SCOPE AND LIMITATIONS OF COPYRIGHT UNDER PHILIPPINE LAW AND JURISPRUDENCE, IN RELATION TO WORKS ON THE INTERNET

DISCLAIMER: This article is for academic purposes only, as a requirement for the subject Technology and the Law AUSL Summer 2015.

Introduction

As we all know, writers, musicians, artists and the like, put hard work, dedication, time and effort, not to mention countless failures and rejection, just to perfect their craft. Imagine a world without protection to their works. Every work they make can be used and utilized by another without their consent. Others may even derive profit from them. All their hard work may be put to waste because they may not even be acknowledged and recognized for their work. A world without these rights is a world without their works. The lack of protection will discourage the advancement and creation of literary and artistic works.

 

The state recognizes this need and the vital role of intellectual creation in our society and through the enactment of Republic Act 8293 or the Intellectual Property Code, it aims to strengthen intellectual creation and encourage derivative works and literary and artistic creations.

 

Intellectual creation is one of the modes of acquiring ownership, as provided in the Civil Code. It is where the creations or products of one’s mind or intellect such as writings, musical compositions, artistic creations, discoveries, and inventions become his exclusive property, giving him the right to authorize or refuse the publication or production of such creations or products.

 

On the other hand, intellectual property refers to the totality of all the rights which the law recognizes in favor of the author, composer, painter, artist, scientist, or any other person with respect to the creations or product of his intellect, and consists of principally, in his right to authorize or refuse the publication or production of such creations or products.[i]

 

This intellectual property rights includes copyrights, trademarks, patents, lay-out design, geographical indications, protection of undisclosed information.

 

Nowadays, aside from the traditional means of creation, authors have also been using the internet as a medium to share their creations to the public.

 

This paper will focus on the scope and limitation of copyright under Philippine law and jurisprudence, in relation to works on the internet. However, the Intellectual Property Code does not distinguish the medium used by the author. Therefore, the provisions of the Code applies also to works on the internet.

 

Copyright

Copyright as defined in Kho vs. Court of Appeals[ii], is the right over literary and artistic works which are original intellectual creations in the literary and artistic domain protected from the moment of creation.

 

Even before the author or composer has published the work, he is already the owner of the creation. However, to protect his right, he must ask for a copyright if he intends the work to be published. Unless the copyright is obtained, the ownership by him will be lost. Mere circulation among close friends and associates is not considered publication.[iii]

 

Copyright is one of the intellectual properties. It is a right granted by statute to the author or originator of literary, scholarly, scientific, or artistic productions, including computer programs. A copyright gives him the legal right to determine how the work is used and to obtain the economic benefits from the work. For example, the owner of a copyright for a book or a piece of software has the exclusive rights to use, copy, distribute, and sell copies of the work, including later editions or versions of the work. If another person improperly uses material covered by a copyright, the copyright owner can obtain legal relief.[iv]

 

Copyright symbol is represented by ©.

 

Copyright is conferred from the moment of creation. The work is deemed created if something original is expressed in a fixed manner. The author, the composer, the painter, the sculptor or other artists, the scientists and the inventors acquire ownership over their works from the moment of their creation even before the same are published, copyrighted or patented. Being the owner thereof, the creator has absolute control over his work and he may do anything with it as he pleases, including the right to share it with others. He also enjoys the exclusive right to its publication but this exclusive right is limited only to the first publication. Unless placed under the protection of the Copyright Law, once published, the work is dedicated to the public, and the author loses the exclusive right to control subsequent publications by others.[v]

 

Through copyright, the state confers rights to creators and inventors of such product or creation as well as the publisher if he shall be different from such creator.

 

One of the rights granted is economic rights, which consists of the exclusive right to carry out, authorize or prevent reproduction of the work or substantial portion of the work; dramatization, translation, adaptation, abridgement, arrangement or other transformation of the work; first public distribution of the original and each copy of the work; rental of the original or a copy of an audio-visual or cinematographic work; public display of the original or a copy of the work; public performance of the work; and other communication to the public of the work.[vi]

 

Moral rights of the creator of the copyrighted product is also recognized. It requires that the authorship of the works be attributed to him, in a prominent way on the copies, and with the public use of the work; make alterations of his work prior to, or to withhold it from publication; object to any distortion, mutilation, or other modification of, or other derogatory action in relation to, his work which would be prejudicial to his honor or reputation; and retrain the use of his name with respect to any work not of his creation or in a distorted version of his work.[vii]

 

Whenever the publisher is different from the author or the creator, they are also given specific rights under the Intellectual Property Code. This includes the right to publish granted by the author, his heirs, or assigns; the publisher shall have a copyright consisting merely of the right of reproduction of the typographical arrangement of the published edition of the work[viii]; if submitted to a newspaper, magazine and the like, the right to publish once materials sent by a writer, a photographer, an artist to a periodical or newspaper publisher, but such writer or artist retains his copyright on the piece.[ix]

 

Intellectual Property Law and Intellectual Property Office

To facilitate in recognizing and enforcing rights of creators of literary and artistic works, the Republic Act 8293 was enacted otherwise known as the Intellectual Property Code.

