 /wombat.doc.ic.ac.uk/foldoc/>)
Lectric Law Library’s Lexicon <http:// years after founding the Polaroid 23 Sample images of Memory Cards may
www.lectlaw.com/def2/o002.htm> Corporation.” (Polaroid, and Polaroid be found at the following websites/
8 See the case of Miller vs. California, Camera. Wikipedia, the free webpages: (1) Secure Digital Card, at
decided by the Supreme Court of the encyclopedia. Retrieved 10 February Wikipedia, the free encyclopedia.
United States (413 U.S. 15). See FindLaw 2005 from Wikipedia. <http:// Retrieved 10 February 2005 from
for Legal Professionals - Case Law, en.wikipedia.org/wiki/Polaroid> and Wikipedia. <http://en.wikipedia.org/
Federal and State Resources, Forms, and <http://en.wikipedia.org/wiki/ wiki/Secure_Digital_Card>; (2)
Code. <http://caselaw.lp.findlaw.com/ Polaroid_camera>,respectively) Memory stick, at Wikipedia, the free
scripts/getcase.pl?court=us&vol=413& 18 Super 8mm film is “a motion picture encyclopedia. Retrieved 10 February
invol=15> film format that was developed in the 2005 from Wikipedia. <http://
9 See the case of Pita vs. Court of Appeals, 1960s and released on the market in en.wikipedia.org/wiki/Memory_stick>;
decided by the Philippine Supreme 1965 by Eastman Kodak as an Multi Media Card, at Wikipedia, the free
Court (GR 80806, 5 October 1989.) See improvement of the older 8mm home encyclopedia. Retrieved 10 February
the Philippine Laws and Jurisprudence movie format.” (Super 8mm film. 2005 from Wikipedia. <http://
Databank - The Lawphil Project <http:/ Wikipedia, the free encyclopedia. en.wikipedia.org/wiki/
/www.lawphil.net/judjuris/juri1989/ Retrieved 10 February 2005 from Multi_Media_Card>; Flash Memory
oct1989/gr_80806_1989.html> Wikipedia. < http://en.wikipedia.org/ Card - CompactFlash. Retrived 10
10 Anderson, Kerby. The Pornographic wiki/Super_8mm_film>) Super 8 February 2005 from Lexar Media Inc.
Plague. Probe Ministries. Supra, see quickly became the accepted amateur h t t p : / / w w w. l e x a r. c o m / d i g f i l m /
note 4. and home movie standard and would compact_flash.html>; Keydrive, at
11 Legal Definition of Obscene, Obscenity. remain so until the advent of the home Wikipedia, the free encyclopedia.
Supra, see note 7. video camera.” (Retrieved 10 February Retrieved 10 February 2005 from
12 Pornography. Britannica Concise 2005 from Joey Brunton’s website. Super Wikipedia. <http://en.wikipedia.org/
Encyclopedia. Retrieved January 27, 8 – History. < http:// wiki/ http://en.wikipedia.org/wiki/
2005 from Encyclopædia Britannica members.tripod.com/~bruntonj/ Keydrive>; XD-Picture Card, at
Premium Service. <http:// history.html>) Wikipedia, the free encyclopedia.
w w w. b r i t a n n i c a . c o m / e b c / 19 Sony’s “Betamax” is the 12.7 mm (0.5 Retrieved 10 February 2005 from
article?tocId=9375674>. inch) home videocassette tape recording Wikipedia. <http://en.wikipedia.org/
13 Section 3(c), RA 9208. Supra, see note format derived from the earlier, wiki/XD-Picture_Card>; SmartMedia,
3. professional 19.1 mm (0.75 inch) U-matic at Wikipedia, the free encyclopedia.
14 Samples of Japanese and Indian erotic video cassette format. (Betamax. Retrieved 10 February 2005 from
art may be found in the following Wikipedia, the free encyclopedia. Wikipedia. < http://en.wikipedia.org/
websites: Kama Sutra. Rotten dot com: Retrieved 10 February 2005 from wiki/SmartMedia>. A note of memory
An archive of disturbing illustration. Wikipedia. <http://en.wikipedia.org/ cards, as a subset of data storage
<http://www.rotten.com/library/sex/ wiki/Betamax>) devices, was necessary as memory sticks
kama-sutra/>, Semans, Anne. Your 20 The Video Home System, better known were used in the physical transport of
Guide to Sexuality. Sexuality: The Kama by its acronym VHS, is a recording and child pornography in the Datan case in
Sutra; A Peek Inside the Classic Pillow playing standard for video cassette November 2004; an overview of what
Book. About Inc. <http:// recorders (VCRs), developed by JVC and transpired is available in the next chapter
s e x u a l i t y. a b o u t . c o m / c s / launched in 1976. VHS officially stands “Philippine Experience” under the
sexualtechnique/a/kamasutra.htm>, for Video Home System, but it initially heading “Child Pornography.”

51
24 Disk storage is “a group of data storage plastic disc with digital information DVD+RW discs are playable in 87%-
mechanisms for computers; data is encoded on it in a spiral from the center 95%, and 3/4 of today’s DVD players,
transferred to planar surfaces or disks to the limit, the outside edge.” A CD-R respectively. Hybrid drives that can
for temporary or permanent storage.” (Compact Disc-Recordable) is “a thin handle both formats, often labeled
(Disk storage. Wikipedia, the free (1.2 mm) disc made of polycarbonate DVD±R are very popular since there is
encyclopedia. Retrieved 10 February with a 120 mm or 80 mm diameter that no universal standard yet for recordable
2005 from Wikipedia. <http:// is mainly used to store music or data. DVDs. All DVD discs are composed of
en.wikipedia.org/wiki/Disk_storage>) Unlike conventional CD media, a CD-R two 0.6 mm thick polycarbonate discs,
25 Bubble memory is “a type of computer has a core of dye instead of metal.” bonded with an adhesive to each other.
memory that uses a thin film of a Compact Disc Rewritable, or CD-RW, is One contains the guiding groove and is
magnetic material to hold small “a rewritable version of CD-ROM. coated with the recording dye and
magnetized areas, known as bubbles, Whereas standard prerecorded compact aluminum reflector. The other one (for
which each store one bit of data. Bubble discs have their information permanently single-sided discs) is an ungrooved,
memory was a very promising technology stamped into an aluminium reflecting uncoated “dummy ” disc to assure
in the 1970s, but flopped commercially layer, CD-RW discs have a phase- mechanical stability of the sandwich
when hard disks came to proliferate in change recording layer and an structure, and compatibility with the
the 80s.” (Magnetic Bubble Memory. additional aluminium reflecting layer.” compact disc standard geometry which
Wikipedia, the free encyclopedia. (CD -ROM, CD -R, and CD-RW. requires a total disc thickness of about
Retrieved 10 February 2005 from Wikipedia, the free encyclopedia. 1.2 mm. Double-sided discs have two
Wikipedia. <http://en.wikipedia.org/ Retrieved 10 February 2005 from grooved, recordable disc sides, and
wiki/Magnetic_bubble_memory>) Wikipedia. <http://en.wikipedia.org/ require the user to flip the disc to access
26 An EEPROM (E²PROM or Electrically- wiki/CD-ROM, http://en.wikipedia.org/ the other side (unless a dual-pickup
Erasable Programmable Read-Only wiki/CD-R, and http://en.wikipedia.org/ drive is used). (DVD, DVD-R, DVD-RW,
Memory), is “a non-volatile storage chip wiki/CD-RW, respectively.) DVD+R, DVD+RW. Wikipedia, the free
used in computers and other devices. 30 DVD is “an optical disc storage media encyclopedia. Retrieved 10 February
Unlike an EPROM, an EEPROM can be format that is used for playback of movies 2005 from Wikipedia. <http://
programmed and erased multiple times with high video and sound quality and en.wikipedia.org/wiki/DVD, http://
electrically. It may be erased and for storing data. DVDs are similar in en.wikipedia.org/wiki/DVD-R, http://
reprogrammed only a certain number appearance to compact discs. The DVD en.wikipedia.org/wiki/DVD-RW, http:/
of times, ranging from 100,000 to format was a result of the unity of two /en.wikipedia.org/wiki/DVD_plus_R,
1,000,000, but it can be read an high density optical storage standards and http://en.wikipedia.org/wiki/
unlimited number of times. Flash in development; one was the DVD_plus_RW, respectively.)
memory is a later form of EEPROM.” Multimedia Compact Disc (MMCD),
(EEPROM. Wikipedia, the free backed by Philips and Sony, and the DVD-RAM (Digital Versatile Disc –-
encyclopedia. Retrieved 10 February other was the Super Disc (SD), supported Random Access Memory) is “a disc
2005 from Wikipedia. <http:// by Toshiba, Time-Warner, Matsushita specification presented in 1996 by the
en.wikipedia.org/wiki/EEPROM>) Electric, Hitachi, Mitsubishi Electric, DVD Forum, which specifies rewritable
27 Memory cards are “solid-state electronic Pioneer, Thomson and JVC. The official DVD-RAM media and the appropriate
flash memory data storage devices used DVD specification was initially released DVD writers. DVD-RAM media are used
with digital cameras, handheld and in September 1996 and is maintained in computers as well as camcorders and
laptop computers, phones, music players, by the DVD Forum, formerly the DVD personal video recorders since 1998.
video game consoles and other Consortium. ‘DVD’ was originally an Compared with other DVDs, DVD-RAM
electronics. They offer re-recordability, initialism for ‘digital video disc’; some is much more similar to a harddisk, as it
power-free storage, small form factor members of the DVD Forum believe that has concentric tracks instead of one long
and rugged environmental it should stand for ‘digital versatile disc’, spiral track. Unlike the competing
specifications.” (Memory Card. to indicate its potential for non-video formats DVD+R, DVD-R, DVD+RW and
Wikipedia, the free encyclopedia. applications.” A DVD-R (properly DVD-RW, you do not need special DVD
Retrieved 10 February 2005 from pronounced as DVD R or DVD Dash R, burning software to write or read DVD-
Wikipedia. <http://en.wikipedia.org/ not DVD Minus R) is “an optical disc with RAMs on a computer. DVD-RAMs can be
wiki/Memory_card>) a larger storage capacity than a CD-R, accessed like a usual floppy disk or hard
28 An optical disc, in computing, sound typically 4.7 GB (4.4 GiB) instead of 700 drive.” (DVD-RAM. Wikipedia, the free
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

reproduction, and video, “is a flat, MB, although the original capacity of encyclopedia. Retrieved 10 February
circular, usually polycarbonate disc the standard was 3.95 GB. A DVD-R can 2005 from Wikipedia. < http://
whereon data is stored. This data is be written to only once, whereas a DVD- en.wikipedia.org/wiki/DVD-RAM>)
generally accessed when a special RW is rewritable.” The DVD-R and the
material on the disc (often aluminum) is DVD-RW formats wer developed by 31 Blu-ray Disc is “a next-generation optical
illuminated with a laser diode. The Pioneer in autumn of 1997 and disc format jointly developed by a group
information on an optical disc is stored November 1999, respectively . DVD-R of leading consumer electronics and PC
sequentially on a continuous spiral track and DVD-RW are supported by over 90% companies called the Blu-ray Disc
from the innermost track and and 75% of today ’s DVD players, Association (BDA), which succeeds the
outwardmost track.” (Optical Disc. respectively, and both are approved by Blu-ray Disc Founders (BDF). Because it
Wikipedia, the free encyclopedia. the DVD Forum. A competing format is uses blue lasers, which have shorter
Retrieved 10 February 2005 from DVD+R (also DVD+RW for the wavelengths than traditional red lasers,
Wikipedia. <http://en.wikipedia.org/ rewritables). The DVD+R and the it can store substantially more data in
wiki/Optical_disc>) DVD+RW formats were developed by a the same amount of physical space as
29 The CD-ROM (“Compact Disc Read- coalition of corporations, known as the previous technologies such as DVD and
Only Memory” (ROM)) is “a non-volatile DVD+RW Alliance (which include CD. One single-layer Blu-ray Disc can
optical data storage medium using the Philips), in mid 2002 and late 1997, hold about 25GB or almost four hours of
same physical format as audio compact respectively. Although both DVD+R and HDTV audio and video, and the dual-
discs, readable by a computer with a DVD+RW have not yet been approved layer disc can hold approximately 50GB.
CD-ROM drive. A CD-ROM is a flat, by the DVD Forum, DVD+R and The data transfer rate is 36Mbps, but 2x

