Forensic Reviewer
Forensic Reviewer
5. FORENSIC MEDICINE
Branch of medicine that deals with use of medical
knowledge to elucidate legal problems; sometimes it is
used synonymously with Legal Medicine
Clinical Forensic Medicine
- Branch of Medicine that deals specifically with cases
involving both legal and medical aspects of patient
care.
- i.e. Request for Physical Examination of person in
custody; Aging of wounds to determine if consistent
with alleged date of infliction.
Forensic Pathology
- Subspecialty of pathology that focuses on medico-
legal death investigation; for death under suspicious
circumstance, medico-legal officer can conduct an
autopsy
Forensic Psychiatry
6. EVIDENCE the veracity or falsity of his
the means, sanctioned by the Rules of Court, of testimony.
ascertaining in a judicial proceeding the truth respecting a
matter of fact. d) EXPERIMENTAL
MEDICAL EVIDENCE – If the means employed to prove a A medical witness may be allowed in court to confirm
fact is medical in nature his allegation as a corroborative proof to an opinion he
previously stated.
7. TYPES OF MEDICAL/FORENSIC EVIDENCE i.e. Lethality of poisons, drowning, etc
a) AUTOPTIC/REAL
evidence made known or addressed to the senses of the e) PHYSICAL
court. It is not limited to that which is known through these are articles and materials which are found in
the sense of vision but is extended to what the sense of connection with the investigation and which aid in
hearing, taste, smell and touch is perceived. (Sec.1, Rule establishing the identity of the perpetrator or the
130) circumstances under which the crime was committed, or in
Limitations: general assist in the prosecution of a criminal.
i. Indecency or impropriety CRIMINALISTICS – Is the identification, collection,
- presentation of evidence may be necessary to serve preservation and mode of presentation of physical
the best interest of justice but the notion of decency evidence. It is the application of sciences such as physics,
and delicacy may cause inhibition of its presentation. chemistry, medicine and other biological sciences in crime
- i.e. Court may not allow exposure of the genitalia of detection and investigation.
an alleged victim of sexual offense to show the
presence and degree of the genitalia and extra- TYPES OF PHYSICAL EVIDENCES:
genitalia injuries suffered. a. CORPUS DELICTI
- objects or substances which may be a part of the
ii. Repulsive objects and those Offensive to body of the crime.
Sensibilities
- foul smelling objects, persons suffering from highly b. ASSOCIATIVE
infectious and communicable disease, or objects - these are physical evidence which link a suspect to
which when touch may mean potential danger to the the crime.
life and health of the judge may not be presented.
- However, if such evidence is necessary in the c. TRACING
adjudication of the case, the question of indecency - these are physical evidence which may assist the
and impropriety or the fact that such evidence is investigator in locating the suspect.
repulsive or offensive to sensibilities, it may be
presented. This will depend on the sound discretion f) DIRECT v CIRCUMSTANTIAL
of the court.
DIRECT EVIDENCE CIRCUMSTANTIAL EVIDENCE
b) DOCUMENTARY That which proves the fact in The proof of fact or facts from
Evidence may be: dispute without the aid of any which, taken either singly or
a. Medical Certification or Report on: inference or presumption. collectively, the existence of a
i. Medical examination particular fact in dispute may
ii. Physical examination The evidence presented be inferred as a necessary or
iii. Necropsy/ autopsy corresponds to the precise or probable consequence.
iv. Laboratory actual point at issue.
v. Exhumation
vi. Birth g) SCIENTIFIC
vii. Death the questioning of a person suspected of having
b. Medical Expert Opinion committed an offense or of persons who are reluctant to
c. Deposition make a full disclosure of information in his possession
which is pertinent to the investigation.
c) TESTIMONIAL
A physician may be commanded to appear in court. His h) ELECTRONIC EVIDENCE pursuant to the Rules of Electronic
testimony must be given orally and under oath or Evidence effective August 01, 2001, electronic documents,
affirmation signatures, electronic communications, audio, video ,
A physician may be presented in court as an ordinary photos
witness and/or as an expert witness:
FACTS:
Accused-appellant Eduardo Taan “Bebot” was found guilty of
murder aggravated by the use of an unlicensed firearm and
sentenced to death
EDUARDO TAAN, alias "BEBOT", in conspiracy with DANNY DOE,
true name has not yet been fully established, armed with a big
stone and an unlicensed short firearm attack, assault, hold, hit,
strike, tie and shoot Ricardo Ladaga, inflicting upon him the
following injuries:
a) Depressed Fracture; 3 cm. x 4 cm.; oblong in shape; mid-
temporo-parietal area; Right.
b) Fracture, 1 cm. in diameter, circular in shape, mid-posterior
aspect of the hard palate, most probably of a gunshot wound
entrance.
c) Skull Fracture, 1.3 cm. in diameter, circular in shape, upper
third of the occipital area, most probably of a gunshot wound
exit, Right.
d) Avulsion, teeth, Left and Right Lower Central Incissors. [sic]
e) Avulsion, tooth, Left Lateral Lower Incissor [sic].