                                                               

Pursuant to the enactment of Intellectual Property Code, the Intellectual Property Office was created. It is the lead agency tasked with the registration and conflict resolution with regard to intellectual property rights, which includes copyright and related rights, trademarks and service marks, geographic indications, industrial designs, patents, layout-design (topographies) of integrated circuits, and protection of undisclosed information.

 

Scope

The term “copyright,” though famous among artists and authors, are not easily understood by the layman. Though some may know what it means, people are not that aware of the scope of copyright in the Philippines.

 

Copyrightable Objects

Creations and products that can be conferred with copyright are generally classified into 2. These are Literary and Artistic Works as well as Derivative Works,

 

Literary and Artistic Works include (a) Books, pamphlets, articles and other writings; (b) Periodicals and newspapers; (c) Lectures, sermons, addresses, dissertations prepared for oral delivery, whether or not reduced in writing or other material form; (d) Letters; (e) Dramatic or dramatico-musical compositions; choreographic works or entertainment in dumb shows; (f) Musical compositions, with or without words; (g) Works of drawing, painting, architecture, sculpture, engraving, lithography or other works of art; models or designs for works of art; (h) Original ornamental designs or models for articles of manufacture, whether or not registrable as an industrial design, and other works of applied art; (i) Illustrations, maps, plans, sketches, charts and three-dimensional works relative to geography, topography, architecture or science; (j) Drawings or plastic works of a scientific or technical character; (k) Photographic works including works produced by a process analogous to photography; lantern slides; (l) Audiovisual works and cinematographic works and works produced by a process analogous to cinematography or any process for making audio-visual recordings; (m) Pictorial illustrations and advertisements; (n) Computer programs; and (o) Other literary, scholarly, scientific and artistic works. Works are also protected by the sole fact of their creation, irrespective of their mode or form of expression, as well as of their content, quality and purpose.[x]

 

The other class of copyrightable object is the derivate works. According to Section 173.1 of the Intellectual Property Code, derivative work includes (a) Dramatizations, translations, adaptations, abridgments, arrangements, and other alterations of literary or artistic works; and (b) Collections of literary, scholarly or artistic works, and compilations of data and other materials which are original by reason of the selection or coordination or arrangement of their contents.

 

Unprotected Works

Not all those who claim to have created a literary, artistic or derivative work may be afforded copyright. It must be defined in accordance to the intent of the framers of the Intellectual Property Code, which also stated those objects which are not copyrightable.

 

Section 175 states that unprotected works includes any idea, procedure, system, method or operation, concept, principle, discovery or mere data as such even if they are expressed, explained, illustrated or embodied in a work. News of the day and other miscellaneous facts having the character if mere items of press formation are also not copyrightable as well as any official text of a legislative, administrative or legal nature as well as any official translation thereof.

 

Any work of the government of the Philippines may not be copyrighted. However, prior approval of the government agency or office wherein the work is created shall be necessary for exploitation of such work for profit. Such agency or office may, among other things, impose as a condition the payment of royalties. No prior approval or conditions shall be required for the use of any purpose of statuses, rules and regulations and speeches, lectures, sermons addresses and dissertations, pronounced, read or rendered in courts of justice, before administrative agencies, in deliberative assemblies and in meetings of public charter.[xi]

 

Those works that are proper subjects of trademark cannot come under the protection of copyright.

 

Fair Use

The fair use of a copyrighted work for criticism, comment, news reporting, teaching including multiple copies for classroom use, scholarship, research, and similar purposes is not an infringement of copyright. “Fair Use” means that a copyrighted work may be used by people other than the author as long as it is within the provisions of the law. Decompilation, which is understood to be the reproduction of the code and translation of the forms of the computer program to achieve the inter-operability of an independently created computer program with other programs may also constitute fair use. In determining whether the use made of a work in any particular case is fair use, the factors to be considered shall include: (a) The purpose and character of the use, including whether such use is of a commercial nature or is for non-profit educational purposes; (b) The nature of the copyrighted work; (c) The amount and substantiality of the portion used in relation to the copyrighted work as a whole; and (d) The effect of the use upon the potential market for or value of the copyrighted work.[xii] The fact that a work is unpublished shall not by itself bar a finding of fair use if such finding is made upon consideration of all the above factors.

 

Copyright Infringement Cases

In Habana vs. Robles[xiii], the Supreme Court ruled that if so much is taken that the value of the original work is substantially diminished, there is an infringement of copyright and to an injurious extent, the work is appropriated. Jurisprudence also stated that to constitute infringement, it is not necessary that the whole or even a large portion of the work shall have been copied.

 

It bears stressing that the focus of copyright is the usefulness of the artistic design, and not its marketability. The central inquiry is whether the article is a work of art. Works for applied art include all original pictorials, graphics, and sculptural works that are intended to be or have been embodied in useful article regardless of factors such as mass production, commercial exploitation, and the potential availability of design patent protection. While works of applied art, original intellectual, literary and artistic works are copyrightable, useful articles and works of industrial design are not. A useful article may be copyrightable only if and only to the extent that such design incorporates pictorial, graphic, or sculptural features that can be identified separately from, and are capable of existing independently of the utilitarian aspects of the article.[xiv]

 

Copyright, in the strict sense of the term, is purely a statutory right. Being a mere statutory grant, the rights are limited to what the statute confers. It may be obtained and enjoyed only with respect to the subjects and by the persons, and on terms and conditions specified in the statute. Accordingly, it can cover only the works falling within the statutory enumeration or description. To be entitled to copyright, the thing being copyrighted must be original, created by the author through his own skill, labor and judgment, without directly copying or evasively imitating the work of another.