52
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
speed prototypes with a 72Mbps transfer medium where the two beams intersect. Toshiba’s earlier Multi Media Cards
rate are now in development.” (Blu-ray This intersection causes a stable physical (MMC). Measuring 32mm by 24mm by
disc. Wikipedia, the free encyclopedia. or chemical change which is stored in 2.1mm, SD is slightly thicker, and
Retrieved 10 February 2005 from the medium. This is the write sequence. includes features that allow the secure
Wikipedia. < http://en.wikipedia.org/ During reading, the action of the exchange of data, enabling usage
wiki/Blu-ray_disk>) reference beam and the stored restrictions such as copyright protection.
32 A MiniDisc (MD) is a “disc-based data interference pattern in the medium As of October 2004, SD is the most
storage device for storing any kind of recreates this data beam which may be popular flash memory format, having
data, usually audio. The technology was sensed by a detector array. The medium overtaken the older and larger Compact
introduced in 1992. Along with Philips’ may be a rotating disk containing a Flash. PDA devices such as Pocket PCs
Digital Compact Cassette (DCC) system, polymeric material, or an optically and Palm-powered devices frequently
MiniDisc was targeted as a replacement sensitive single crystal. Since it involves feature SD slots. PalmOne, HP, Dell,
for analog cassette tapes as the no moving parts, holographic data Toshiba, and other PDA manufacturers
recording system for Hi-Fi equipment. storage will be far more reliable than have made SD a standard on all of their
What became a very brief format war existing hard disk technologies. IBM has PDAs. SD is fairly well supported in the
ended when DCC was phased out in already demonstrated the possibility of digital camera industry as well, used in
1996. MD Data, a version for storing holding 1GB of data in a crystal the size all Kodak cameras. A smaller version of
computer data was announced by Sony of a sugar cube and of data access rates the SD card has been developed. The
in 1993, but it never gained significant of one trillion bits per second. miniSD card measures 21.5mm by
ground, so today MDs are used primarily (Holographic Data Storage System 20mm by 1.4mm and is backward-
for audio storage.” (Minidisc. Wikipedia, (HDSS). Wikipedia, the free compatible with the SD card via an
the free encyclopedia. Retrieved 10 encyclopedia. Retrieved 10 February adapter. Currently available capacities
February 2005 from Wikipedia. <http:/ 2005 from Wikipedia. <http:// (as of December 2004) range up to 512
/en.wikipedia.org/wiki/Minidisc>) en.wikipedia.org/wiki/HDSS>) MB. It can be use with Kodak Easyshare
33 A hard disk (or “hard disc” or “hard 37 CompactFlash (CF) was originally a type and similar SD compatible cameras.”
drive” or “hard disk drive”) is “a of data storage device, used in portable (Secure Digital Card. Wikipedia, the free
computer storage device, that uses rigid electronic devices. As a storage device, encyclopedia. Retrieved 10 February
rotating platters. It stores and retrieves it typically uses flash memory in a 2005 from Wikipedia. <http://
digital data from a planar magnetic standardized enclosure, and was first en.wikipedia.org/wiki/
surface. Information is written to the disk specified and produced by SanDisk Secure_Digital_Card>)
by transmitting an electromagnetic flux Corporation in 1994. CF devices are 40 A Multi Media Card (MMC) is a solid
through an antenna or write head that used in handheld and laptop computers state disk or flash memory data storage
is very close to a magnetic material, (which may or may not take larger form- device. It is based on Toshiba’s NAND-
which in turn changes its polarization factor cards), digital cameras, and a wide based flash memory, and is therefore
due to the flux. The information can be variety of other devices, including much smaller than earlier systems based
read back in a reverse manner, as the desktop computers. As of 2004, on Intel NOR-based memory such as
magnetic fields cause electrical change CompactFlash cards are available in Compact Flash. MMC is about the size
in the coil or read head that passes over capacities from about 8 megabytes to of a postage stamp: 24mm x 32mm x
it.” (Hard Disc. Wikipedia, the free about 8 gigabytes. (CompactFlash. 1.5mm. MMC is a popular storage
encyclopedia. Retrieved 10 February Wikipedia, the free encyclopedia. medium for very small electronic
2005 from Wikipedia. <http:// Retrieved 10 February 2005 from devices, like mobile phones, PDAs and
en.wikipedia.org/wiki/Hard_disk>) Wikipedia. <http://en.wikipedia.org/ digital audio players (MP3 players). It
34 A floppy disk is “a data storage device wiki/CompactFlash>) comes in 16MB, 32MB, 64MB, 128MB,
that comprises a circular piece of thin, 38 Memory Stick is “a format for removable 256MB, 512MB, and 1GB sizes as of
flexible (hence “floppy ”) magnetic flash memory data storage devices, 2004. Most of the Nokia smartphones in
storage medium encased in a square or created by Sony in October 1998 as an 2004 use a smaller version of MMC cards
rectangular plastic wallet. Floppy disks alternative to CompactFlash, Secure called Reduced Size MMC, or RS-MMC.
are read and written by a floppy disk Digital, Multi Media Card, and They are half the height of a normal
drive or FDD.” (Floppy disc. Wikipedia, SmartMedia for use in their own devices. MMC card: 24mm x 16mm x 1.5mm.”
the free encyclopedia. Retrieved 10 While Sony uses the format almost (Multi Media Card. Wikipedia, the free
February 2005 from Wikipedia. <http:/ exclusively, it has not proved popular encyclopedia. Retrieved 10 February
/en.wikipedia.org/wiki/Floppy_disk>) with other manufacturers. Poor sales and 2005 from Wikipedia. <http://
35 The Zip drive is “a removable disk adoption have forced Sony to license en.wikipedia.org/wiki/
storage system, introduced by the the technology to other makers, leading Multi_Media_Card>)
Iomega company in late 1994.” In the to a small drop in prices. The original 41 SmartMedia is “a trademark of Toshiba
Zip system, “a set of read/write heads Memory Stick interface could only Corp. for flash memory. SmartMedia
mounted on a linear actuator flies over address 128 MB of memory physically cards provide mobile data storage in a
a rapidly spinning floppy disk mounted due to design flaws. This led to the small interchangeable format.
in a sturdy cartridge, and a simplified introduction of Memory Stick PRO Originally named Solid State Floppy
drive design that reduced its overall cost. variant with faster transfer speeds and a Disk Card (SSFDC), a SmartMedia card
This resulted in a disk that has all of the capacity of 256 MB and higher. Sony is consists of a single NAND flash EEPROM
3.5” floppy’s convenience, but holds slowly phasing out the old purple and chip embedded in a thin plastic card. It
much more data, with performance that white Memory Sticks, replacing them can be used for storage in many digital
is much quicker than a standard floppy with comparable technology based on systems including PDAs, Olympus digital
drive.” (Zip drive. Wikipedia, the free the MS PRO specs.” (Memory stick. cameras, pagers and MP3 digital music
encyclopedia. Retrieved 10 February Wikipedia, the free encyclopedia. players. SmartMedia cards are limited
2005 from Wikipedia. < http:// Retrieved 10 February 2005 from to 128MB. The format has been
en.wikipedia.org/wiki/Zip_drive>) Wikipedia. <http://en.wikipedia.org/ superseded by the smaller and higher
36 Holographic storage uses two laser wiki/Memory_stick>) capacity XD-Picture Card format.
beams, a reference and a data beam to 39 Secure Digital (or SD), is “a flash Nevertheless, major manufacturers
create an interference pattern at a memory data storage device based on continue to produce SmartMedia cards

53
as of 2004 due to the large number of “the logical evolution of the Short Zen), and IRiver. (Digital Audio Player.
users.” (SmartMedia. Wikipedia, the Message Service (SMS), a text-only Wikipedia, the free encyclopedia.
free encyclopedia. Retrieved 10 messaging system for mobile networks. Retrieved 10 February 2005 from
February 2005 from Wikipedia. <http:/ MMS-enabled mobile phones enable Wikipedia. <http://en.wikipedia.org/
/en.wikipedia.org/wiki/SmartMedia>) subscribers to compose and send wiki/Digital_audio_player>)
42 xD-Picture Card is “a format of flash messages with one or more multimedia 48 The personal video recorder (PVR), also
memory data storage device developed (digital photos, audio, video) parts. called digital video recorder (DVR), is a
and introduced to the market in July Mobile phones with built-in or attached consumer electronics device that records
2002 by Olympus and Fujifilm, and cameras, or with built-in MP3 players television shows to a hard disk in digital
manufactured by the Toshiba are very likely to also have an MMS format. Many models are now also
Corporation. xD cards are designed for messaging client — a software program offering the facility to record onto DVDs.”
the digital photography market, and are that interacts with the mobile subscriber This makes the “time shifting” feature
an alternative to and competitor of to compose, address, send, receive, and much more convenient, and also allows
formats such as Compact Flash (CF), view MMS messages.” (Multimedia for “trick modes” such as pausing live
Sony Memory Sticks, and microdrives. Messaging System. Wikipedia, the free TV, instant replay of interesting scenes,
xD-Picture Cards are available in a encyclopedia. Retrieved 10 February and skipping advertising. Most PVR
range of sizes, from 16 MB to 512 MB. 2005 from Wikipedia. <http:// recorders use the MPEG format for
Fujifilm’s marketing department note en.wikipedia.org/wiki/ encoding analog video signals. The most
that the name “xD-Picture Card” was Multimedia_Messaging_System>) popular PVRs on the market are the TiVo
inspired by the phrase “eXtreme 46 Certain MMS-enabled mobile phones and DNNA’s ReplayTV, although most
Digital”. (XD-Picture Card. Wikipedia, have palmtop capabilities – the so-called home electronics manufacturers – such
the free encyclopedia. Retrieved 10 converged mobile devices – such as as Panasonic, Philips, Pioneer, and
February 2005 from Wikipedia. <http:/ Sony Ericsson’s P910 series, P802, and Samsung – now offer models. Many
/en.wikipedia.org/wiki/XD- R380 series phone models, among satellite and cable companies are
Picture_Card>) others; and Nokia’s 9500 incorporating PVR functions into their
43 A keydrive is “a small removable data Communicator, 9300, and 9210i set-top boxes. (Personal Video Recorder.
storage device that uses flash memory Communicator phone models, among Wikipedia, the free encyclopedia.
and a USB connector. Keydrives are also others. Nokia claims to have adopted Retrieved 10 February 2005 from
known as keychain drive, pen drive, the Series 60 platform, away from the Wikipedia. <http://en.wikipedia.org/
pocket drive, thumb drive, jump drive, conventional palmtop technology. Nokia wiki/Personal_video_recorder>) TiVo
USB flash drive, USB flash memory claims that Series 60 is a feature rich and DNNA’s ReplayTV websites are
drive, USB key, USB memory key, USB software platform for smartphones with available as http://www.tivo.com and
stick, Piripicho (primarily in Spanish), and advanced data capabilities, inasmuch http://www.replaytv.com, respectively.
Kikinou (primarily in French) Keydrives as the platform has a ready-made user 49 Bayonet Neill-Concelman is “a type of
are typically small, lightweight devices, interface that can be adapted to suit RF connector used for terminating
around 50 mm long and weighing only different needs, and a rich set of coaxial cable. The BNC connector is one
around 100 grams. A keydrive consists applications, and a common user of a larger class of “bayonet connectors”,
of a small printed circuit board encased interface components and development named after the resemblance to the
with a robust plastic casing, making the tools for implementing new applications. standard twist-on attachment for a
drive sturdy enough to be carried around Nokia implemented Series 60 in its 7710, bayonet. It was commonly used on
in a pocket, as a keyfob, or on a lanyard 6681, 6680, 6670, and 6630 Smartphone 10base2 thin Ethernet networks, both
around the owner’s neck. Only the USB models, among others, and licensed it on cable interconnections and network
connector protrudes from this plastic to other phone manufacturers such as cards.” (BNC Connector. Wikipedia, the
protection, and this is often covered by LG Electronics, Lenovo, Panasonic, free encyclopedia. Retrieved 10
a removable plastic cap. Keydrives are Samsung, Sendo and Siemens. Sony February 2005 from Wikipedia. <http:/
active only when powered by a Ericcson’s and Nokia’s websites are /en.wikipedia.org/wiki/
connection to a computer, and require available as http://www. BNC_connector>)
no external power source or battery sonyericsson.com, and http:// 50 A local area network is “a computer
power when not in use.” (Keydrive. www.nokia.com, respectively. network that spans a relatively small
Wikipedia, the free encyclopedia. 47 A digital audio player (DAP) is “a device area. Most LANs are confined to a single
Retrieved 10 February 2005 from that stores, organizes and plays digital building or group of buildings. Most
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

Wikipedia. <http://en.wikipedia.org/ music files. It is more commonly referred LANs connect workstations and personal
wiki/ http://en.wikipedia.org/wiki/ to as an MP3 player (because of that computers. Each node (individual
Keydrive>) format’s ubiquity), but DAPs often play computer ) in a LAN has its own CPU
44 Personal digital assistants (PDAs or many additional file formats. Some with which it executes programs, but it
palmtops) are “handheld devices that formats are proprietary, such as MP3, also is able to access data and devices
were originally designed as personal Windows Media Audio (WMA), and anywhere on the LAN. This means that
organizers, but became much more Advanced Audio Codec (AAC). Some of many users can share expensive devices,
versatile over the years. A basic PDA these formats also may incorporate such as laser printers, as well as data.
usually includes a clock, date book, digital rights management (DRM), such There are many different types of LANs
address book, task list, memo pad and a as WMA DRM, which are often part of Ethernets being the most common for
simple calculator. One major advantage paid download sites. Other formats are PCs. Most Apple Macintosh networks are
of using PDAs is their ability to patent-free or otherwise open, such as based on Apple’s AppleTalk network
synchronize data with desktop, notebook Vorbis, FLAC, and Speex (all part of the system, which is built into Macintosh
and desknote computers.” (Personal Ogg open multimedia project).” One computers.” (What is local-area
Digital Assistant. Wikipedia, the free of the most popular models was Diamond network? - A Word Definition From the
encyclopedia. Retrieved 16 February Multimedia’s PMP300 introduced in Webopedia Computer Dictionary. A
2005 from Wikipedia. <http:// 1998, which popularized DAPs. The word definition from the Webopedia
en.wikipedia.org/wiki/ current market leader is Apple’s iPod. Computer Dictionary. Retrieved 10
Personal_digital_assistant>) Other models include those of Dell February 2005. http://
45 Multimedia Messaging System (MMS) is (Digital Jukebox), Creative (Nomad/ w w w. w e b o p e d i a . c o m / T E R M / l /

