Rules and Regulations Implementing RA 10175
Rules and Regulations Implementing RA 10175
Rules and Regulations Implementing RA 10175
RULE 1
Preliminary Provisions
The State shall adopt sufficient powers to effectively prevent and combat such
offenses by facilitating their detection, investigation and prosecution at both
the domestic and international levels, and by providing arrangements for fast
and reliable international cooperation.
1
f) Collection refers to gathering and receiving information;
2
q) Cybersex refers to the willful engagement, maintenance, control or
operation, directly or indirectly, of any lascivious exhibition of sexual organs or
sexual activity, with the aid of a computer system, for favor or consideration;
3
aa) Interception refers to listening to, recording, monitoring or surveillance of
the content of communications, including procurement of the content of data,
either directly through access and use of a computer system, or indirectly
through the use of electronic eavesdropping or tapping devices, at the same
time that the communication is occurring;
1. any public or private entity that provides users of its service with the
ability to communicate by means of a computer system; and
2. any other entity that processes or stores computer data on behalf of such
communication service or users of such service.
The type of communication service used, the technical provisions taken thereto
and the period of service;
4
RULE 2
Punishable Acts and Penalties
Cybercrimes
ii. A computer password, access code, or similar data by which the whole or
any part of a computer system is capable of being accessed with the intent that
it be used for the purpose of committing any of the offenses under this rules.
5
b. The possession of an item referred to in subparagraphs 5(a)(i) or (ii) above,
with the intent to use said devices for the purpose of committing any of the
offenses under this section.
1. Computer-related Forgery –
C. Content-related Offenses:
6
a. Similar, identical, or confusingly similar to an existing trademark
registered with the appropriate government agency at the time of the
domain name registration;
b. Identical or in any way similar with the name of a person other than the
registrant, in case of a personal name; and
c. Acquired without right or with intellectual property interests in it.
4. Other offenses – The following acts shall also constitute an offense which
shall be punished with imprisonment of one (1) degree lower than that of the
prescribed penalty for the offense, or a fine of at least One Hundred Thousand
Pesos (P100,000.00) but not exceeding Five Hundred Thousand Pesos
(P500,000.00), or both:
7
Other Liabilities and Penalties
If the commission of any of the punishable acts herein defined was made
possible due to the lack of supervision or control by a natural person referred
to and described in the preceding paragraph, for the benefit of that juridical
person by a natural person acting under its authority, the juridical person
shall be held liable for a fine equivalent to at least double the fines imposable
in Section 7 up to a maximum of Five Million Pesos (P5,000,000.00).
The liability imposed on the juridical person shall be without prejudice to the
criminal liability of the natural person who has committed the offense.
Section 8. Liability under Other Laws. – A prosecution under the Act shall
be without prejudice to any liability for violation of any provision of the Revised
Penal Code, as amended, or special laws: Provided, That this provision shall
not apply to the prosecution of an offender under (1) both Section 4(c)(4) of R.A.
10175 and Article 353 of the Revised Penal Code; and (2) both Section 4(c)(2) of
R.A. 10175 and R.A. 9775 or the “Anti-Child Pornography Act of 2009”.
RULE 3
Enforcement and Implementation
The DOJ – Office of Cybercrime (OOC) created under the Act shall coordinate
the efforts of the NBI and the PNP in enforcing the provisions of the Act.
8
Section 10. Powers and Functions of Law Enforcement Authorities. – The
NBI and PNP cybercrime unit or division shall have the following powers and
functions:
Law enforcement authorities may order a one-time extension for another six (6)
months: Provided, That once computer data that is preserved, transmitted or
stored by a service provider is used as evidence in a case, the mere act of
furnishing such service provider with a copy of the transmittal document to the
Office of the Prosecutor shall be deemed a notification to preserve the computer
data until the final termination of the case and/or as ordered by the Court, as
the case may be.
The service provider ordered to preserve computer data shall keep the order
and its compliance therewith confidential.
9
Section 13. Collection of Computer Data. Law enforcement authorities,
upon the issuance of a court warrant, shall be authorized to collect or record
by technical or electronic means, and the service providers are required to
collect or record by technical or electronic means and/or to cooperate and
assist in the collection or recording of computer data that are associated with
specified communications transmitted by means of a computer system.
The court warrant required under this section shall be issued or granted upon
written application, after the examination under oath or affirmation of the
applicant and the witnesses he may produce, and the showing that: (1) there
are reasonable grounds to believe that any of the crimes enumerated
hereinabove has been committed, is being committed or is about to be
committed; (2) there are reasonable grounds to believe that the evidence that
will be obtained is essential to the conviction of any person for, or to the
solution of, or to the prevention of any such crimes; and (3) there are no other
means readily available for obtaining such evidence.
Law enforcement authorities shall record all sworn complaints in their official
docketing system for investigation.
b. Pursuant thereto, the law enforcement authorities may order any person,
who has knowledge about the functioning of the computer system and the
measures to protect and preserve the computer data therein, to provide, as is
reasonable, the necessary information to enable the undertaking of the search,
seizure and examination.
10
Section 16. Custody of Computer Data. – All computer data, including
content and traffic data, that are examined under a proper warrant shall,
within forty-eight (48) hours after the expiration of the period fixed therein, be
deposited with the court in a sealed package, and shall be accompanied by an
affidavit of the law enforcement authority executing it, stating the dates and
times covered by the examination, and the law enforcement authority who may
have access to the deposit, among other relevant data. The law enforcement
authority shall also certify that no duplicates or copies of the whole or any part
thereof have been made or, if made, that all such duplicates or copies are
included in the package deposited with the court. The package so deposited
shall not be opened, or the recordings replayed, or used in evidence, or their
contents revealed, except upon order of the court, which shall not be granted
except upon motion, with due notice and opportunity to be heard to the person
or persons whose conversation or communications have been recorded.