 

In cases of infringement, since the copyright owner is protected by the law, he can enforce his right through injunction to prevent infringement, action for damages, and criminal case for infringement.

 

There have already been numerous copyright infringement cases in the Philippines related to the internet and media, some of which are:

 

The first time that a case on copyright infringement on the internet was initiated was in 2008 when photographer Anton Sheker filed a case against Manila Bulletin for allegedly infringing on his copyright by downloading photos from his personal blog without her permission.[xv]

 

In 2010, ABS-CBN filed a P127 million copyright infringement case against Willie Revillame, WilProductions Inc., and ABC5 (now TV5) citing Section 172.2(1) of the Intellectual Property Code. The network alleged that they were the legal owner of the copyright over every one of the Wowowee episodes and that Revillame’s new show Willing Willie deliberately imitated the former show to steal the goodwill that Wowowee has built. [xvi]

 

The Court of Appeals ruled in favor of GMA Network in a copyright infringement case against ABS-CBN in 2010 with regard to Angelo dela Cruz’s homecoming video. ABS-CBN claimed that GMA stole their live feed, which was actually taken from Reuters Television Service, where GMA had a subscription contract for videos.[xvii]

La Concepcion College Bulacan was ordered by the Intellectual Property Office (IPO) to pay author and publisher Raymund Sta, Maria Catabijan P608,450 as damages for copyright infringement. Catabijan submitted pieces of evidence to the IPO, which found the school guilty of copying his workbooks and selling reproductions to its students. La Concepcion College was also ordered to cease from publishing, selling, and distributing the books that contained the copied materials.[xviii]

 

Limitations of Copyright

Rights conferred to owners of copyright is not absolute and is coupled with certain limitations.

 

Ownership

There are different rules to consider as to ownership of a copyrightable work. Certain rules can assign the copyright to another person regardless of your authorship of such work.

 

Whenever there is only one creator, it is he, his heirs or assigns who owns the copyright. An assignee is a person to whom an author may assign copyright in whole or in part. The assignee is entitled to all the rights and remedies which the assignor has with respect to the copyright. Therefore, with regard to literary, dramatic, historical, legal, philosophical, scientific or other work, it is the author who owns the copyright. With regard to musical composition, it is the composer. With regard to product of art, it is the painter, sculptor, or other artist. With regard to discovery or invention, it is the scientist or technologist.[xix]

Letters and other private communications in writing are owned by the person to whom they are addressed and delivered, but they cannot be published or disseminated without the consent of the writer or his heirs.[xx]

 

Whenever a creation is produced or created jointly, co-authors shall be the original owners of the copyright and in the absence of agreement, their rights shall be governed by the rules of co-ownership except when their work consists of parts that can be used separately and the author of each part can be identified. In that case, the author of each part shall be the original owner of the copyright in the part that he has created.

 

With regard to audio-visual work, the producer owns the copyright for purposes of exhibition but for all other purposes, the producer, the author of the scenario, the composer, the film director, the photographic director and the author of the work are the owners.

 

In cases where the work is commissioned, the person commissioning owns the work however, the ownership of copyright remains with the creator unless there is a written stipulation to the contrary.

 

If the creation is produced during the course of an employment and it is the result of regular functions or duties of the employee, it is the employer who owns the copyright.

 

In cases where the author is unknown, the publisher is the presumed representative of the author.[xxi]

 

Ownership can be considered as a limitation because these rules, such as that of the employer-employee, may discourage persons from the creation of their work worthy of copyright.

 

Duration

Another limitation would be the duration of copyright protection. The duration depends on the kind of copyrightable work involved.

 

In cases of literary artistic works and derivative works, only during the lifetime of the creator and fifty years after his death. When a creation is jointly created, the economic rights shall be protected during the life of the last surviving author and for fifty years after the death of the last surviving author. Whenever the author is unknown, till the end of fifty years, following the date of their first publication. The fifty years commences from January 1 following the date of publication. In cases of work of applied art of an artistic creation with utilitarian functions or incorporated in a useful article, whether by made by hand or produced on an industrial scale, twenty-five years. For photographic works, fifty years from the publication of the work, or from making, if unpublished. The same term is given to audio-visual works produced by photography or analogous process. In cases of broadcasts, twenty years from the day of broadcast.[xxii]

 

An amendment to the Intellectual Property Code by Republic Act 10372, now protects the right of attribution during the lifetime of the author and in perpetuity.