54
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
local_area_network_LAN.html. for SCSI and some others. USB can 57 HTTP (for HyperText Transfer Protocol)
www.webopedia.com. Copyright, 2004 connect peripherals such as mice, is “the primary method used to convey
Jupitermedia. All rights reserved.) keyboards, scanners, digital cameras, information on the World Wide Web.
51 In general, a hub is a centre point; and printers, hard disks, and networking The original purpose was to provide a
specifically in computing, a hub is “a components. For multimedia devices way to publish and receive HTML pages.
computer networking device that such as scanners and digital cameras, Development of HTTP was co-ordinated
connects multiple Ethernet segments USB has become the standard by the World Wide Web Consortium and
together making them act as a single connection method. For printers, USB working groups of the Internet
segment. When using a hub, every has also grown in popularity and started Engineering Task Force, culminating in
attached device shares the same displacing parallel ports because USB the publication of a series of RFCs, most
broadcast domain and the same makes it simple to add more than one notably RFC 2616, which defines HTTP/
collision domain. Therefore, only one printer to a computer. As of 2004 there 1.1, the version of HTTP in common use
computer connected to the hub is able were about 1 billion USB devices in the today. HTTP differs from other TCP-based
to transmit at a time. Depending on the world. (Universal serial bus. Wikipedia, protocols, in that connections are usually
network topology, the hub provides a the free encyclopedia. Retrieved 11 terminated once a particular request (or
basic level 1 OSI model connection February 2005 from Wikipedia. <http:/ related series of requests) has been
among the network objects /en.wikipedia.org/wiki/ completed. This design makes HTTP
(workstations, servers, etc). It provides Universal_serial_bus>) ideal for the World Wide Web, where
bandwidth which is shared among all 54 A system of LANs connected in such a pages regularly link to pages on other
the objects, compared to switches, which manner is called a wide-area network servers.” (HTTP. Wikipedia, the free
provide a dedicated connection between (WAN). (What is local-area network? - encyclopedia. Retrieved 10 February
individual nodes.” (Hub. Wikipedia, the A Word Definition From the Webopedia 2005 from Wikipedia. <http://
free encyclopedia. Retrieved 11 Computer Dictionary. A word definition en.wikipedia.org/wiki/HTTP>)
February 2005 from Wikipedia. <http:/ from the Webopedia Computer 58 The World Wide Web (“WWW”, or
/en.wikipedia.org/wiki/Hub>) Dictionary. Retrieved 10 February 2005. simply “Web”) is “an information space
52 A router is “a computer networking http://www.webopedia.com/TERM/l/ in which the items of interest, referred
device that forwards data packets toward local_area_network_LAN.html. to as resources, are identified by global
their destinations through a process www.webopedia.com. Copyright, 2004 identifiers called Uniform Resource
known as routing. Routing occurs at layer Jupitermedia. All rights reserved.) Identifiers (URI, the superset of the more
3 of the OSI seven-layer model. Routing 55 An intranet is “a local area network commonly-known Uniform Resource
is most commonly associated with the (LAN) used internally in an organization Locator [URL] used for website
Internet Protocol, although other less- that is sometimes access restricted. addressing).” The Web is made up of
popular routed protocols remain in use. Sometimes the term refers only to the three standards: The Uniform Resource
In recent times many routing functions most visible service, the internal web Locator (URL), which specifies how each
have been added to LAN switches, site. The same concepts and page of information is given a unique
creating “Layer 2/3 Switches” which technologies of the Internet such as “address” at which it can be found;
route traffic at near wire speed. Routers clients and servers running on the Hyper Text Transfer Protocol (HTTP),
are also now being implemented as Internet protocol suite are used to build which specifies how the browser and
Internet gateways, primarily for small an intranet. HTTP and other internet server send the information to each
networks like those used in homes and protocols are commonly used as well, other, and Hyper Text Markup Language
small offices. This application is mainly especially FTP and email. There is often (HTML), a method of encoding the
where the Internet connection is an an attempt to use internet technologies information so it can be displayed on a
always-on broadband connection like to provide new interfaces with corporate variety of devices. (World Wide Web.
cable modem or DSL. These are not ‘legacy’ data and information systems. Wikipedia, the free encyclopedia.
“routers” in the true sense, but the There does not necessarily have to be Retrieved 10 February 2005 from
terminology has been confused with any access from the organisations’s Wikipedia. <http://en.wikipedia.org/
network address translation.” (Router. internal network to the internet itself. wiki/World_wide_web>)
Wikipedia, the free encyclopedia. Where there is, there will be a firewall 59 Post Office Protocol version 3 (POP3) is
Retrieved 11 February 2005 from with a gateway through which all access an application layer Internet standard
Wikipedia. <http://en.wikipedia.org/ takes place. (Intranet. Wikipedia, the free protocol used to retrieve email from a
wiki/Router>) encyclopedia. Retrieved 11 February remote server to a local client over a
53 Universal Serial Bus (USB) provides a 2005 from Wikipedia. <http:// TCP/IP connection. Nearly all individual
serial bus standard for connecting en.wikipedia.org/wiki/ Internet service provider email accounts
devices, usually to a computer, but it Internet_Relay_Chat>) are accessed via POP3. POP3 and its
also is in use on other devices such as 56 A bulletin board system (BBS) is a predecessors are designed to allow end
set-top boxes, game consoles and PDAs. “computer system running software that users with intermittent connections such
A USB system has an asymmetric design, allows users to dial into the system over as dial-up connections to retrieve email
consisting of a host controller and a phone line and, using a terminal when connected, and then to view and
multiple devices connected in a tree- program, perform functions such as manipulate the retrieved messages
like fashion using special hub devices. downloading software and data, without needing to stay connected.
There is a limit of 5 levels of branching uploading data, reading news, and Although most clients have an option to
hubs per controller. Up to 127 devices exchanging messages with other users.” leave mail on server, email clients using
may be connected to a single host It was the precursor to the modern form POP3 generally connect, retrieve all
controller, but the count must include of the World Wide Web (WWW) and other messages, store them on the user’s PC
the hub devices as well. A modern aspects of the Internet, and was popular as new messages, delete them from the
computer likely has several host from the late 1970s to the late 1990s. server, and then disconnect. In contrast,
controllers so the total useful number of (Bulletin Board System. Wikipedia, the the newer, more capable IMAP email
connected devices is beyond what could free encyclopedia. Retrieved 10 retrieval protocol supports both
reasonably be connected to a single February 2005 from Wikipedia. < http:/ connected and disconnected modes of
computer. There is no need for a /en.wikipedia.org/wiki/ operation. Email clients using IMAP
terminator on any USB bus, as there is Bulletin_board_system>) generally leave messages on the server

55
until the user explicitly deletes them. messages (“articles”) to a number of service. Instant messaging differs from
(Post Office Protocol. Wikipedia, the free distributed newsgroups, categories that e-mail in that conversations happen in
encyclopedia. Retrieved 10 February resemble bulletin board systems in most realtime. Also, most services convey an
2005 from Wikipedia. <http:// respects. Newsgroups are often “online status” between users, such as if
en.wikipedia.org/wiki/ arranged into hierarchies, theoretically a contact is actively using the computer.
Post_Office_Protocol>) making it simpler to find related groups. Generally, both parties in the
60 The Internet Message Access Protocol The term top-level hierarchy refers to conversation see each line of text right
(commonly known as IMAP, and the hierarchy defined by the prefix prior after it is typed (line-by-line), thus making
previously called Interactive Mail Access to the first dot. The most commonly it more like a telephone conversation
Protocol) is an application layer Internet known hierachies are the usenet than exchanging letters. Instant
protocol used for accessing email on a hierarchies. So for instance newsgroup messaging applications may also include
remote server from a local client. IMAP rec.arts.sf.starwars.games would be in the ability to post an away message, the
and POP3 (Post Office Protocol version the rec.* top-level usenet hierarchy, equivalent of the message on a telephone
3) are the two most prevalent Internet where the asterisk (*) is defined as a answering machine. Popular instant
standard protocols for email retrieval. wildcard character. There were seven messaging services on the public
Both are supported by virtually all original major hierarchies of usenet Internet include Jabber, AOL Instant
modern email clients and servers, newsgroups, known as the “Big 7”: (1) Messenger, Yahoo! Messenger, .NET
although in some cases in addition to comp.*—Discussion of computer-related Messenger Service and ICQ. These
vendor-specific, typically proprietary, topics, (2) news.*—Discussion of Usenet services owe many ideas to an older
interfaces. (Internet Message Access itself, (3) sci.*—Discussion of scientific (and still popular) online chat medium
Protocol. Wikipedia, the free subjects, (4) rec.*—Discussion of known as Internet Relay Chat (IRC).”
encyclopedia. Retrieved 10 February recreational activities (e.g. games and (Instant messenger. Wikipedia, the free
2005 from Wikipedia. <http:// hobbies), (5) soc.*—Socialising and encyclopedia. Retrieved 10 February
en.wikipedia.org/wiki/ discussion of social issues, (6) talk.*— 2005 from Wikipedia. <http://
Internet_Message_Access_Protocol>) Discussion of contentious issues such as en.wikipedia.org/wiki/
61 Simple Mail Transfer Protocol (SMTP) is religion and politics, and (7)misc.*— Instant_messenger>)
the de facto standard for email Miscellaneous discussion—anything 66 A peer-to-peer (or P2P) computer
transmission across the Internet. SMTP which doesn’t fit in the other hierarchies. network is “any network that does not
is a relatively simple, text-based (Usenet, and Newsgroups. Wikipedia, rely on dedicated servers for
protocol, where one or more recipients the free encyclopedia. Retrieved 10 communication but instead mostly uses
of a message are specified (and in most February 2005 from Wikipedia. <http:/ direct connections between clients
cases verified to exist) and then the /en.wikipedia.org/wiki/Usenet> and < (peers). A pure peer-to-peer network
message text is transferred. Since this http://en.wikipedia.org/wiki/ does not have the notion of clients or
protocol started out as purely ASCII text- Newsgroup>, respectively.) servers, but only equal peer nodes that
based, it did not deal well with binary 64 Internet Relay Chat (IRC) is a form of simultaneously function as both “clients”
files. Standards such as MIME were instant communication over the Internet. and “servers” to the other nodes on the
developed to encode binary files for It is mainly designed for group (one-to- network. This model of network
transfer through SMTP. Today, most many) communication in discussion arrangement differs from the client-
SMTP servers support the 8BITMIME forums called channels, but also allows server model where communication is
extension, permitting binary files to be one-to-one communication. IRC is an usually relayed by the server.”
transmitted almost as easily as plain text. open protocol that uses TCP and
(Simple Mail Transfer Protocol. optionally SSL. An IRC server can File sharing networks such as FastTrack,
Wikipedia, the free encyclopedia. connect to other IRC servers to expand FreeNet, GNUtella, and OpenNap are
Retrieved 10 February 2005 from the IRC network. Users access IRC examples of peer-to-peer networks.
Wikipedia. <http://en.wikipedia.org/ networks by connecting a client to a Other examples are those of Applejuice
wiki/Simple_Mail_Transfer_Protocol>) server. There are many client and server (which includes Applejuice Client),
62 The File Transfer Protocol (FTP) is “a implementations. Most IRC servers do BitTorrent (which includes ABC, Azureus,
software standard for transferring not require users to log in, but a user BitAnarch, BitComet, BitSpirit,
computer files between machines with will have to set a nickname before being BitTornado, BitTorrent, BitTorrent++,
widely different operating systems. It connected. IRC is a plaintext protocol, BitTorrent.Net, G3 Torrent, mlMac,
belongs to the application layer of the which means that it is fully possible MLDonkey, QTorrent, SimpleBT,
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

Internet protocol suite. FTP is an 8-bit (though quite inconvenient) to use IRC Shareaza, TomatoTorrent, and
client-server protocol, capable of via a basic byte-stream client such as TorrentStorm), CAKE (which includes
handling any type of file without further netcat or telnet. However, the protocol BirthdayCAKE), Direct Connect (which
processing, such as MIME or Uuencode. only uses a slightly modified version of includes BCDC++, CZDC++, DC++,
However, FTP has extremely high ASCII, and does not originally provide NeoModus Direct Connect, and
latency; that is, the time between any support for non-ASCII characters in JavaDC), eDonkey (which includes
beginning the request and starting to text, with the result that many different, aMule, eMule, LMule, MindGem,
receive the required data can be quite incompatible character encodings (such MLDonkey, mlMac, Shareaza, and
long, and a sometimes-lengthy login as ISO 8859-1 and UTF-8) are used. xMule), ed2k or eDonkey 2000 (which
procedure is required.” (File Transfer (Internet Relay Chat. Wikipedia, the free includes eDonkey, and eMule), FastTrack
Protocol. Wikipedia, the free encyclopedia. Retrieved 10 February (which includes giFT, Grokster, iMesh,
encyclopedia. Retrieved 10 February 2005 from Wikipedia. <http:// Kazaa, Kazaa Lite, K++, Diet Kaza,
2005 from Wikipedia. <http:// en.wikipedia.org/wiki/ CleanKazaa, Mammoth, MLDonkey,
en.wikipedia.org/wiki/ Internet_Relay_Chat>) mlMac, and Poisoned), Freenet (which
File_transfer_protocol>) 65 An instant messenger is “a computer includes Entropy, Freenet, and Frost),
63 Usenet is “a distributed Internet application which allows instant text Gnutella (which includes Acquisitionx,
discussion system that evolved from a communication between two or more BearShare, Gnucleus, Grokster, gtk-
general purpose UUCP (Unix to Unix people through a network such as the gnutella, Limewire, MLDonkey, mlMac,
Copy Protocol) network of the same Internet. An instant messenger is a client Morpheus, Phex, Poisoned, Swapper,
name. Users read and post e-mail-like which hooks up to an instant messaging Shareaza, and XoloX), Gnutella2 (which