ISSUE:
RULING:
Daubert v Merrell Dow Pharmaceuticals Inc., PP. vs. Yatar, 428 SCRA 504
509 U.S., 509; 593–594
FACTS:
Brief Fact Summary: The Plaintiffs, Daubert and other minors On June 30, 1998, Kathylyn Uba stayed in her grandmother’s
(Plaintiffs), suffered limb reduction birth defects. They claim the (Isabel Dawang’s) house, despite her intention to go forth
defects were caused when their mothers ingested drugs Tuguegarao City, as her other former’s housemate-relatives left
manufactured by the Defendant, Merrell Dow Pharmaceuticals, Inc. in the morning.
(Defendant), while they were pregnant. At 10:00 am, accused-appellant Joel Yatar was seen at the back
of the same house where Kathylyn stayed during said date.
Synopsis of Rule of Law: To be admissible, expert scientific At 12:30 pm, Judilyn, Kathylyn’s first cousin saw Yatar, who was
testimony that is derived from research done for the purpose of then wearing a white shirt with collar and black pants,
litigation must show that the conclusions were reached after descended from the second floor and was pacing back and
following recognized scientific methods of research. forth at the back of Isabel Dawang’s house, Judilyn didn’t find
this unusual since Yatar and his wife used to live therein.
Facts. At 1:30 PM, Yatar called upon Judilyn, telling the latter that he
The minor Plaintiffs were injured when their mothers ingested would not be getting the lumber he had been gathering.
drugs manufactured by the Defendant. This time, Judilyn noticed that Yatar is now wearing a black shirt
According to the Plaintiffs’ experts, the drug manufactured by (without collar) and blue pants; and noticed that the latter’s
the Defendant caused the deformities. However, the majority eyes were “reddish and sharp”.
of the scientific field does not agree that the drug causes limb Accused-appellant asked about the whereabouts of Judilyn’s
deformities and the Federal Drug Authority (FDA) continues to husband, as the former purports to talk with the latter. Then,
approve of its use in pregnant women. Yatar immediately left when Judilyn’s husband arrived.
In the evening, when Isabel Dawang arrived home, she found
Issue. Whether the expert testimony offered by the Plaintiffs is the lights of her house turned off, the door of the ground floor
admissible. opened, and the containers, which she asked Kathylyn to fill up,
were still empty.
Held. The Plaintiffs’ expert testimony is not admissible. Upon ascending the second floor to check whether the teenage
When it comes to expert testimony and scientific theory, it is girl is upstairs, Isabel found that the door therein was tied with
hard for the courts to determine what is a fact and what is a rope.
scientific theory admissible in court. When Isabel succeeded opening the tied door with a knife, and
Federal Rule of Evidence 702 (Rule 702) is now the standard for as she groped in the darkness of the second level of her house,
admitting expert scientific testimony. she felt Kathylyn’s lifeless and naked body, with some intestines
Under Rule 702, there are several factors to consider when protruding out from it.
determining whether expert testimony is admissible: Soon after, police came to the scene of the crime to provide
i. Whether the theory is generally accepted in the scientific assistance. Therein, they found Kathylyn’s clothes and
community; undergarments beside her body.
ii. Whether the theory/method has been subjected to peer Amongst others, a white collared shirt splattered with blood
review and publication; was also found 50-meters away from Isabel’s house.
iii. Whether the theory/method has been tested or can be Meanwhile, semen has also been found upon examination of
tested; Kathylyn’s cadaver. When subjected under DNA testing, results
iv. Whether the potential or known rate of error is showed that the DNA comprising the sperm specimen is
acceptable. identical to Yatar’s genotype.
It is the court’s responsibility to resolve disputes among the Yatar was accused of the special complex crime of Rape with
respected and credentialed scientists about matters within the Homicide and was convicted for the same by the Regional Trial
scientists’ expertise and to reject testimony if it is not obtained Court of Tabuk, Kalinga.
by the scientific method. Thereafter, he made an appeal to the Honorable Supreme
If expert testimony is shown to be the result of research Court in order to assail the court a quo’s decision.
conducted for the purpose of litigation, the expert must show On appeal, Yatar avers that:
precisely how they reached their conclusions and point to an (1) the trial court erred in giving much weight to the evidence
objective source to show they followed the scientific method as DNA testing or analysis done on him, in lieu of the seminal
it is practiced by at least a recognized minority in their field. fluid found inside the victim’s (cadaver) vaginal canal;
Because the Plaintiffs’ experts cannot do this, the testimony is (2) the blood sample taken from is violative of his
not admissible. constitutional right against self-incrimination; and the
The Plaintiffs’ experts did not conduct their research conduct of DNA testing is also in violation on prohibition
independent of the litigation and the theories have not been against ex-post facto laws.
published in scientific journals or reviewed by peers, thought
there has been ample time to do so because the theories and ISSUE: Whether or not the result of the DNA testing done on the
litigation has been around for a decade. sperm specimen may be used as evidence for Yatar’s conviction?