 

Acts not Infringement

Another limitation to copyright would be those under Section 184, which enumerates the acts which do not constitute infringement of copyright. The Intellectual Property Code allows the work to be used in a manner which does not conflict with the normal exploitation of the work and does not unreasonably prejudice the right holder’s legitimate interests. These includes (a) recitation or performance of a work, once it has been lawfully made accessible to the public, if done privately and free of charge or if made strictly for a charitable or religious institution or society; (b) The making of quotations from a published work if they are compatible with fair use and only to the extent justified for the purpose, including quotations from newspaper articles and periodicals in the form of press summaries: Provided, That the source and the name of the author, if appearing on the work, are mentioned; (c) The reproduction or communication to the public by mass media of articles on current political, social, economic, scientific or religious topic, lectures, addresses and other works of the same nature, which are delivered in public if such use is for information purposes and has not been expressly reserved: Provided, That the source is clearly indicated; (d) The reproduction and communication to the public of literary, scientific or artistic works as part of reports of current events by means of photography, cinematography or broadcasting to the extent necessary for the purpose; (e) The inclusion of a work in a publication, broadcast, or other communication to the public, sound recording or film, if such inclusion is made by way of illustration for teaching purposes and is compatible with fair use: Provided, That the source and of the name of the author, if appearing in the work, are mentioned; (f) The recording made in schools, universities, or educational institutions of a work included in a broadcast for the use of such schools, universities or educational institutions: Provided, That such recording must be deleted within a reasonable period after they were first broadcast: Provided, further, That such recording may not be made from audiovisual works which are part of the general cinema repertoire of feature films except for brief excerpts of the work; (g) The making of ephemeral recordings by a broadcasting organization by means of its own facilities and for use in its own broadcast; (h) The use made of a work by or under the direction or control of the Government, by the National Library or by educational, scientific or professional institutions where such use is in the public interest and is compatible with fair use; (i) The public performance or the communication to the public of a work, in a place where no admission fee is charged in respect of such public performance or communication, by a club or institution for charitable or educational purpose only, whose aim is not profit making, subject to such other limitations as may be provided in the Regulations; (j) Public display of the original or a copy of the work not made by means of a film, slide, television image or otherwise on screen or by means of any other device or process: Provided, That either the work has been published, or, that the original or the copy displayed has been sold, given away or otherwise transferred to another person by the author or his successor in title; and (k) Any use made of a work for the purpose of any judicial proceedings or for the giving of professional advice by a legal practitioner.

 

With the enumeration under Section 184, it is to be understood that an author cannot exclude everybody else from the use of his/her work. Reproduction of work can be in such a way as not to constitute infringement of the copyright. The author cannot deprive the public from using his/her work if it be within the ambit of what is allowed by law.

 

Conclusion

The Intellectual Property Code aims to encourage artists to develop and share their work to others. People should see the law as a vessel to transport ideas into reality. Authors should be encouraged and supported in their craft in order for the public to also benefit from the hard work and dedication they put into their work. As authors, awareness of the scope and limitations of copyright provided by law is a must. These rules will serve as a path of light to know the rights attributable to authors and to be able to get the acknowledgment, compensation and recognition they deserve.

 

The medium in which a copyrightable work is posted, published or creation does not qualify its protection. Works on the internet are to be regarded on the same level as those published or created on other means or methods.

 

Sources:

 

[i] De Leon, Hector. Comments and Cases on Property. Rex Book Store. 2006, p. 594.

[ii] G.R. No. 115758, March 19, 2002.

[iii] Paras, Edgardo. Civil Code of the Philippines Annotated. Rex Book Store. 2008, p. 796.

[iv] Ibid.

[v] Santos v. McCullough Printing Co., 12 SCRA 321 (1964); Filipino Society of Composers, Authors and Publishers, Inc. v. Tan, 148 SCRA 461 (1987).

[vi] Republic Act No. 8293 (1997) Sec. 177.

[vii] Republic Act No. 8293 (1997) Sec. 193.

[viii] Republic Act No. 8293 (1997) Sec. 174.

[ix] Republic Act No. 8293 (1997) Sec. 180.

[x] Republic Act No. 8293 (1997) Sec. 172.1,172.2.

[xi] Republic Act No. 8293 (1997) Sec. 175.

[xii] Republic Act No. 8293 (1997) Sec. 185.

[xiii] G.R. No. 131522, July 19, 1999.

[xiv] Ching vs. Salinas, Sr. G.R. No. 161295. June 29, 2005.

[xv] http://www.gmanetwork.com/news/story/100560/lifestyle/photog-sues-manila-bulletin-for-copyright-infringement. Accessed July 19, 2015

[xvi] http://www.abs-cbnnews.com/entertainment/11/25/10/abs-cbn-files-p127-m-copyright-case-vs-willing-willie. Accessed July 19, 2015.

[xvii] http://www.gmanetwork.com/news/story/206354/news/nation/ca-favors-gma-in-copyright-violation-case-filed-by-abs-cbn. Accessed July 19, 2015.

[xviii] http://newsbytes.ph/2014/11/08/bulacan-school-ordered-to-pay-p608450-for-copyright-infringement. Accessed July 19, 2015.

[xix] Civil Code, Art. 721.

[xx] Civil Code, Art. 723.

[xxi] Intellectual Property Code, RA 8293. Section 178, 179.

[xxii] Intellectual Property Code, RA 8293. Section 213, 214.