56
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
includes Adagio, Gnucleus, MLDonkey, 802.11. Wikipedia, the free signaling for the physical layer, and
mlMac, Morpheus, and Shareaza), Joltid encyclopedia. Retrieved 10 February frame formats and protocols for the
PeerEnabler (which includes Altnet, 2005 from Wikipedia. <http:// media access control (MAC)/data link
Bullguard, Joltid, Kazaa, and Kazaa Lite), en.wikipedia.org/wiki/IEEE_802.11>) layer of the OSI model. Ethernet is
Kademlia (which includes eMule, 69 HomeRF operates at the 2.4 GHz mostly standardized as IEEE’s 802.3. It
MindGem, MLDonkey, and VarVar), Industrial, Scientific, and Medical (ISM) has become the most widespread LAN
Manolito/MP2P (which includes band. It supports all CLASS features such technology in use during the 1990s to
Blubster, Piolet, and RockItNet), Napster as caller ID, call waiting, call forwarding, the present, and has largely replaced
(which includes Napigator, OpenNap, and distinctive ringing allowing it to all other LAN standards such as token
and WinMX), WPNP (which includes support standard phone features that ring, FDDI, and ARCNET.” (Ethernet.
WinMX), among other networks users are familiar with. HomeRF supports Wikipedia, the free encyclopedia.
(including Akamai, Alpine, Ares Galaxy, up to 8 toll-quality voice connections, 8 Retrieved 11 February 2005 from
Audiogalaxy network, Carracho, Chord, priority-based multimedia streams, and Wikipedia. <http://en.wikipedia.org/
The Circle, Coral, Dexter, Diet-Agents, access to data at a rate of 10 Mb/s in wiki/Ethernet>)
EarthStation 5, Evernet, FileTopia, version 1.0 of the standard and as high 73 Infrared (IR) radiation is
GNUnet, Grapevine, Groove, Hotwire, as 20 Mb/s in version 2.0 of the standard. “electromagnetic radiation of a
iFolder, konspire2b, MUTE, and Transmission range is about 100 meters wavelength longer than visible light, but
OpenFT). (Peer-to-peer. Wikipedia, the but can be extended at the cost of the shorter than microwave radiation.
free encyclopedia. Retrieved 10 data rate. HomeRF also supports low Infrared radiation spans three orders of
February 2005 from Wikipedia. <http:/ power modes and secure magnitude and has wavelengths
/en.wikipedia.org/wiki/Peer-to-peer>) communications using 128 bit encryption between 700 nm and 1 mm.” IR data
against eavesdroppers and denial of transmission is “employed in short-range
67 AirPort is “a wireless networking protocol service attacks. (HomeRF Overview. communication among computer
from Apple Computer designed for both <http://nesl.ee.ucla.edu/courses/ peripherals and personal digital
Macintosh and PC computers. It is based ee206a/2001s/homeworks/ assistants. These devices usually conform
on the IEEE 802.11b (also known as Wi- hw1_submits/vadim/hw1_p2.htm> to standards published by IrDA, the
Fi) standard and has been certified to 70 Bluetooth is “an industrial specification Infrared Data Association. Remote
be compatible with other 802.11b for wireless personal area networks controls and IrDA devices use infrared
devices. According to Apple, AirPort is (PANs) first developed by Ericsson, later light-emitting diodes (LEDs) to emit
capable of speeds up to 11 megabits formalized by the Bluetooth Special infrared radiation which is focused by a
per second and distances of 150 feet Interest Group (SIG), which was plastic lens into a narrow beam. The
from the base station. The current version established by Sony Ericsson, IBM, Intel, beam is modulated, i.e. switched on and
support encryption up to 128 bits. AirPort Toshiba and Nokia, and joined by other off, to encode the data. The receiver
Extreme is the new generation of AirPort, companies.” Bluetooth is “a wireless uses a silicon photodiode to convert the
and is based on the IEEE 802.11g radio standard primarily designed for infrared radiation to an electric current.
specification, and is fully compatible with low power consumption, with a short It responds only to the rapidly pulsing
all 802.11b and 802.11g devices, with range (up to 10 meters and with a low- signal created by the transmitter, and
speeds up to 54 megabits per second.” cost transceiver microchip in each filters out slowly changing infrared
(AirPort. Wikipedia, the free device. It can be used to wirelessly radiation from ambient light.” (Infrared.
encyclopedia. Retrieved 10 February connect peripherals like printers or Wikipedia, the free encyclopedia.
2005 from Wikipedia. < http:// keyboards to computers, or to have Retrieved 11 February 2005 from
en.wikipedia.org/wiki/AirPort>) PDAs communicate with other nearby Wikipedia. <http://en.wikipedia.org/
68 IEEE 802.11 (or Wi-Fi) “denotes a set of PDAs or computers. The standard also wiki/Infrared>)
Wireless LAN standards developed by includes support for more powerful 74 In computing, JPEG is a commonly used
working group 11 of IEEE 802. The term longer-range devices suitable for standard method of compressing
is also used to refer to the original 802.11, constructing a wireless LAN. Every photographic images. The file format
which is now sometimes called Bluetooth device can simultaneously which employs this compression is
‘802.11legacy.’ The 802.11 family maintain up to 7 connections, but only commonly also called JPEG; the most
currently includes six over-the-air one active connection at the time. These common file extensions for this format
modulation techniques that all use the groups (maximum of 8 devices: 1 host are .jpeg, .jfif, .jpg, .JPG, or .JPE
same protocol, the most popular (and and 7 slaves) are called piconets. The although .jpg is the most common on all
prolific) techniques are those defined Bluetooth specification also enables the platforms. The name stands for Joint
by the a, b, and g amendments to the possibility to connect two piconetworks Photographic Experts Group. JPEG itself
original standard; security was originally together, with one master device acting specifies only how an image is
included, and was later enhanced via as a bridge. These devices have yet to transformed into a stream of bytes, but
the 802.11i amendment. Other come, though are supposed to appear not how those bytes are encapsulated in
standards in the family (c–f, h–j, n) are within the next two years. Every device any particular storage medium. A further
service enhancement and extensions, or can be configured to constantly standard, created by the Independent
corrections to previous specifications. announce its presence to nearby devices JPEG Group, called JFIF (JPEG File
802.11b was the first widely accepted in order to establish a connection. It is Interchange Format) specifies how to
wireless networking standard, followed also possible to password protect a produce a file suitable for computer
(somewhat counterintuitively) by connection between two devices so that storage and transmission (such as over
802.11a and 802.11g. 802.11b and no one can listen in.” (Bluetooth. the Internet) from a JPEG stream. In
802.11g standards use the unlicensed Wikipedia, the free encyclopedia. common usage, when one speaks of a
2.4 GHz band. The 802.11a standard Retrieved 11 February 2005 from “JPEG file” one generally means a JFIF
uses the 5 GHz band. Operating in an Wikipedia. <http://en.wikipedia.org/ file, or sometimes an Exif JPEG file.
unregulated frequency band, 802.11b wiki/Bluetooth>) There are, however, other JPEG-based
and 802.11g equipment can incur 71 Ibid. file formats, such as JNG. JPEG/JFIF is
interference from microwave ovens, 72 Ethernet is “a frame-based computer the most common format used for storing
cordless phones, and other appliances networking technology for local area and transmitting photographs on the
using the same 2.4 GHz band.” (IEEE networks (LANs). It defines wiring and World Wide Web. It is not as well suited

57
for line drawings and other textual or after Unisys announced that it would be compression format. (2) MPEG-2:
iconic graphics because its compression enforcing software patents on the LZW Transport, video and audio standards for
method performs badly on these types data compression algorithm used for GIF. broadcast-quality television. Used for
of images (the PNG and GIF formats PNG uses a non-patented lossless data over-the-air digital television ATSC,DVB
are in common use for that purpose; compression method known as deflation. and ISDB, digital satellite TV services
GIF, having only 8 bits per pixel is not This method is combined with prediction, like DirecTV, digital cable television
well suited for colour photographs, but where for each image line, a filter signals, and (with slight modifications)
PNG may have as much or more detail method is chosen that predicts the colour for DVD video discs. (3) MPEG-3:
than JPEG). (JPEG. Wikipedia, the free of each pixel based on the colours of Originally designed for HDTV, but
encyclopedia. Retrieved 12 February previous pixels and subtracts the abandoned when it was discovered that
2005 from Wikipedia. < http:// predicted colour of the pixel from the MPEG-2 was sufficient for HDTV. (4)
en.wikipedia.org/wiki/JPEG>) actual color. An image line filtered in MPEG-4: Expands MPEG-1 to support
75 GIF (Graphics Interchange Format) is this way is often more compressible than video/audio “objects”, 3D content, low
“a bitmap image format that is widely the raw image line would be. On most bitrate encoding and support for Digital
used on the World Wide Web, both for images, PNG can achieve greater Rights Management. A new (newer than
still images and for animations. The compression than GIF, but some MPEG-2 Video) higher efficiency video
format was introduced in 1987 by implementations make poor choices of codec is included (an alternative to
CompuServe in order to provide a color filter methods and therefore produce MPEG-2 Video), see H.264. (5) MPEG-
image format for their file downloading unnecessarily large PNG files. (PNG. 7: A formal system for describing
areas, replacing their earlier RLE format Wikipedia, the free encyclopedia. multimedia content. The MPEG codecs
which was black and white only. GIF Retrieved 12 February 2005 from use lossy data compression using
became popular because it used LZW Wikipedia. <http://en.wikipedia.org/ transform codecs. In lossy transform
data compression, which was more wiki/PNG>) codecs, samples of picture or sound are
efficient than the run-length encoding 78 AVI, an acronym for Audio Video taken, chopped into small segments,
that formats such as PCX and MacPaint Interleave, is “a file format designed to transformed into a frequency space, and
used, and fairly large images could store both audio and video data in a quantized. The resulting quantized
therefore be downloaded in a standard package to allow its values are then entropy coded. The
reasonable amount of time, even with simultaneous playback. It was moving picture coding systems such as
very slow modems.” (GIF. Wikipedia, the introduced by Microsoft in November MPEG-1, MPEG-2, and MPEG-4 add an
free encyclopedia. Retrieved 12 1992, as part of the Video for Windows extra step, where the picture content is
February 2005 from Wikipedia. < http:/ technology. It is a special case of the predicted from past reconstructed
/en.wikipedia.org/wiki/Gif>) Resource Interchange File Format (RIFF), images before coding, and only the
76 .BMP or .DIB (device-independent which divides the file’s data up into data differences from the reconstructed
bitmap) is a bitmapped graphics format blocks called “chunks”. Each “chunk” is pictures, and any extra information
used internally by the Microsoft Windows identified by a FourCC tag. An AVI file needed to perform the prediction, are
graphics subsystem (GDI), and used takes the form of a single chunk in an coded. (MPEG. Wikipedia, the free
commonly as a simple graphics file RIFF formatted file, which is then encyclopedia. Retrieved 12 February
format on that platform. Images are subdivided into two mandatory “chunks” 2005 from Wikipedia. <http://
generally stored with a color depth of 2 and one optional “chunk”. By way of the en.wikipedia.org/wiki/MPEG>)
(1-bit), 16 (4-bit), 256 (8-bit), 65,536 (16- RIFF format, the audio/visual data 80 Windows Media Video (WMV) is a
bit), or 16.7 million (24-bit). An alpha contained in the “movi” chunk can be generic name for the set of streaming
channel (for transparency) may be stored encoded or decoded by a software video technologies developed by
in a separate file, where it is similar to a module called a codec. The codec Microsoft. It is part of the Windows Media
greyscale image. 8-bit images can also translates between raw data and the data framework. WMV is not built solely on
be greyscale instead of color. BMP files format inside the chunk. An AVI file may Microsoft in-house technology. From
are usually not compressed, so they are therefore carry audio/visual data inside version 7 (WMV7), Microsoft has used its
typically much larger than compressed the chunks in almost any compression own non-standard version of MPEG-4.
image file formats for the same image. scheme, including: Full Frames The video stream is often combined with
The typical true-color bitmap size in (Uncompressed), Intel Real Time Video, an audio stream of Windows Media
bytes can be calculated as: (width in Indeo, Cinepak, Motion JPEG, Editable Audio. WMV files are customarily played
pixels)×(height in pixels)×3. So an MPEG, VDOWave, ClearVideo / by Windows Media Player on Microsoft
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

800×600 image will occupy almost 1.5 RealVideo, QPEG, MPEG-4, and others.” Windows and Macintosh systems. Some
megabytes. As such they are generally (AVI. Wikipedia, the free encyclopedia. third-party players also exist, such as
unsuitable for transferring images on the Retrieved 12 February 2005 from MPlayer for Linux, which play back WMV
Internet or other slow or capacity-limited Wikipedia. <http://en.wikipedia.org/ by using the FFmpeg implementation of
media. Compressed imaged employ RLE wiki/Avi>) the WMV codecs. Raw WMV video is
algorithm. (Windows Bitmap. Wikipedia, 79 The Moving Picture Experts Group packed into an AVI or Advanced
the free encyclopedia. Retrieved 12 (MPEG) is a small group charged with Streaming Format (ASF) container. The
February 2005 from Wikipedia. <http:/ the development of video and audio resulting files may be named .avi if it is
/en.wikipedia.org/wiki/BMP>) encoding standards. Since its first an AVI-contained file, or .wmv or .asf if
77 PNG (Portable Network Graphic), meeting in 1988, MPEG has grown to it is an ASF file, but .wmv files are to be
sometimes pronounced as “ping”, is a include approximately 350 members ASF files with audio/video content only.
relatively new bitmap image format that from various industries and universities. WMV is usually found in the AVI file
is becoming popular on the World Wide MPEG’s official designation is ISO/IEC container when encoded with
Web and elsewhere. PNG was largely JTC1/SC29 WG11. MPEG has Microsoft’s Windows Media Video 9 VCM
developed to deal with some of the standardized the following compression software for Windows. Microsoft’s
shortcomings of the GIF format and formats and ancillary standards: (1) Windows Media Player for the Mac does
allows storage of images with greater MPEG-1: Initial video and audio not support all WMV encoded files since
color depth and other important compression standard. Later used as the it supports only the ASF file container.
information. The motivation for creating standard for Video CD, and includes the (Windows Media Video. Wikipedia, the
the PNG format came in early 1995, popular Layer 3 (MP3) audio free encyclopedia. Retrieved 12