Furthermore, under Rule 702, the Plaintiffs must show that the
evidence they offer would assist the trier of fact in determining RULING:
a factual issue.
The Plaintiffs cannot show causation directly and attempt to Noteworthy is the fact this case was decided on 2004, which
show it through circumstantial evidence provided by their was (3) years before the Rules on DNA evidence took effect.
experts. The testimony cannot establish that the defects were The Supreme Court in this case ruled based on the US case of
not caused by an independent cause, since limb reduction Daubert vs. Merrell Dow as a precedent.
defects occur in the babies of mothers who did not take the In the said US jurisprudence, it was ruled that pertinent
drug. evidence based on scientifically valid principles could be used,
The Plaintiffs’ experts cannot say that the drug more than so long as the same is RELEVANT and RELIABLE. Hence, it was
doubled their risk of the defect, only that there was a statistical called then as the DAUBERT TEST.
relationship between he drug and the birth defect.: RULE: At present, SECTION 7, RULES ON DNA EVIDENCE may be
used as the legal basis. Sec. 7 of the Rules on DNA evidence,
Daubert Test in Forensic Evidence: it was ruled that pertinent which took effect on 2007, provides for the factors to be
evidence based on scientifically valid principles could be used, so considered in assessing the probative weight or value to be
long as the same is RELEVANT and RELIABLE. given on evidence derived or generated from DNA testing.
Such factors, are, to wit:
(a) The chain of custody, including how the biological samples
were collected, how they were handled, and the possibility
of contamination of the samples;
(b) The DNA testing methodology, including the procedure Buan also found that the vaginal swab from Daisy contained
followed in analyzing the samples, the advantages and Vallejo’s DNA profile.
disadvantages of the procedure, and compliance with the Meanwhile, Vallejo already executed a sworn statement
scientifically valid standards in conducting the tests; admitting the crime. But when trial came, Vallejo insisted that
(c) The forensic DNA laboratory, including accreditation by the sworn statement was coerced; that he was threatened by
any reputable standards-setting institution and the the cops; that the DNA samples should be inadmissible because
qualification of the analyst who conducted the tests. If the the body and the clothing of Daisy (including his clothing –
laboratory is not accredited, the relevant experience of the which in effect is an admission placing him in the crime scene –
laboratory in forensic casework and credibility shall be though not discussed in the case) were already soaked in
properly established; and smirchy waters, hence contaminated.
(d) The reliability of the testing result, as hereinafter provided. Vallejo was convicted and was sentenced to death by the trial
court.
APPLICATION – DAUBERT TEST:
The Honorable Supreme Court in this case upheld the probative ISSUE: Whether or not the DNA samples gathered are admissible as
value of the DNA test result yielded from the analysis of Yatar’s evidence.
blood sample from that of the semen specimen obtained from
the cadaver’s vaginal canal. HELD: Yes.
Accordingly, it held that the DNA evidence is both reliable and The Supreme Court ruled that the findings of Dr. Buan are
relevant. conclusive. The court reiterated that even though DNA
In ascertaining the relevance of the evidence in a case, it evidence is merely circumstantial, it can still convict the
must be determined whether or not the same directly accused considering that it corroborates all other circumstantial
relates to a fact in issue, as to induce belief in its existence evidence gathered in this rape-slay case.
or nonexistence. In this case, the evidence is relevant in The Supreme Court also elucidated on the admissibility of DNA
determining the perpetrator of the crime; evidence in this case and for the first time recognized its
In giving probative value on the DNA testing result, yielded evidentiary value in the Philippines, thus:
from the analysis of Yatar’s blood sample from that of the DNA is an organic substance found in a person’s cells
biological sample (semen) obtained from the victim’s which contains his or her genetic code.
vaginal canal, the trial court considered the qualification of Except for identical twins, each person’s DNA profile is
the DNA analyst, the facility or laboratory in which the distinct and unique.