THE SCOPE OF PRIVACY IN A DIGITAL WORLD UNDER PHILIPPINE LAW AND JURISPRUDENCE

DISCLAIMER: This article is for academic purposes only as a requirement for the subject Technology and the Law AUSL Summer 2015.

Privacy in the Digital World

Introduction

We are now in the digital age. Information has been moving freely and quickly like never before. Internet use has been widespread all across the globe. In 2014, the number of internet users were approximately 2,925,249,355 or 40.4 percent of the total world population.[i] Having full access to the cyber world, most people nowadays cannot go on a day without its use – from checking Facebook and Twitter, to posting pictures on Instagram, to navigating through traffic with the help of Waze, or even booking a hotel room through Agoda. Social connections have also tremendously improved because distance is not an issue anymore. With just a click of a button, you can connect with family and friends anywhere in the world, even those you haven’t seen in a long time or those you haven’t even met before. Affordability and availability of information and communication technology has also made everything possible. Even visit to banks can be avoided since online banking can already be done. Online shopping is also popular nowadays for people who don’t have time to go to the mall. Students can search on the internet instead of visiting libraries to look for information relevant to their researches. A lot has changed since we entered the digital age, and it indeed has its own share of pros and cons.

In our country, internet use has been continuously increasing. According to statistics from The Global Web Index, our country has the fastest growing internet population in the world, experiencing 531 percent growth in the last five years.[ii] The Internet Mobile Marketing Association of the Philippines (IMMAP) also released a statement that the number of Philippine internet users as of mid-2014 is 38 million out of the 100 million population by mid-2014.[iii] It is said to further increase due to the falling costs of internet access and devices available to the public.

As the access to cyberspace has been growing rampantly, so are the issues and problems that come along with the widespread internet use, such as cybersex, internet forgery and fraud, online shopping and networking scams, identity theft, and online child pornography to name a few. One issue that most people fail to recognize is the risk to their privacy.

Internet users have been too at ease and comfortable being on the other side of the screen that they fail to recognize the privacy risks they are putting themselves into.

 

Privacy and Privacy Risks

The Merriem Webster Dictionary defined privacy as the state of being away from public attention; the state of being away from other people; and the freedom against unauthorized intrusion. In the realm of information technology, the right of privacy has focused on the ability of individuals to control the collection and use of personal information held by others.[iv]

Michael Friedewald, Senior Researcher and Head of the ICT research group at the Fraunhofer Institute for Systems and Innovation Reaearch ISI in Karlsruhe, Germany, distinguished seven types of privacy: Privacy of the Person; Privacy of Behavior and Action; Privacy of Communication; Privacy of Data and Image; Privacy of Thoughts and Feelings; Privacy of Location and Space; and Privacy of Association. In relation to the types enumerated by Friedewald, Information Systems Audit and Control Association (ISACA) Data Privacy Task Force Chair Yves LeRoux posted a question, “Considering the full spectrum of privacy, people must ask themselves: Are you sure you are comfortable with all of your characteristics in the public domain?”[v]

People do not realize the privacy risks they are exposed to because of their use of the internet, most especially social media websites. Due to our eagerness to use the internet and share and connect with our friends and families via social media, we often neglect that we inadvertently share private information such as mobile number, bank accounts, your real-time location.

The threats to privacy come from multiple sources, which can be broadly classified into three: technology threatens privacy; threats from actions from the government; and threats from the private sector and commercial services. Technology may lead to the adoption of new systems for surveillance. Many threats from the government are the most serious. Upon arrest and imprisonment, the government has already denied the individual dignity of privacy almost absolutely, coupled with its schemes for compelled identification, drug testing, physical searches of one’s home or person, database profiling, genetic testing, and polygraph examinations to name a few. Lastly, corporations threaten privacy in the marketplace through the extraction of commercial value from consumers in their personally identified transactions. These corporations now also require a buyer to provide personal details that can be used by companies for subsequent purposes. This process is called the “commodification of identity.”[vi]

We may not also be aware that every internet-connected device is a possible privacy risk. Samsung revealed that its voice-recognition system enables internet TV’s to collect sounds and send them to a third party. This includes any sensitive information you might happen to talk about in front of the box. Even smartphones can listen in to conversations because these are monitoring the microphone’s feed in expectation of a command. Video game consoles such as the Xbox One with its attached Kinect can also do the same including videos because Kinects keep track of people in a room so it can detect and load preferences accordingly. Coffee machines and airconditioning units, practically anything internet-capable can also put you at risk.[vii]

Facebook is one of the most popular social networking sites as it is a means for social interaction among users. However, it can also be considered as one of the most accessible means for intrusion of privacy. Personal details including their interests, relationship status, hometown, employers and schools are open for all the world to see. Although a user may make his posts available only to his friends, it is easy to add people to your account. Some people even add others they might not even really know, thus, making his profile available to strangers.[viii] Social media users inadvertently share information even private ones such as photos of your relatives and properties which poses risks to a persons life, liberty, and property.