58
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
February 2005 from Wikipedia. <http:/ of the Windows Media framework. An Even if the accuracy of the results is
/en.wikipedia.org/wiki/ initial reason for the development of questioned, Hoffman and Novak admits
Windows_Media_Video >) WMA might have been that MP3 still that “pornography exists and is
81 RealMedia is a digital sound (RA) and technology is patented and has to be transmitted through many media,
video (RM) file format that is the licensed from Thomson for inclusion in including cable television, books and
registered trademark of RealNetworks. the Microsoft Windows operating system. magazines, video tapes, private “adult”
This format is typically used to stream A WMA file is almost always bulletin boards, the postal mail,
media through the net. It is played with encapsulated in an Advanced Systems computer networks, interactive media
the RealOne player. (Real Media. Format (ASF) file. The resulting file may like CDROM, fax, and telephone, to
Wikipedia, the free encyclopedia. have the filename suffix “wma” or “asf” name a few.”
Retrieved 12 February 2005 from with the “wma” suffix being used only if 89 Anderson, Kerby. Cyberporn. Retrieved
Wikipedia. < http://en.wikipedia.org/ the file is strictly audio. The ASF file from the website of Probe Ministries.
wiki/RealMedia>) format specifies how metadata about the < h t t p : / / w w w. l e a d e r u . c o m / o r g s /
82 MP3 (or, more precisely, MPEG-1/2 file is to be encoded, akin to the ID3 probe/docs/cybporn.html>
Audio Layer 3) is “an audio compression tags used by MP3 files. ASF is also 90 Ibid.
algorithm capable of greatly reducing patented in the United States. Files in 91 Ibid.
the amount of data required to this format can be played using Windows 92 Johnson, Jarvis; Quinn Johnson, Danny
reproduce audio, while sounding like a Media Player, Winamp (with certain Page, and Sekou Richen. Cyberporn.
faithful reproduction of the original limitations, DSP plugin support and Georgia State University College of Law.
uncompressed audio to most listeners. DirectSound output is disabled using the Citing the The Meese Commission
In the first half of 1995, MP3 files, file default WMA plugin) and many other Report, in 1986, provides evidence that
representations of MPEG-1 Audio Layer alternative media players. The FFmpeg pedophile offenders and child
III data, began flourishing on the project have reverse-engineered and pornographers had begun to use
Internet. Its popularity was mostly due reimplemented the WMA format to allow personal computers and computer
to, and interchangeable with, the its use on POSIX compliant operating networks for communication and
successes of companies and software systems such as Linux. Windows Media distribution of materials. See Attorney
packages like Nullsoft’s Winamp, Audio supports digital rights General’s Commission on Pornography:
mpg123 and the now Roxio-owned management using a combination of Final Report, 2 vols. Washington, D.C.:
Napster. MP3 bitrate is 128 kilobits per elliptic curve cryptography key U.S. Government Printing Office, July
second (kbit/s), a little inferior to CD exchange, DES block cipher, a custom 1986 [The Meese Commission] at page
quality audio but with a compression block cipher, RC4 stream cipher and the 629. <http://gsulaw.gsu.edu/lawand/
ratio of approximately 11:1.” (MP3. SHA-1 hashing function. (Windows p a p e r s / f a 0 1 /
Wikipedia, the free encyclopedia. Media Audio. Wikipedia, the free johnson_johnson_page_richen/>
Retrieved 12 February 2005 from encyclopedia. Retrieved 12 February 93 Anderson, Kerby. Cyberporn. Probe
Wikipedia. <http://en.wikipedia.org/ 2005 from Wikipedia. <http:// Ministries. Supra, note 89.
wiki/MP3>) en.wikipedia.org/wiki/ 94 Allen, Kenneth. Cyber-Sex: A Review
83 WAV (or WAVE), short for WAVEform Windows_Media_Audio>) and Implications of the Situation. Notre
audio format, is a “Microsoft and IBM 85 Real Media. Supra, see Note 81. Dame Seminary. <http://
audio file format standard for storing 86 Ross, Mark. “Cybersex and the Law.” home.earthlink.net/~philoska/cyber/>
audio on PCs. It is a variant of the RIFF Brief for the petitioner, William L. Elvert, Citing “Definition of ‘Cyber’,” in Cyber
bitstream format method for storing data v. The United States of America. Case Sex Chat Addicts Anonymous (accessed
in “chunks”, and thus also close to the No. 96-3342, Pending in the US by said author, 27 November 2001 at
IFF and the AIFF format used on Supreme Court in 1996. <http:// [ w w w. c y b e r a a . c o m / D e f i n i t i o n /
Macintosh computers. It takes into www.apc.net/maross/Cybersex1.htm> definition.html]; no longer available).
account some peculiarities of the Intel 87 Anderson, Kerby. The Pornographic 95 Allen, Kenneth. Cyber-Sex: A Review
CPU such as little endian byte order. Plague. Probe Ministries. Supra, see and Implications of the Situation. Notre
The RIFF format acts as a “wrapper” for note 4. Dame Seminary. <http://
various audio compression codecs. It is 88 “Marketing Pornography on the home.earthlink.net/~philoska/cyber/>
the main format used on Windows Information Superhighway: A Survey of Citing René J. Molencamp, Ph.D, and
systems for raw audio. Though a WAV 917,410 Images, Description, Short Luisa M. Saffiotti, Ph.D., “The
file can hold audio compressed with any Stories and Animations Downloaded 8.5 Cybersexual Addiction,” Human
codec, by far the most common format Million Times by Consumers in Over Development, Volume 22, Number 1,
is PCM audio data. Since PCM uses an 2000 Cities in Forty Countries, Provinces Spring 2001 ( Chicago : Jesuit
uncompressed, lossless storage method and Territories” by Marty Rimm was Educational Center for Human
which keeps all the samples of an audio published in The Georgetown Law Development, 2001) 5-6.
track, professional users or audio experts Journal. The research project, and the 96 Leaño , Peter James V . What ’s
may use the WAV format for maximum resulting publications – including the Happening: UPCIDS-PST conducts
audio quality. WAV audio can also be Time Magazine article “On a Screen Rapid Appraisal of Child Pornography
edited and manipulated with relative Near You: Cyberporn” by Philip Elmer- in the Philippines. June 2004. Retrieved
ease using software.” (WAV. Wikipedia, Dewitt, which used the results of Marty 8 January 2005 from Child Protection in
the free encyclopedia. Retrieved 12 Rimm’s research – set off a avalanche the Philippines. <http://
February 2005 from Wikipedia. <http:/ of criticism on the manner the study was w w w. c h i l d p r o t e c t i o n . o r g . p h /
/en.wikipedia.org/wiki/WAV>) conducted, the methods used, and the w h a t s h a p p e n i n g /
84 Windows Media Audio (WMA) is a reliability of the data generated. whtbits1_mayjun04%5B1%5D.html>
proprietary compressed audio file format Debunking the results of the Rimm 97 See the case of United States vs. Stephen
developed by Microsoft. It was initially a Methodology and the Dewitt article, A. Knox, decided by the United States
competitor to the MP3 format, but with Donna L. Hoffman and Thomas P. Novak Court of Appeals for the Third Circuit,
the introduction of Apple’s iTunes Music of Vanderbilt University created a No. 92-7089. See FindLaw for Legal
Store, it has positioned itself as a comprehensive site, “The Cyberporn Professionals - Case Law, Federal and
competitor to the Advanced Audio Debate” (http://elab.vanderbilt.edu/ State Resources, Forms, and Code.
Coding format used by Apple. It is part research/topics/cyberporn/index.htm). < h t t p : / / l a w s . f i n d l a w. c o m / 3 r d /

59
940734p.html> en.wikipedia.org/wiki/Infantophilia> w w w. m a l a y a . c o m . p h / j a n 2 3 /
98 See the case of Ashcroft, Attorney 113 Carvajal, Nancy. 19 girls rescued from metro4.htm> Also Carvajal, Nancy.
Gerneral, et. al. vs. Free Speech cyber exploitation. 22 January 2005. 19 girls rescued from cyber exploitation.
Coalition. et. al. decided by the Supreme INQ7.net News. <http:// Supra, note 113.
Court of the United States. 535 U.S. 234 n e w s . i n q 7 . n e t / m e t r o / 125 Cybersex ladies get P1M a month.
(2002) See the Legal Information Institute index.php?index=1&story_id=25123> Supra, see Note 119. Also, Cyber sex
of the Cornell University Law School, 114 Perez, Maria Patricia Anne L., NBI raids den raided in Manila. 23 January 2005.
Ashcroft vs. Free Speech Coalition. < suspected internet porn operators. 20 Manila Headlines <http://
http://supct.law.cornell.edu/supct/ May 2003. i.t. matters. <http:// manilaheadline.net/News/01-05/22/
html/00-795.ZS.html> itmatters.com.ph/news/ cyber_sex_den_raided_in_manila.htm>
99 Child erotica is “any material relating news_05202003h.html> 126 Cybersex girls come from rich families.
to children that serves a sexual purpose 115 Oliva, Erwin Lemuel. Senator to push 24 January 2005. Manila Headlines
for a given individual.” Kenneth V. for stiffer penalties on child porn on Net. <http://manilaheadline.net/News/01-
Lanning, Child Molesters: A Behavioural 6 February 2005. INQ7.net. <http:// 0 5 / 2 4 /
Analysis 26 (1992). news.inq7.net/infotech/ cybersex_girls_come_from_rich_fa.htm>
100 Child Pornography. Wikipedia, the free index.php?index=1&story_id=26636> 127 Erediano, Arnold. Cybersex dens: Now
encyclopedia. Retrieved 28 December 116 Perez, Maria Patricia Anne L., NBI raids showing nationwide. Supra, see Note
2004 from Wikipedia. <http:// suspected internet porn operators. 118.
en.wikipedia.org/wiki/ Supra, see note 114. 128 The original article includes samples of
Child_pornography> 117 No law vs cybersex, PNP laments. 28 Cybersex (pre-explicit) screenshots.
101 Schuijer, Jan and Benjamin Rossen. “The January 2005. Asian Journal Online 129 Sex Scandal. Wikipedia, the free
Trade in Child Pornography”. Retrieved <http://www.asianjournal.com/cgi- encyclopedia. Retrieved 13 February
15 January 2005 from IPT Journal, b i n / 2005 from Wikipedia. <http://
Institute for Psychological Therapies. view_info.cgi?code=00009164&category en.wikipedia.org/wiki/Sex_scandal>
< h t t p : / / w w w. i p t - f o r e n s i c s . c o m / =TN> 130 Daily Star People and Events. 2003: Sex,
journal/volume4/j4_2_1.htm> 118 Erediano, Arnold. Cybersex dens: Now bikini scandals rock NegOr. 6 January
102 Pret Art. Wikipedia, the free showing nationwide. 3 February 2005. 2004. The Visayan Daily Star, Electronic
encyclopedia. Retrieved 28 December People’s Tonight. <http:// edition. <http://
2004 from Wikipedia. <http:// w w w. j o u r n a l . c o m . p h / w w w.visayandailystar.com/2004/
en.wikipedia.org/wiki/Pret_art> news.asp?pid=1&sid=1&nid=20464& January/06/people.htm>
103 Child Pornography: An International month=2&day=3&year=2005> 131 FHM, August 2004 issue. Also
Perspective; citing U.S. Senate Report; 119 Perez, Maria Patricia Anne L., NBI raids Greenarcher.net Forums – DLSU Sex
Kenneth V. Lanning, Child Molesters: A suspected internet porn operators. Scandal. <http://
Behavioural Analysis, 10-12. Retrieved Supra, see note 114. Also, Cybersex g r e e n a r c h e r. y e h e y. c o m / f o r u m s /
8 January 2005 from Computer Crime ladies get P1M a month. 23 January archive/index.php/t-10736>
Research Center. <http:// 2005. Manila Headlines. <http:// 132 FHM, August 2004 issue.
www.csecworldcongress.org/PDF/en/ manilaheadline.net/News/01-05/23/ 133 Ibid.
Stockholm/Background_reading/ cybersex_ladies_get_p1m_a_month.htm> 134 Belen, Crispin. Celebrity World: Ethel
T h e m e _ p a p e r s / 120 20 more fall in drive against cybersex in Booba’s sex video controversy rages on.
Theme%20paper%20Pornography%20 Angeles. 10 November 2004. ABS-CBN- The Manila Bulletin Online. <http://
1996_EN.pdf> News. <http://www.abs-cbnnews.com/ w w w . m b . c o m . p h /
104 See the case of Hustler Magazine vs. NewsStory.aspx?section=Provincial&oid ENTR2005021528791.html>
Falwell, decided by the Supreme Court =63169> 135 Child porn in RP a US$1-B business:
of the United States (485 U.S. 46). See 121 No law vs cybersex, PNP laments. 28 senator. Retrieved 8 January 2005 from
the Legal Information Institute of the January 2005. Asian Journal Online. SunStar Network Online. <http://
Cornell University Law School, Ashcroft <http://www.asianjournal.com/cgi- www.sunstar.com.ph/static/net/2005/
vs. Free Speech Coalition. < http:// b i n / 01/20/child.porn.in.rp.a.us$1.b.
supct.law.cornell.edu/supct/html/ view_info.cgi?code=00009164&category business.senator.html>
h i s t o r i c s / =TN> 136 The case United States v. X-Citement
USSC_CR_0485_0046_ZS.html> 122 20 more fall in drive against cybersex in Video, Inc., 513 U. S. 64 (1994), involving
105 See the case of Pita vs. Court of Appeals. Angeles. Supra, see Note 120. Also the underage American porn actress
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