The Rules of Court shall have suppletory application in implementing the Act.
1. The service provider does not have actual knowledge, or is not aware of
the facts or circumstances from which it is apparent, that the making,
publication, dissemination or distribution of such material is unlawful or
infringes any rights subsisting in or in relation to such material;
2. The service provider does not knowingly receive a financial benefit
directly attributable to the unlawful or infringing activity; and
11
3. The service provider does not directly commit any infringement or other
unlawful act, does not induce or cause another person or party to
commit any infringement or other unlawful act, and/or does not directly
benefit financially from the infringing activity or unlawful act of another
person or party: Provided, further, That nothing in this Section shall
affect:
iv. The civil liability of any party to the extent that such liability forms the basis
for injunctive relief issued by a court under any law requiring that the service
provider take or refrain from actions necessary to remove, block or deny access
to any computer data, or to preserve evidence of a violation of law.
RULE 4
Jurisdiction
Section 22. Venue. – Criminal action for violation of the Act may be filed with
the RTC of the province or city where the cybercrime or any of its elements is
committed, or where any part of the computer system used is situated, or
where any of the damage caused to a natural or juridical person took
place: Provided, That the court where the criminal action is first filed shall
acquire jurisdiction to the exclusion of other courts.
RULE 5
International Cooperation
12
computer systems and data, or for the collection of electronic evidence of
crimes.
The DOJ shall cooperate and render assistance to other contracting parties, as
well as request assistance from foreign states, for purposes of detection,
investigation and prosecution of offenses referred to in the Act and in the
collection of evidence in electronic form in relation thereto. The principles
contained in Presidential Decree No. 1069 and other pertinent laws, as well as
existing extradition and mutual legal assistance treaties, shall apply. In this
regard, the central authority shall:
ii. The offense that is the subject of a criminal investigation or proceedings and
a brief summary of the related facts;
iii. The stored computer data to be preserved and its relationship to the offense;
v. That the requesting State shall submit a request for mutual assistance for
the search or similar access, seizure or similar securing, or disclosure of the
stored computer data.
2. Upon receiving the request from another State, the DOJ and law
enforcement agencies shall take all appropriate measures to expeditiously
preserve the specified data, in accordance with the Act and other pertinent
13
laws. For the purposes of responding to a request for preservation, dual
criminality shall not be required as a condition;
4. Where the Philippine Government believes that preservation will not ensure
the future availability of the data, or will threaten the confidentiality of, or
otherwise prejudice the requesting State’s investigation, it shall promptly so
inform the requesting State. The requesting State will determine whether its
request should be executed; and
The Philippine Government shall respond to the request through the proper
application of international instruments, arrangements and laws, and in
accordance with the following rules:
ii. The instruments, arrangements and laws referred to in paragraph (b) of this
section otherwise provide for expedited cooperation.
2. The requesting State must maintain the confidentiality of the fact or the
subject of request for assistance and cooperation. It may only use the
requested information subject to the conditions specified in the grant.
f. Make a request to any foreign state for assistance for purposes of detection,
investigation and prosecution of offenses referred to in the Act;
g. The criminal offenses described under Chapter II of the Act shall be deemed
to be included as extraditable offenses in any extradition treaty where the
Philippines is a party: Provided, That the offense is punishable under the laws
of both Parties concerned by deprivation of liberty for a minimum period of at
least one year or by a more severe penalty.
14
RULE 6
Competent Authorities
The CICC may enlist the assistance of any other agency of the government
including government-owned and -controlled corporations, and the following:
a. Bureau of Immigration;
b. Philippine Drug Enforcement Agency;
c. Bureau of Customs;
d. National Prosecution Service;
e. Anti-Money Laundering Council;
f. Securities and Exchange Commission;
g. National Telecommunications Commission; and
h. Such other offices, agencies and/or units, as may be necessary.
The DOJ Office of Cybercrime shall serve as the Cybercrime Operations Center
of the CICC and shall submit periodic reports to the CICC.
15
f. Recommend the enactment of appropriate laws, issuances, measures
and policies;
g. Call upon any government agency to render assistance in the
accomplishment of the CICC’s mandated tasks and functions;
h. Establish and perform community awareness program on cybercrime
prevention in coordination with law enforcement authorities and
stakeholders; and
i. Perform all other matters related to cybercrime prevention and
suppression, including capacity-building and such other functions and
duties as may be necessary for the proper implementation of the Act.
a. Extend immediate assistance to the CICC to fulfil its mandate under the Act
with respect to matters related to cybersecurity and the national cybersecurity
plan;
16
b. Issue and promulgate guidelines, advisories, and procedures in all matters
related to cybersecurity and the national cybersecurity plan;
d. Serve as the focal point for all instances of cybersecurity incidents by:
The Philippine National Police and the National Bureau of Investigation shall
serve as the field operations arm of the CERT. The CERT may also enlist other
government agencies to perform CERT functions.
RULE 7
Duties of Service Providers
17
Section 31. Duties of a Service Provider in Child Pornography
Cases. – In line with RA 9775 or the “Anti-Child Pornography Act of 2009”,
the following are the duties of a service provider in child pornography cases:
RULE 8
Prescribed Forms and Procedures
It shall also prescribe forms and templates such as, but not limited to,
preservation orders, chain of custody, consent to search, consent to assume
account/online identity, request for computer forensic assistance, write-
blocking device validation and first responder checklist.
RULE 9
Final Provisions
(Sgd.) MAR ROXAS
18
Secretary
Department of Interior and Local Government
(Sgd.) LEILA M. DE LIMA
Secretary
Department of Justice
19