Even your “selfies” and all your other photos post a risk to your privacy. Your pictures may reveal more than what meets the eye. Other than how you look like, there are other things your pictures say about you. These can even reveal your location at a given time. It will be advantageous for your family and friends to know exactly where we are to find you when they need to, however, this information is also open to the eyes of strangers, who would also want to know where to find you. This doesn’t just apply to selfies, and pictures in general, but everything you post on the internet.[ix]

 

Philippine News

There have been numerous reports and news in the Philippines with regard to the right to privacy.

Model-blogger Kryz Uy was a victim of identity theft in 2011. An anonymous user set-up a fake social media account with her pictures and information from her own account to sell clothes purportedly from her. One of Uy’s followers fell victim to this scheme. She bought items amounting to P8,000.00 but no clothes were delivered in return.[x]

Five graduating students from St. Therese’s College (STC) in Cebu City were not called on stage during their March 2012 Commencement Exercises, despite an order by the Regional Trial Court. They posted bikini-clad photos of them drinking in a bar on Facebook, which were seen by other students and eventually, some students showed the pictures to the teachers. The Supreme Court held that the school did not violate the students’ right to privacy, and can very well use the photos against them because such photos were assumed to be viewable either to the uploader’s Facebook friends or the public at large due to the lack of corroborative evidence from the students.[xi] The Court further emphasized that privacy laws do not apply on Facebook photos freely uploaded by internet users.[xii]

In April 2012, Louella Tan, a call center agent, faced multiple charges after she was caught receiving money through Western Union from an Australian man whom she tricked to be his boyfriend through the social networking site Facebook. She created a fake account using photographs she got from Fil-Norwegian model Janka Cederstam’s Facebook account under the alias “Jem Matheson.”[xiii]

Parokya ni Edgar band member Chito Miranda and girlfriend actress Neri Naig’s intimate private video were leaked online when Miranda’s hard drive were allegedly stolen from their home in 2013. The couple sought the help of the National Bureau of Investigation to catch the perpetrators, however, no suspect has been caught to date.[xiv]

As of June 2015, the Central Bank of the Philippines has reported receiving five to ten complaints of identity theft per day. Most of these are due to personal information derived from the victim’s social networking sites. The perpetrators got the information from the social media accounts, such as mobile number, names of family members and employers, and addresses, to get the bank details, which will enable access to the bank accounts. [xv]

 

Philippine Laws

The protection of privacy is a two-way street. We cannot protect ourselves from privacy intrusion by ourselves, therefore, the State protects our right to privacy through the Constitution and other special laws.

 

1987 Philippine Constitution

The right to privacy is embodied in multiple provisions in the 1987 Constitution. However, with regard to internet access, only Bill of Rights, Article III, Section 3 is most apt. The said provision states that “(1) The privacy of communication and correspondence shall be inviolable except upon lawful order of the court, or when public safety or order requires otherwise, as prescribed by law. (2) Any evidence obtained in violation of this or the preceding section shall be inadmissible for any purpose in any proceeding.

Nowadays, most people use the internet to communicate with others through messages and video calls, rather than the traditional way of calling telephones and sending snail mail. The digital age made correspondence with others regardless of how far they are, easy and accessible. The Constitution protects communication and correspondence whichever manner it is made. The government, law enforcement authorities and even private agencies cannot stoop on our private communications without lawful order of the court.

 

Republic Act 10173 (Data Privacy Act of 2012)

As we are now in the digital age, even our government agencies harness the power of information and communication technology to aid in their work. An example of this is the electronic registration system of the government. Our personal information is put in the Commission on Elections (COMELEC) database with the use of computers. Because of the risks to our sensitive personal information that instances like this may cause, we now have the Data Privacy Act of 2012.

Republic Act 10173 known as Data Privacy Act of 2012 was enacted to protect the fundamental human right of privacy of communication while ensuring free flow of information to promote innovation and growth. It recognizes the vital role of information and communications technology in nation-building and its inherent obligation to ensure that personal information in information and communications systems in the government and in the private sector are secured and protected. For this purpose, a National Privacy Commission is created to administer and implement the provisions of the said Act.[xvi]

Some of the prominent provisions of the Act is that of Sections 16, 17, 18, 20, and 21. The data subject is entitled to be informed whether his/her personal information is being or has been processed, and to be furnished the information such as the description, purposes, scope and method of the processing before the entry of his/her personal information into the processing system of the personal information controller. If in case the data subject has already passed away or became incapacitated, their legal assignee or lawful heirs may invoke their data privacy rights. The personal information controllers must also ensure security measures are in place to protect the information they process. Lastly, in case a personal information controller system or data got compromised, they must notify the affected data subjects and the National Privacy Commission.

 

Republic Act 10175 (Cybercrime Prevention Act of 2012)

Republic Act 10175 or otherwise known as the Cybercrime Prevention Act of 2012, includes Illegal Access, Illegal Interception, Data Interference and System Interference as cybercrime offenses under Section 4. As we all know, these acts when done can cause an intrusion to our right to privacy. Black hat hackers may use the information derived from your computer system in illegal activities such as blackmail and fraud. Those data may also be used to access your bank accounts, emails and even your social networking sites.