Supra, note 9. Navarro, Chris. “Cops arrest 20 in Traci Elizabeth Lords (real name is Nora
106 Child Pornography. Wikipedia, the free ‘cybersex’ den raid”. 10 November 2004. Louise Kuzma) provides an illustration.
encyclopedia. Supra, note 100. Sun Star Network Online <http:// The full text of the US Supreme Court
107 Section 3(e) of RA 9208. Supra, note 3. www.sunstar.com.ph/static/net/2004/ Decision may be found, among others,
108 Sex Tourism. Wikipedia, the free 1 1 / 1 0 / at FindLaw for Legal Professionals - Case
encyclopedia. Retrieved 28 December cops.arrest.20.in.cybersex.den.raid.html> Law, Federal and State Resources,
2004 from Wikipedia. <http:// 123 Cybersex a billion-dollar industry, says Forms, and Code. <http://
en.wikipedia.org/wiki/Sex_tourism> Madrigal. 17 January 2005. Prov’l Gov’t c a s e l a w. l p . f i n d l a w. c o m / c g i - b i n /
109 Section 3(f), RA 9208. Supra, see note 3. of LA UNION Forums citing an undated getcase.pl?court=us&vol=000&invol=
110 Sexual Abuse. Wikipedia, the free Philippine Star article. <http:// u10337>
encyclopedia. Retrieved 28 December members.lycos.co.uk/launiongov/ 137 UNICEF condemns child pornography
2004 from Wikipedia. <http:// viewthread.php?tid=25> Also in the Philippines. Retrieved 8 January
en.wikipedia.org/wiki/Sexual_abuse > Cybersex girls come in the open. 28 2005 from United Nations Children’s
111 Pedophilia. Wikipedia, the free January 2005. Manila Headlines. Fund (UNICEF). <http://
encyclopedia. Retrieved 28 December <http://manilaheadline.net/News/01- www.unicef.org/philippines/archives/
2004 from Wikipedia. <http:// 0 5 / 2 8 / october_04/news/news_2.html>.
en.wikipedia.org/wiki/Pedophilia> cybersex_girls_come_in_the_open.htm> 138 Philippines. The International
112 Infantophilia. Wikipedia, the free 124 Africa, Raymond. Cybersex shop raided. Encyclopedia of Sexuality. Retrieved 8
encyclopedia. Retrieved 28 December 23 January 2004. Malaya- The National January 2005 from Humboldt-Universität
2004 from Wikipedia. <http:// Newspaper. <http:// of Berlin. <http://www2.hu-berlin.de/

60
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
sexology/IES/philippines.html> Retrieved 8 January 2005 from The 172 See Rules on Electronic Evidence (A.M.
139 Family and friends push children into Institute for Dynamic Living, Inc. <http:/ No. 01-7-01-SC), See the Philippine
prostitution. 11 November 2004. / w w w. c h i l d l u s t r e c o v e r y. o r g / Laws and Jurisprudence Databank - The
Retrieved 28 December 2004 from index.html> Lawphil Project. <http://
AsiaNews (Italy). <http:// 152 Women – 22 September 2004 journal. www.lawphil.net/courts/supreme/am/
w w w . a s i a n e w s . i t / Retrieved 28 December 2004 from the am_01-7-01_2001.html>.
view.php?l=en&art=1884> Senate of the Philippines. <http:// 173 Republic Act No. 8792 is entitled “An
140 Leaño , Peter James V . What ’s w w w. s e n a t e . g o v. p h / c o m m i t t e e / Act Providing and Use of Electronic
Happening: UPCIDS-PST conducts spot_report/Women%20%20September Commercial and Non-Commercial
Rapid Appraisal of Child Pornography %2022,%202004%20journal.pdf> Transactions, Penalties for Unlawful Use
in the Philippines. June 2004. Retrieved 153 Oliva, Erwin Lemuel. Senator to push Thereof, and other purposes.” See the
8 January 2005 from Child Protection in for stiffer penalties on child porn on Net. Philippine Laws and Jurisprudence
the Philippines. <http:// Supra, note 115. Databank - The Lawphil Project. <http:/
w w w. c h i l d p r o t e c t i o n . o r g . p h / 154 Article 201, Revised Penal Code, as /www.lawphil.net/statutes/repacts/
w h a t s h a p p e n i n g / amended by Presidential Decrees Nos. ra2000/ra_8792_2000.html>
whtbits1_mayjun04%5B1%5D.html> 960 and 969. 174 Rules of Electronic Evidence. Supra, see
141 Oliva, Erwin Lemuel G., “Law vs online 155 Arresto mayor has the duration of one Note 172.
child porn to be lobbied anew— month and one day to 6 months 175 Soriano, Jaime N. “The Philippine Rules
sources”. 6 July 2004. Retrieved 8 (Paragraph 5, Article 27, Revised Penal on Electronic Evidence: An Outline.”
January 2004 from the Philippine Code of the Philippines). The Philippine Quarterly IT Law Journal,
Inquirer (INQ7.net). <http:// 156 Arresto menor has the duration of one Volume 1, Number 1, p. 7.
www.inq7.net/inf/2004/jul/07/inf_1- day to thirty days (Paragraph 6, Article 176 Re: Expansion of the Coverage of the
1.htm> 27, Revised Penal Code of the Rules on Electronic Evidence. Retrieved
142 Cullen, Fr. Shay, SSC. Reflections: Philippines). 20 February 2005 from Disini and Disini.
Pornography the Root of Sexual 157 Prision correccional has the duration of <http://www.disini.ph/res_sc_am_1-7-
Violence. Retrieved 28 December 2004 six months and one day to six years 01.html>
from People’s Recovery, Empowerment (Paragraph 4, Article 27, Revised Penal 177 Binary. Supra, see Note 22.
and Development Assistance Code of the Philippines) 178 ASCII (American Standard Code for
Foundation, Inc. <http:// 158 Article 341, Revised Penal Code, as Information Interchange), generally
www.preda.org/archives/1993-94-95- amended by Batas Pambansa Blg. 186. pronounced ass-key, is “a character set
96/r9501221.htm>. The article was first 159 Article 340, Revised Penal Code, as and a character encoding based on the
printed 22 January 1995 issue of the amended by Batas Pambansa Blg. 92. Roman alphabet as used in modern
Philippine Daily Inquirer. 160 Section 3(a), RA 9208. Supra, see note English and other Western European
143 Child Sex Tourism Charges. Retrieved 8 3. languages. It is most commonly used by
January 2005 from the “End Child 161 Section 10 (a) of Republic Act 9208. Ibid., computers and other communication
Prostitution, Child Pornography and see Note 3. equipment to represent text and by
Trafficking of Children for Sexual 162 Section 10 (b) of Republic Act 9208. Ibid., control devices that work with text. The
Purposes (ECPAT)” website. <http:// see Note 3. printable characters in the correct order
www.ecpat.org/prosecutions.html> 163 Section 10 (c) of Republic Act 9208. are !"#$%&'()*+,-./0123456789:;<=>
144 Davies, Nick and Jeevan Vasagar. Supra., see Note 3. ?@ABCDEFGHIJKLMNOPQRSTUVW
Global child porn ring broken; Britons 164 Section 10 (d) of Republic Act 9208. XYZ[\]^_'abcdefghijklmnopqrstuvwxyz
face jail after raids on internet Supra., see Note 3. {|}~ with a blank space in front.”
paedophiles. Retrieved 28 December 165 Section 10 (e) of Republic Act 9208. (ASCII. Wikipedia, the free
2004 from Guardian Unlimited, Archive Supra., see Note 3. encyclopedia. Retrieved 20 February
search. <http://www.guardian.co.uk/ 166 Section 10 (f) of Republic Act 9208. 2005 from Wikipedia. < http://
A r c h i v e / A r t i c l e / Supra., see Note 3. en.wikipedia.org/wiki/ASCII>)
0,4273,4115701,00.html> 167 Section 10 (g) of Republic Act 9208. 179 Guerrero, Michael Vernon M.,
145 Child Sex Tourism Charges. ECPAT. Supra., see Note 3. “’Hacking’ the Mercantile Law Bar Exam
Supra, see note 143. 168 Section 10 (h) of Republic Act 9208. Questions.” The Philippine Quarterly
146 News Release. Retrieved 8 January 2005 Supra., see Note 3. IT Law Journal, Volume 1, Number 1, p.
from the United States Department of 169 Section 11 of Republic Act 9208. Supra., 1.
Justice. <http://www.usdoj.gov/ see Note 3. 180 See the Convention on the Rights of the
criminal/ceos/Press%20Releases/ 170 Republic Act 7610 is entitled :An Act for Child. Office of the High Commissioner
RussellPR.pdf> Stronger Deterrents and Special for Human Rights. <http://
147 SOC-UM – 2003 Updates. Retrieved 8 Protection against Child Abuse, w w w. u n h c h r. c h / h t m l / m e n u 3 / b /
January 2005 from SOC-UM (Save Our Exploitation and Discrimination, k2crc.htm>.
Children).org <http://www.soc- Providing Penalties for its violation and 181 See the Optional Protocol to the
um.org/updates/updates16.html> for Other Purposes.” See the Philippine Convention on the Rights of the Child
148 ICE Fact Sheet - Child Sex Tourists. Laws and Jurisprudence Databank - The on the sale of children, child prostitution
Retrieved 24 January 2005 from US Lawphil Project. <http:// and child pornography. Office of the
Immigration and Customs Enforcement www.lawphil.net/statutes/repacts/ High Commissioner for Human Rights.
(ICE) of the US Department of Homeland ra1992/ra_7610_1992.html>. <http://www.unhchr.ch/html/menu2/
Security. <http://www.ice.gov/ 171 Libel is defined by Article 353 of the 6/crc/treaties/opsc.htm>.
graphics/news/factsheets/ Revised Penal Code as “a public and 182 Perez, Maria Patricia Anne. US plans to
sextourists.htm> malicious imputation of a crime, or of a setup a computer crime Unit in RP. 10
149 Child Sex Tourism Charges. ECPAT. vice or defect, real or imaginary, or any June 2003 i.t. matters. <http://
Supra, See Note 143. act, omission, condition, status, or itmatters.com.ph/news/
150 ICE Fact Sheet - Child Sex Tourists. circumstance tending to cause the news_06102003b.html>
Supra, see Note 148. dishonor, discredit, or contempt of a 183 Various House Bills have been submitted,
151 Recent News. Child Lust Recovery.org: natural or juridical person, or to blacken currently pending, and aimed to provide
Recovery from Child Pornography Use. the memory of one who is dead.” necessary legislation relevant to

61
pornography, which may well include pornographic articles; and d) the SunStar Bacolod. <http://
child pornography 1: performance of live sex acts for public www.sunstar.com.ph/static/bac/2003/
viewing.” It is currently pending with 1 1 / 1 1 / n e w s /
* HB01278 (An Act Prohibiting the the Committee on Public Information city.to.bring.to.congress.concerns.on.
Publication, Sale or Distribution, since 2 February 2005. hidden.cams.html>
Production, Importation and 186 The original article includes sample
Exhibition of Obscene and Various House Bills have been submitted, screen shots of pre-explicit materials
Pornographic Materials and the currently pending, and aimed to provide from various websites featuring Filipina
Demonstation, Performance or necessary legislation relevant to teens.
Exhibition in Public Indecent and cybercrimes, which may well include 187 In the United States, the receipt,
Sexual Acts and Providing Penalties electronically transmitted child distribution, or possession of child
for violation thereof) was filed 8 July pornography 2: pornography, which includes the
2004 by Congressman Emmanuel Joel downloading of child pornography from
J. Villanueva, which declares that “it * HB00337 (An Act Preventing and the Internet, is a violation of Title 18, US
a State policy to safeguard the Penalizing Computer-Related Crimes, Code, Section 2252. Persons convicted
morality of society, particularly the further amending for the purpose of child pornography offenses face
youth and women, against the Certain Provisions of Act No. 3815, criminal penalties of up to 15 years in
eroding influence of immoral as amended, otherwise known as the prison, a fine of up to $250,000, or both.
doctrines, obscene and pornographic Revised Penal Code) was filed on 1 ICE Arrests Campus Minister on Child
publications and indecent shows. It July 2004 by Congresswoman Imee Pornography Violations. Retrieved 8
seeks to prohibit the public R. Marcos, on the premise that “The January 2005 from the US Immigration
demonstration of sexual acts, the proliferation of advanced and state- and Customs Enforcement (ICE)
distribution, sale and production of of-the art technologies necessitates website. <http://www.ice.gov/
pornographic materials and provides the enactment of laws to regulate graphics/news/newsreleases/articles/
penalties for violations.” It is currently human conduct in this fast changing arrest010604.htm> The US Code Title
pending with the Committee on world. The bill seeks to supplement on Obscenity may be found at US Code
Public Information since 2 February and update the Revised Penal Code Collection of the Legal Information
2005. (RPC) to cover computer-related Institute of the Cornell University Law
offenses which are not much different School. <http://
* HB02031 (An Act Prohibiting the from crimes classifically punished assembler.law.cornell.edu/uscode/
Publication, Sale, Distribution, under the RPC.” It is currently pending h t m l / u s c o d e 1 8 /
Importation and Exhibition of with the Committee on Revision of usc_sup_01_18_10_I_20_71.html>.
Obscene and Pornographic Materials Laws since 27 July 2004. 188 Present efforts to curb Child
and the Performance or Exhibition of Pornography, including proposed
Indecent Acts in Public and Providing * HB01246 (An Act Preventing and legislation in Congress, include:
Penalties for violation thereof) was Penalizing Computer Fraud, Abuses
filed 10 August 2004 by and other Cyber-Related Fraudulent A. Organizational
Congresswoman Eileen Ermita- Activities, and creating for the purpose
Buhain, aiming to prohibit “the the Cyber-Crime Investigation and * The Program on Psychosocial
following acts: a) the publication, Coordinating Center, Prescribing its Trauma and Human Rights Center
sale, distribution and importation of Powers and Functions, and for Integrative and Development
obscene and pornographic materials; appropriating funds therefor) was Studies of the University of the
b) the portrayal, depiction, filed on 7 July 2004 by Congressman Philippines (UPCIDS-PST) began
performance and exhibition of any Eric D. Singson, on the premise that the Rapid Appraisal of Child
indecent act in public; and c) the “The bill seeks to protect and Pornography in the Philippines, the
coercion of another person to listen, safeguard the integrity of computers, purpose of which was to give a
read or view obscene and computer systems, computer comprehensive appraisal of the
pornographic materials in public networks, computer servers, issue of child pornography in the
places.” It is currently pending with database, and information and data Philippines. It aimed to consolidate
the Committee on Public Information stores from computer users who resort literature that has been written on
since 1 February 2005. to computer fraud, abuses and other the issue; investigate how the
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