In Disini vs. Secretary of Justice, one of the provisions of Republic Act 10175 that the Supreme Court held unconstitutional was Section 12 which authorizes the collection or recording of traffic data by law enforcement authorities through technical or electronic means, when there is due cause. The petitioners contended that the provision was too broad and do not provide ample safeguards against crossing legal boundaries and invading the people’s right to privacy.

The Supreme Court held that the phrase “with due cause” is vague for there is no exact meaning intended by the law. This term may be used by law enforcement agencies to justify a general gathering of data, equivalent to the use of a general search warrant, which our Constitution prohibits. The authority given to law enforcement agencies would lack restraint. They will be empowered to engage in “fishing expeditions” choosing whatever specified communication they want. Nothing can prevent law enforcement agencies from holding these data in their hands from looking into the identity of their sender or receiver and what the data contains. The right to privacy of the citizens will be curtailed if such provision will be implemented.[xvii]

 

International Laws

Other than Philippine laws and actions, there are also international organizations, such as the United Nations, whose actions apply to all member nations, one of which is the Philippines, which regard the right to privacy on high ground.

United Nations

United Nations Human Rights Council members unanimously agreed to appoint a new UN Special Rapporteur, or expert, on the right to privacy. This step was done to improve and to protect privacy on the internet. The Human Rights Watch stated that although the advancement in digital technology has had many positive social effects, the digitization of information also has meant that governments have enhanced ability to monitor citizens’ movements, censor speech, block or filter access to information and track communications.

The new Special Rapporteur is tasked to cover all aspects of privacy including systematically reviewing government policies on interception of digital communications and collection of personal data and pinpointing policies that intrude on privacy without compelling justification; identifying best practices to bring global surveillance under the rule of law and helping ensure that national procedures and laws that have bearing on privacy are consistent with international human rights obligations; examining private sector responsibilities to respect human rights under the “Protect, Respect, Remedy framework” of the UN Guiding Principles for Business and Human Rights, in the specific context of digital information and communication technology; helping develop international norms that more effectively address the interaction between privacy, freedom of expression, and other human rights in the digital context; bringing focused attention to factors that facilitate overbroad surveillance, including widely varying practices and levels of transparency about what data businesses retain, and how those practices in many instances have a direct bearing on what governments are able to collect and monitor; and working with other UN experts to protect free expression, freedom of peaceful assembly and association, and human rights defenders, to identify specific threats to rights in the context of indiscriminate mass surveillance, leading to a more comprehensive approach to the protection of privacy.[xviii]

The UN Guidelines for the Regulation of Computerized Personal Data Files (1990) also set out Fair Information Practices and recommended the adoption of national guidelines to protect personal privacy.[xix]

This is a major step by the United Nations. As the internet access worldwide has been continuously on the rise, special actions to protect privacy should take place. Everybody on the internet is vulnerable to attacks and malicious actions.

Universal Declaration of Human Rights

Section 12 of the Universal Declaration of Human Rights states that “no one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.”[xx]

 

In relation to the Philippine Constitution, the Universal Declaration of Human Rights embodies the same principle as Section 3 of our Bill of Rights.

 

Conclusion

As we have learned, other than the 1987 Constitution, the Philippine government is continously implementing different laws such as the Data Privacy Act of 2012, and the Cybercrime Prevention Act of 2012 to safeguard our right to privacy. As internet users, we must be weary and take active part to prevent future intrusions to the privacy we are experiencing right now.

Sina Salek, an E-commerce company CEO, laid down three questions to answer before putting something personal on the internet: Do I want to share it at all? Do I want to share it with the rest of the world forever? Do I want my friends to have a copy of it on their computer so they can share it with the rest of the world?[xxi] A future employer may use an incriminating photo you have posted 10 years ago against you. Upon posting your child’s photo in school, you may be luring child predators to go after your child after class hours. We should think twice, thrice or even more before posting something on the internet, because it may cause you and your family more harm than good.

Author Dave Johnson also enumerated some practical tips to protect online privacy. These are: never reply to emails with personal information, never click a link in an email to go to your banking website, use a unique password on every site, use 2-factor authentication whenever possible, be careful what you say online, and password protect your devices.[xxii] Emails are not at all secure. You may never know if the person you’re messaging is the person you intend to because their devices or accounts may have been hacked or stolen.

Social networking sites are also getting more and more popular to people of all ages. Even young children and senior citizens are opening their own accounts. One thing to make sure is to never fill out your social media profile. Having all the information in one place makes life easier for would-be perpetrators to get them. Better yet, never post them online. The people who need your birthday and mobile numbers probably already know them. Keeping your social activity private can also help ward off strangers to your accounts. Make sure only friends can see what you’re doing. Go to your privacy settings and adjust them. When opening a new account, most websites also require you to answer a security question such as “What is your mother’s maiden name?” or “In what city were you born?” Lie about your answers. There’s nothing secure about such generic queries because someone who wants access to your account could easily do some Internet research to look for your answers.[xxiii]

Other than social networking sites, online shopping and banking are also gaining popularity. If you can, make sure to pay in cash. Business Insider reported that credit card companies in the United States of America such as Mastercard and American Express are selling purchase data to online advertisers to target you with advertisements, in relation to your purchase history.[xxiv]

It is really the best to “think before you click.” Preventing others from access to your life through the internet and information communications technology is the best way to save your privacy.

As technological advancements continue to rise, our government adapts to these changes through passing laws to continue to afford protection to the citizens. However, these are not enough to completely protect us as no parameters nor standards regarding data privacy can be set firmly since technology continues to evolve. This evolution, gives users new ways to use and abuse their privacy. With these in mind, besides specific laws to protect the privacy of the citizens, there should also be complementing laws and government programs equipping users with knowledge that our right to privacy is as important as our freedom of expression. Through these, users should be more aware of protecting their privacy thus in effect eliminates threats to our society.

[i] http://www.internetlivestats.com/internet-users/

[ii] Mander, Jason. Internet turns 25. http://www.globalwebindex.net/blog/internet-turns-25 (Accessed: June 30, 2015)

[iii] Montenegro, Bea. PHL Internet Users Now 38 Million Two-thirds under 30. http://www.gmanetwork.com/news/story/380893/scitech/technology/phl-internet-users-now-38-million-two-thirds-under-30-immap (Accessed: June 30, 2015)

[iv] Rotenberg, Mark. Preserving Privacy in the Information Society. http://www.unesco.org/webworld/infoethics_2/eng/papers/paper_10.htm (Accessed: July 1, 2015)

[v] _____________. Privacy Concerns in the Digital World. http://www.computerweekly.com/opinion/Privacy-concerns-in-the-digital-world (Accessed: July 1, 2015)

[vi] Rotenberg, Mark. Preserving Privacy in the Information Society. http://www.unesco.org/webworld/infoethics_2/eng/papers/paper_10.htm (Accessed: July 1, 2015)

[vii] Biggs, Tim. Every Internet-connected Device is a Potential Privacy Risk. http://www.smh.com.au/digital-life/consumer-security/every-internetconnected-device-is-a-potential-privacy-risk-20150210-13aefp.html (Accessed: July 2, 2015)

[viii] Smith, Daniel. 2012. When Everyone is the Judge’s Pal: Facebook Friendship and the Appearance of Improprietary Standard. Case Western Reserve University School of Law.

[ix] Villa, Nile. Stop Before You Selfie. http://www.rappler.com/life-and-style/47640-personal-information-social-media-selfie?utm_content=buffer47256&utm_medium=social&utm_source=facebook.com&utm_campaign=buffer (Accessed: July 3, 2015)

[x] Cupin, Bea. Pinay Model Raises Alarm on Identity Theft. http://www.gmanetwork.com/news/story/217831/scitech/pinay-model-raises-alarm-on-identity-theft (Accessed: July 1, 2015)

[xi] Geronimo, Yee. SC: STC did not violate students’ right to privacy. http://www.rappler.com/nation/72912-sc-decision-stc-students-privacy-rights (Accessed: July 1, 2015)

[xii] Quismundo, Tara. SC: Privacy laws do not apply on Facebook photos freely uploaded by internet users. http://technology.inquirer.net/39158/sc-privacy-laws-do-not-apply-on-facebook-photos-freely-uploaded-by-internet-users (Accessed: July 1, 2015)

[xiii] _____________. Call Center Agent Arrested for Facebook Identity Theft. http://www.abs-cbnnews.com/-depth/04/20/12/call-center-agent-arrested-facebook-identity-theft (Accessed: July 1, 2015)

[xiv] Policarpio, Allan. http://entertainment.inquirer.net/106301/internet-abuzz-over-sex-tape-of-chito-miranda-neri-naig (Accessed: July 3, 2015)

[xv] Montenegro, Bea. With Increasing Use of Social Media, BSP Warns vs. Identity Theft. http://www.gmanetwork.com/news/story/501834/scitech/socialmedia/with-increasing-use-of-social-media-bsp-warns-vs-identity-theft (Accessed: July 1, 2015)

[xvi] Republic Act 10173.

[xvii] Disini v. Secretary of Justice. G.R. No. 203335. February 11, 2014.

[xviii] _____________. http://www.hrw.org/news/2015/03/26/un-major-step-internet-privacy (Accessed: July 1, 2015)

[xix] Rotenberg, Mark. Preserving Privacy in the Information Society. http://www.unesco.org/webworld/infoethics_2/eng/papers/paper_10.htm (Accessed: July 1, 2015)

[xx] http://www.un.org/en/documents/udhr/index.shtml#a12

[xxi] Salek, Sina. How to Protect our Privacy in a Digital World. http://sina.salek.ws/content/how-protect-our-privacy-digital-world (Accessed: July 1, 2015)

[xxii] Johnson, Dave. Practical Ways to Protect Your Online Privacy. http://www.cbsnews.com/news/practical-ways-to-protect-your-online-privacy/ (Accessed: July 1, 2015)

[xxiii] DesMarais, Christina. http://techland.time.com/2013/07/24/11-simple-ways-to-protect-your-privacy/ (Accessed: July 3, 2015)

[xxiv] Edwards, Jim. http://www.businessinsider.com/credit-cards-sell-purchase-data-to-advertisers-2013-4 (Accessed: July 3, 2015)