cyber-related fraudulent activities, by internet and globalization aid in


* HB02887 (An Act Prohibiting and providing penal sanctions to the perpetuating this, and conduct
Penalizing the Production, Printing, perpetrators. It creates a coordinating interviews and focus group
Publication, Importation, Sale, body, the Cyber-Crime Investigation discussions with key informants
Distribution and Exhibition of and Coordinating Center (CICC), from government and non-
Obscene and Pornographic Movies which shall coordinate, collate and government organizations, the
and Materials, and the Exhibition of synergize efforts of all law media, electronic commerce
Live Sexual Acts, amending for the enforcement agencies in combating practitioners, and actual victims of
purpose Article 201 of the Revised cyber crimes.” It is currently pending child pornography. 1 Participating
Penal Code) was filed 20 September with the Committee on Information organizations, forming the steering
2004 by Congressman Bienvenido M. Communications Technology since 12 committee for the Child Protection
Abante Jr., aiming to penalize “the January 2005. in the Philippines (Philippine
following acts: a) the production, Resource Network), include The
importation, distribution, showing and 184 Senators alarmed by cybersex business. Advisory Board Foundation, Arci
sale of obscene or pornographic 25 January 2005. Manila Headlines. Cultura e Sviluppo, Ateneo Human
movies; b) the printing, publication, <http://manilaheadline.net/News/01- Rights Center-Adhikain Para Sa
importation, sale or distribution of any 05/24/senators_alarmed_by_cybersex_ Karapatang Pambata, Center for
magazine or comic book containing bus.htm> the Prevention and Treatment of
obscene or pornographic materials; 185 City to bring to Congress concerns on Child Sexual Abuse (http://
c) the writing of obscene or hidden cams. 11 November 2003. www.cptcsa.org/), Council for the

62
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
Welfare of Children, Department 12 years old; and b)make law “The bill bans and penalizes
of Social Welfare and Development enforcers and government the employment of children
( h t t p : / / w w w. d s w d . g o v. p h / ) , officials criminally culpable in all forms of hazardous
ECPAT-Philippines, Child for willfully abetting these occupations and aims for
Protection Unit (http:// crimes or causing or assisting “greater participation of local
www.childprotection.org.ph/), in the plight of the accused.” social workers and law
Save the Children (UK) Philippines It is currently pending with the enforcers.” Imposes penalties
(www.oneworld.org/scf), UNICEF- Committee on Social Services for child pornography
Manila (www.unicef.org/ since 27 July 2004. through the internet.
philippines), and the UP Center for Mandates the creation of a
Integrative and Development * HB01296 (An Act amending central data bank to monitor
Studies-Psychosocial Trauma & Republic Act No. 7610 abuses made by foreigners
Human Rights Program. otherwise known as ‘The against children and prevent
Special Protection of Children their reentry.” It is currently
* The Philippine Senate Committee against Child Abuse, pending with the Committee
on Youth, Women and Family Exploitation and on Social Services since 9
Relations has provided a spot Discrimination Act’, and for August 2004.
report on 22 September 2004 other purposes) was filed on
pertaining to the issue of Child 8 July 2004 by * HB00731 (An Act Increasing
Pornography and Pedophilia. As an Congresswoman Darlene the Penalties for Child Abuse
abstract, the report provides “Child Magnolia R. Antonino- and Exploitation, thereby
Pornography and Pedophilia is long Custodio, on the premise that declaring it as Heinous
overdue, and although there are “This bill enumerates Crime, amending for the
already laws to address the same, additional remedial measures purpose Republic Act No.
such as R.A. 7610- Law Against to correct the deplorable 7160 as amended, otherwise
Child Abuse, Exploitation and manner by which local known as The “Special
Discrimination; R.A. 9208 - Anti government and law Protection Of Children
Trafficking in Persons Act ; and R.A. enforcement officials, as well Against Child Abuse,
9231 – Elimination of All Forms of as members of the justice Exploitation and
Child Labor.” 2 sector, handle cases of child Discrimination Act”, and for
rape and sexual molestations other purposes) was filed on
B. Legislation and child prostitution 1 July 2004 by
involving minors below the Congresswoman Judy Syjuco,
* Various House Bills have been age of twelve (12). It provides on the premise that “The bill
submitted, currently pending, and for the issuance of an seeks to impose the penalty
aimed to amend certain provisions automatic hold order for those of reclusion perpetua TO
of Republic Act 7610, or the Special accused to prevent them from DEATH for the crimes of child
Protection of Children against Child fleeing abroad. Furthermore, trafficking and child
Abuse, Exploitation and it imposes the maximum prostitution.” It is currently
Discrimination Act 3 : penalty on law enforcers and pending with the Committee
members of the Judiciary on Revision of Laws since 28
* HB00371 (An Act Amending Department found guilty July 2004.
Republic Act No. 7610 including willfully abetting
otherwise known as the these crimes or causing or * HB03468 (An Act amending
Special Protection of Children assisting in the plight of those Republic Act No. 7610, as
against Child Abuse, accused.” It is currently amended, otherwise known as
Exploitation and pending with the Committee The Special Protection of
Discrimination Act, and for on Social Services since 2 Children against Child
other purposes) was filed on August 2004. Abuse, Exploitation and
1 July 2004 by Congressman Discrimination) was filed on
Roseller Barinaga, on the * HB01961 (An Act seeking to 8 December 2004 by
premise that “the cases of Improve Child Protection Congresswoman Imee R.
child rape and sexual against Abuse, Exploitation Marcos, on the premise that
molestation remain unabated And Discrimination, “The bill imposes the penalties
despite the enactment of RA amending for the purpose of reclusion temporal in its
7610. The manner in which Republic Act No. 7610, as medium term to reclusion
government agencies and law amended by Republic Act No. perpetua for acts that are
enforcement officers handle 7658, otherwise known as the either preparatory to or per
these cases are outrageous. “Special Protection And se amounts to child
To correct the situation, the Discrimination Act”, pornography and
bill seeks to amend RA 7610, appropriating Funds therefor prostitution.” It is currently
as follows: a) cause a and for other purposes) was pending with the Committee
mandatory hold departure filed on 30 July 2004 by on Social Services since 14
order for these accused on Congressman Robert Ace S. December 2004.
cases involving children below Barbers, on the premise that

63
<< [ 26] Lexicon of Cyberlaw Terminology << [ 27] Goldwyn Case The elements of direct infringement
“Digitally signed” refers to an With respect to their current software and direct financial benefit, via
electronic document or electronic data distribution and related activities, advertising revenue, are undisputed in
message bearing a digital signature defendants do not materially contribute this case.
verified by the public key listed in a to copyright infringement. The
certificate. (Section 1[f], Rule 2, Rules software distributors do not provide the With regard to the right and ability to
on Electronic Evidence) ‘site and facilities’ for infringement, supervise, it does not appear from the
and do not otherwise materially records that either of the defendants
“Electronic signature" refers to any contribute to direct infringement. has the ability to block access to
distinctive mark, characteristics and/ Infringing messages or file indices do individual users. Grokster nominally
or sound in electronic form. not reside on defendants’ computers, reserves the right to terminate access,
Representing the identity of a person while StreamCast does not maintain a
nor do defendants have the ability to
and attached to or logically associated licensing agreement with persons who
suspend user accounts. Also as found
with the electronic data message or download Morpheus. However, given
out, the software distributors here are
electronic document or any the lack of a registration and log-in
methodology or procedure employed not access providers, and they do not
provide file storage and index process, even Grokster has no ability
or adopted by a person and executed
maintenance, but rather, it is the users to actually terminate access to file
or adopted by such person with the
of the software who, by connecting to sharing functions, absent a mandatory
intention of authenticating, signing or
each other over the internet, create software upgrade to all users that the
approving an electronic data message
or electronic document. For purposes the network and provide the access. particular user refuses, or IP address
of these Rules, an electronic signature Plaintiffs failed to present evidence that blocking attempts. It is also clear that
includes digital signatures. (Section 1[j], defendants materially contribute in any none of the communication between
Rule 2, Rules on Electronic Evidence) manner. defendants and users provides a point
of access for filtering or searching for
“Electronic key” refers to a secret B. Vicarious Copyright infringing files, since infringing
code which secures and defends Infringement material and index information do not
sensitive information that crosses over pass through defendants’ computers.
public channels into a form Three elements are required to prove The sort of monitoring and supervisory
decipherable only with a matching a defendant vicariously liable for relationship that has supported
electronic key. (Section 1[i], Rule 2, copyright infringement: (1) direct vicarious liability in previous cases is
Rules on Electronic Evidence) infringement by a primary party; (2) a totally absent in this case. Unlike in the
direct financial benefit to the case of Napster, Grokster and
“Asymmetric or public defendant; and (3) the right and ability StreamCast do not operate and design
cryptosystem” means a system to supervise the infringers. an integrated service.
capable of generating a secure key
pair, consisting of a private key for << [ 13] Computer Forensics compressed, FAT 12/16/32, and Linux
creating a digital signature, and a public ext2 & ext3. Supported image formats
key for verifying the digital signature. by creating custom file filters; (2) E-mail include: Encase, SMART, Snapback,
(Section 1[a], Rule 2, Rules on & Zip File Analysis, which includes (a) Safeback (up to but not including v.3),
support for Outlook, Outlook Express, and Linux DD. See http://
Electronic Evidence) AOL, Netscape, Yahoo, Earthlink, www.accessdata.com/
Eudora, Hotmail, and MSN e-mail, (b)
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

4. Computer Forensics. Wikipedia, the free


“Key Pair ” in an asymmetric viewing, searching, printing, and encyclopedia. http://en.wikipedia.org/
cryptosystem refers to the private key exporting e-mail messages and wiki/Computer_forensics
and its mathematically related public attachments, (c) Recover deleted and 5. Computer Forensics. DIBS USA Inc.
partially deleted e-mail, and (d) http://www.dibsusa.com/methodology/
key such that the latter can verify the Automatically extract data from PKZIP,
digital signature that the former methodology.html
WinZip, WinRAR, GZIP, and TAR 6. Hacking is taken herein in its general
creates. (Section 1[m], Rule 2, Rules compressed files; (3) Known File Filter™ and legal, and not technical, meaning.
on Electronic Evidence) (KFF™), which (a) Identify and flag 7. The Rules of Electronic Evidence, A. M.
standard operating system and program No. 01-7-01-SC, approved by the
files, (b) Identify and flag known child Supreme Court En Banc on 20 July 2001.
“Private Key” refers to the key of a pornography and other potential
key pair used to create a digital For an outline of the Rules, see Volume
evidence files, (c) Includes hash datasets 1, Issue 1, page 7 of the Philippine
signature. (Section 1[n], Rule 2, Rules from NIST and Hashkeeper; and (4) Quarterly IT Law Journal.
on Electronic Evidence) Registry Viewer™, which (a) Access and 8. An example online tool is available at
decrypt protected storage data, (b) View Anti-fraud.com. See http://
independent registry files, (c) Report
“Public Key” refers to the key of a generation, and (d)Integrates with
www.antifraud.com/ipcheck.htm
key pair used to verify a digital AccessData's forensic Tools. Supported
signature. (Section 1[o], Rule 2, Rules File formats include NTFS, NTFS
on Electronic Evidence)

64
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
<< [19]P2P: Pirate to Pirate << [10]Modernization of the Courts of Appeals Multi-Purpose Building. The
most popular video compression unserviceable properties are being building stands on a lot belonging to
technology. At its core, DivX is a codec the Court of Appeals but built with funds
made in accordance with rules of the
(short for compression/decompression)
- a piece of software that compresses Commission on Audit. The Court is also supplied by the Supreme Court.
video from virtually any source down to disposing of old, bulky records of cases
a size that is transportable over the that have long been terminated and In order to avoid expensive rentals
Internet without reducing the original during summer sessions in Baguio City,
records of personnel who had long
video’s visual quality. What is DivX?
DivXNetworks, Inc. http:// retired. the Court built additional two cottages
www.divx.com/divx/whatisdivx.php and a duplex adjacent to the SC offices.
5 A “denial-of-service” attack is The most ambitious infrastructure The two cottages are for the 14th and
characterized by an explicit attempt by 15th Members of the Court, while the
project undertaken by the Supreme
attackers to prevent legitimate users of
a service from using that service. Court started in 1999 when it began duplex are for the court staff scheduled
Examples include (1) attempts to “flood” the construction of the Centennial during summer sessions.
a network, thereby preventing legitimate Building, a modern edifice at the corner
network traffic, (2) attempts to disrupt At more than 100, the Supreme Court
of Taft Avenue and Padre Faura
connections between two machines,
thereby preventing access to a service, Streets. The building has seven floors. is a combination of old and new,
(3) attempts to prevent a particular The foundation and its shell structure conservative but avantgrade. While in
individual from accessing a service, and was completed in 2001. Immediately the exercise of its judicial power, it
(4) attempts to disrupt service to a always considers the trodden path since
thereafter, its Interior-Fit-out started
specific system or person. CERT/CC
Denial of Service. CERT Coordination and was finished in May 2002. The precedents represent the wisdom of
Center, Software Engineering Institute, Supreme Court Centennial Building the past, it is not averse to explore new
Carnegie Mellon University. http:// now houses the judicial and Bar avenues in search of the truth. Old
w w w. c e r t . o r g / t e c h _ t i p s / management schemes and practices
Council, the PHILJA (Manila Office),
denial_of_service.html
6 Peer-to-Peer Research at Stanford. the SC Administrative Offices, the that have stood the test of time continue
Mayank Bawa, Brian F. Cooper, Arturo Office of the Chief Attorney, the Office to be used but the dysfunctional aspects
Crespo, Neil Daswani, Prasanna of the Reporter, the Program of the system are being discarded.
Ganesan, Hector Garcia-Molina, Accordingly, the Office of the Court
Management Office, the Committee
Sepandar Kamvar, Sergio Marti, Mario
Schlosser, Qi Sun, Patrick Vinograd, on Halls of Justice, and the Presidential Administrator has undergone a
Beverly Yang of the Computer Science Electoral Tribunal. massive reorganization to improve the
Department, Stanford University. http:/ management climate of the Judiciary.
/dbpubs.stanford.edu:8090/pub/ Receptive of new ideas and ever
The need for parking spaces and
showDoc.Fulltext?lang=en&doc=2003-
38&format=pdf&compression= additional office, prompted the Court willing to initiate new procedures, the
to embark on another construction Supreme Court continues to cope with
project, i.e., the Supreme Court, Court the realities of modern society.

<< [ 11] SC E-Library << [68] On Officers and Members << [ 68] Lager Night

The e-library also contains executive Prado, John Ivan Tablizo, John Michael each month, benefiting regular or
issuances. Other references such as Timbre, and Marc Villanueva. weekday students. The Lager Night,
Benchbooks, Journals Catalogues and Additional members are expected to starting school year 2005-2006, will
Index are likewise available. Lex libris be included further at the advent of be held alternately on a Friday in one
is also accessible through the the next semester from pending month and on a Saturday in the next
‘members only site.’ applications and subsequent month.
recruitment.
A special site of the e-library, the The Society would like to extend its
Memorabilia Room is devoted to the Most incumbent officers are incoming gratitude to the School Administration
Honorable Justices of the Supreme fourth year students enrolled in the under Dean Mariano Magsalin Jr. for
Court from the first Chief Justice to the four-year regular program. Among providing this opportunity for student-
newly-appointed Associate Justices. the Society’s officers and members, faculty interaction; Mr. Florentino
This section contains the picture, brief Cortez, Guerrero, Lock, Ocampo- Cayco III for his generosity; the various
biography, decisions and articles, Guerrero, Ramos, and Reyes are staff members of the Dean’s Office,
speeches by and about each Justices. members of the Order of the Flaming the IT Center, and Maintenance
Arrows, the school’s organization of Department in facilitating the Society’s
The Supreme Court e-Library may be honor students. requests, whether pertaining to
accessed through http:// paperwork, audio-visual equipment, or
www.supremecourt.gov.ph/Web- venue maintenance.
Library/home.htm

65
LegalWeb

WWW.SEC.GOV.PH: MAKING THE PUBLIC MORE SECURE


by Ma. Cristina A. Ramos

This section is a continuing series of articles and concluded public consultations Philippines. However, the fact that a
featuring various websites which may be
while ‘Publication’ provides access to certain corporate or partnership name
relevant to legal practitioners, legal

A researchers, and law students.


the SEC primer on IAS, SEC in the is indeed registered with the SEC is
News, Citizen’s Manual and Philippines not an assurance that the identified
dapting to 5000. corporation is authorized to sell to the
the needs of the changing times, the public securities or other investment
Securities and Exchange Commission Online Transactions instruments.
(SEC) maximizes the benefits of
Internet technology by making By using information technology, the SEC-iRegister
information available online and by SEC offered a solution to the
offering online transactions. The SEC bureaucratic red tape usually Probably the most valuable service that
is now one of the most advanced associated with transactions with the SEC offers is the SEC-iRegister. It
agencies of the government in terms government. People who want to is a web-based company registration
of compliance with the mandate of transact with the SEC can now avoid system of the SEC. The commission
Republic Act no. 8792 or the Electronic the slow moving traffic along EDSA. describes this service as ‘quick,
Commerce Act. Moreover, they do not have to fall in affordable, and user-friendly.’ It is
line and spend the whole day falling available to the public 24 hours a day,
The SEC’s website, following a in line or waiting for their names to be seven days a week.
functionalist design, provides on its called inside the SEC’s office, and then
main menu well- classified submenus wait another week to get results. Now, SEC-iRegister allows SEC’s clients to
for easier access. The menu consists people can do business with the SEC do the following online:
of ‘Main,’ ‘Online Transactions,’ through the computer any time of the
‘What`s New,’ ‘Investor Info,’ ‘About day. · Verify the availability of the desired
SEC,’ ‘Archives,’ ‘Publications’ and name for corporation or
‘Downloads.’ ‘Main’ provides the Transactions that usually take a day or partnership;
access to the html files of the Securities two, or even a week, can now be · Reserve the verified name;
Regulation Code (Republic Act No. finished in just several clicks of the · Accomplish and print the
8799), its implementing rules and mouse. For example, prospective registration from online without
regulations, as well as memorandum registrants of corporations or the need to buy the SEC forms;
circulars and notices issued by the SEC. partnerships who want to find out · On-line registration of business
whether their desired corporate or organizations, whether a stock or
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

Basic information about the partnership name are still available can non-stock corporation or a
commission is found in ‘About SEC.’ do it in just two mouse clicks. They general, limited, or professional
This section provides information on simply have to visit the website of the partnership;
the accomplishment, history, SEC, click ‘Search Reserved/Registered · Deposit the paid-up capital online;
management, mission and vision, Companies’ under ‘Online · Pay the appropriate registration
organizational setup, powers and Transactions,’ enter the desired fees online, and;
functions, location and directors of the corporate or partnership name in the · Receive notice of approval within
SEC. It also has a link to a separate space provided, and press enter. the same day.
site of one of the offices of the SEC,
the compliance and enforcement Another online service that the SEC This facility has been made available
department. website offers is the ‘Search for to the public even before June 30,
Registered Names.’ This facility allows 2002, the deadline set by RA 8792,
‘Archives’ meanwhile contains market a person to know whether or not a otherwise known as the E-Commerce
reports, other circulars, speeches, IT- given corporation or partnership is Act. At present, the SEC uses version
related materials, seminars, registered with the SEC in accordance 2 of the SEC i-Register system, an
announcements, examination results, with the Corporation Code of the enhanced version of the original I-

66
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1
Register system. The new version has The list of market participants, as posted · Formula for Determination of
the following features: in the SEC’s website, are classified as Reserve Requirements 1of Broker
follows: Dealers Under SRC Rule 49.2-1
· Enhanced Name Verification. This · Explanation of Books and Records
feature provides for a list of · Broker/Dealer (PSE Trading Rule
reserved and registered Participants) · Customer Account Information
companies that is similar to a · Investment Company Adviser Form
proposed company or partnership · Transfer Agent
name. · Other Market
· Cancel Reservation Facility. This Participants
allows the user to change his · Investment
reserved company name. The Houses -
client only has to cancel the Associated
reserved company name and Person
reserve a new one again. · Investment
· Endorsement Listing. For the Houses
guidance of the public, a list of · Underwriter of
selected industries that require Securities
endorsement from government · Dealers in
agencies is provided. Government
· Search Industry. This feature Securities.
makes the selection of industry
easier and faster. However, in the
matter of registered
For easier computation of fees, the site entities, the SEC made it clear that the
also provides an online calculator. inclusion of any company in the list Forms that are available for sale in
does not mean that any or all of those the SEC are now downloadable for
Public Beware listed is being endorsed by the SEC to free. This can be found under the
solicit, take, receive, or hold menu ‘Downloads.’ Some of the forms
For public safety and convenience, the investments from the public. According available for download are the
SEC provided in its website, under the to the SEC, the decision of anyone to following:
menu ‘Investor Info,’ the following: place one’s investment on any
SEC Advisory, SEC Orders, Settlement company in whatever form is an · Notice of Exempt Transaction
Offers, Companies with Cease and individual decision based on one’s own · Application for Confirmation
Desist Order, and Corporations with judgment Thus, SEC suggests that · Registration Statement Under the
Revoked Certificate of Registration. anyone interested to invest in any of Securities Regulation Code
The link to corporations with revoked the companies listed herein or in any · Annual Report
certificates of registration is available other company should study all publicly · Current Report
from 8 am to 9 pm Monday through available materials that have been · Notification of Suspension of Duty
Friday except holidays. All the lists are issued by the company following the to File Reports
in PDF files. The lists of companies that full disclosure principle. · Tender Offer Report
have CDOs issued against them or · Proxy Statement
CDOs that became permanent after Downloadable Annexes and · Initial Statement of Beneficial
the effectivity of the SRC are likewise Forms Ownership of Securities
available from 8 am to 9 pm Monday · Statement Of Changes In
through Friday except during holidays. The site also offers downloadable Beneficial Ownership Of Securities
The files are downloadable in PDF annexes and forms. The following are · Application For Registration as a
format. some of the annexes in zip files that Salesman or Associated Person of
are available for download. a Broker Dealer and Amendments
More on Investor’s Info · Registration of Securities Thereto
· Definition of Terms Used In Full · Application for Broker Dealer
The website also provides listings of Disclosure Forms Registration Renewal
registered entities, market participants, · Non-Financial Disclosure · Application for Registration
and issuers of registered commercial Requirements Renewal of Investment Houses,
papers/bonds, equity securities, and · Information Relating to Possession Underwriters of Securities and
securities to the public. or Control Requirements Under Government Securities Eligible
SRC Rule 49.2-1 Dealers

67
The Center and the Society

IT LAW SOCIETY-SPONSORED ON IT LAW SOCIETY


LAGER NIGHT HELD OFFICERS AND
by Peter Joseph L. Fauni
MEMBERS

O n 5 February 2005, the IT


Law Society sponsored the schoolwide
Lager Night. It serves as an opportunity
to foster closer relationship between
law students and law professors, and
is a welcome breather to law students
in light of the rigors of law studies.

The February 2005 Lager Night


between faculty members and

T
students, and for the more courageous
ones, attempts to exhibit their singing
prowess using the videoke machine. It
was held at the College garden fronting
Donada street.

The Lager Night is a project initiated


by the Dean’s Office, with the Office
he IT Law Society,
which was established on 10 January
2004, maintained its roster of officers
for the next school year. Michael
Vernon M. Guerrero remained as
President, Carlyn Marie Bernadette C.
Ocampo-Guerrero as secretary, Ailyn
L. Cortez as Treasurer, Peter Joseph
L. Fauni as Publication chairperson and
provided an opportunity to make the of the College Secretary having an Ma. Cristina A. Ramos as Research and
Society visible to the studentry, and to active participation in its Seminars chairperson. Jhonelle S.
show a wholly different side to its conceptualization and initial Estrada was installed as Vice President
normal serious self. The event also implementation. The project, or event, for the Society during the middle of
served as an avenue to announce the was first implemented during the start school year 2004-2005 and shall
creation of the Bar Operations of the school year 2004-2005, and it continue in such capacity. Mary Ann
Commission for the 2005 Bar Exams is sponsored by a different school- L. Reyes has been installed as the
in September, by the Continuing Legal accredited student organization every Journal’s Editor-in-Chief.
Education and Research (CLEAR) month. It is the first time that the event
office, and solicit involvement from was held on a Saturday to benefit The incumbent officers, however, are
students subsequent thereto. The event Executive students, or students who are in the process of promulgating the
was marked by spirited discussions enrolled in the weekend study Society’s Constitution and By-laws,
between students from various program. The event has been held which would effectively streamline the
batches, on academic topics or previously during the last Friday of structure of the organization. Among
otherwise, casual conversations >> [65] Lager Night the changes expected are: (1) the
position of the Vice-President and the
chairperson for the Publication
IT LAW JOURNAL WELCOMES Committee being combined in the
person of the Journal’s Editor-in-Chief,
NEW EDITOR-IN-CHIEF (2) the position of Chairperson for the
Website Committee being integrated
Mary Ann L. Reyes is a Business to the position of Public Relations
The Philippine Quarterly IT Law Journal :: Volume 2, Number 1

columnist of the Philippine Star, one Officer, and (3) the positions of

T he e-Law
Center and the IT Law Society have
been active in sourcing talents among
law students in the Arellano University
School of Law, especially those
oriented to journalism. As part of the
constant effor for improvement of the
IT Law Journal, the individuals behind
it endeavor to develop an optimized
of the major daily newspapers in the
Philippines. She is the editor of the Real
Estate Section and also the
Telecommunincations and IT Reporter
of the said newspaper. She is an
incoming fourth year student of the
Arellano University School of Law,
enrolled in the five-year executive
program, and is currently the Vice-
President of the Order of the Flaming
chairperson for Research and
Seminars Committee and chairperson
for Advocacy Committee being
combined into the position of
chairperson for Research and
Advocacy Committee and integrated
to the position of Auditor.

Neophyte members, on the other


hand, have been introduced into the
production system for the publication, Arrows, the school’s organization of Society during the last semester. Among
the first step being the installation of a honor students. She holds a degree in these are Katherine Austria, Ma.
formal editorial board. As a token step BS Math and a Masters degree in Theresa Japos, Chalyz Odessa
towards that direction, the IT Law Business Administation from the Lagdameo, Roberto Lock, Cristine
Journal welcomes its new Editor-in- University of the Philippines (Diliman
Chief, Mary Ann L. Reyes. campus). >> [65] On Officers and Members

68

Anda mungkin juga menyukai