DNA testing had been performed, and the methodology When a crime is committed, material is collected from the
used in performing the DNA test. In the said case, the DNA scene of the crime or from the victim’s body for the suspect’s
test was done at the UP National Science Research DNA. This is the evidence sample. The evidence sample is then
Institute (NSRI) . The method used was Polymerase chain matched with the reference sample taken from the suspect and
reaction (PCR) amplification method by Short Tandem the victim.
Repeat (STR) analysis, which enables a tiny amount of DNA The purpose of DNA testing is to ascertain whether an
sequence to be replicated exponentially in a span of few association exists between the evidence sample and the
hours. Hence, sufficient DNA analysis may be made easier reference sample.
even with small DNA samples at hand. The analyst who The samples collected are subjected to various chemical
performed the procedure was Dr. Maria Corazon Abogado processes to establish their profile.
de Ungria, who is a duly qualified expert witness on DNA The test may yield three possible results:
print or identification techniques. 1) The samples are different and therefore must have
originated from different sources (exclusion). This
CONCLUSION: Hence, apart from the other sets of circumstantial conclusion is absolute and requires no further analysis or
evidence correctly appreciated by the trial court, the said DNA discussion;
evidence is sufficient to be admitted as evidence to warrant the 2) It is not possible to be sure, based on the results of the
accused-appellant’s conviction of the crime of Rape with Homicide. test, whether the samples have similar DNA types
(inconclusive). This might occur for a variety of reasons
PP vs. Vallejo including degradation, contamination, or failure of some
G.R. No. 144656. aspect of the protocol. Various parts of the analysis might
then be repeated with the same or a different sample, to
FACTS: obtain a more conclusive result; or
On July 10, 1999 (Rosario, Cavite), at about 1pm, 9-year old 3) The samples are similar, and could have originated from
Daisy Diolola went to her neighbor’s house to seek help in an the same source (inclusion). In such a case, the samples
assignment. are found to be similar, the analyst proceeds to determine
It was a Saturday. Gerrico Vallejo, the neighbor, helped Daisy in the statistical significance of the Similarity.
her assignment.
At 5pm of the same day, Daisy’s mom noticed that her child In assessing the probative value of DNA evidence, therefore,
wasn’t home yet. She went to Vallejo’s house and Daisy wasn’t courts should consider, among others things, the following
there. 7pm, still no word of Daisy’s whereabouts. data: how the samples were collected, how they were handled,
The next morning, Daisy’s body was found tied to a tree near a the possibility of contamination of the samples, the procedure
river bank. Apparently, she was raped and thereafter strangled followed in analyzing the samples, whether the proper
to death. standards and procedures were followed in conducting the
In the afternoon of July 11, the police went to Vallejo’s house to tests, and the qualification of the analyst who conducted the
question the latter as he was one of the last persons with the tests.
victim. But prior to that, some neighbors have already told the
police that Vallejo was acting strangely during the afternoon of
July 10.
The police requested for the clothes that Vallejo wore the day
Daisy disappeared. Vallejo complied and the clothes were
submitted for processing.
The person who processed the clothing was Pet Byron Buan, a
Forensic Biologist of the NBI. At the instance of the local fiscal,
he also took buccal swabs (mouth/cheek swabs) from Vallejo
and a vaginal swab from Daisy’s body for DNA testing.
Dr. Buan found that there were bloodstains in Vallejo’s clothing
– Blood Type A, similar to that of the victim, while Vallejo’s Herrera vs. Alba
Blood Type is O. G.R. No. 148220, 15 June 2005
FACTS: came from complainant and that it was complainant and the
On 14 May 1998, then thirteen-year-old Rosendo Alba law enforcers who instigated the whole incident.
(respondent), represented by his mother Armi Alba, filed before When she was asked if she had sent the text messages
the trial court a petition for compulsory recognition, support contained in complainant’s cellphone and which reflected her
and damages against petitioner. cellphone number, respondent admitted those that were not
On 7 August 1998, petitioner filed his answer with counterclaim incriminating but claimed she did not remember those that
where he denied that he is the biological father of respondent. clearly showed she was transacting with complainant.
Petitioner also denied physical contact with respondent’s Respondent thus stated that she met with complainant only to
mother. tell the latter to stop calling and texting her, not to get the One
Respondent filed a motion to direct the taking of DNA paternity Million Pesos (P1,000,000.00) as pre-arranged.
testing to abbreviate the proceedings.
To support the motion, respondent presented the testimony of Issue: Whether or not the text messages are admissible as evidence
Saturnina C. Halos, Ph.D. When she testified, Dr. Halos was an in court?
Associate Professor at De La Salle University where she taught
Cell Biology. Held: Yes.
She was also head of the University of the Philippines Natural Complainant was able to prove by his testimony in conjunction
Sciences Research Institute (UP-NSRI), a DNA analysis with the text messages from respondent duly presented before
laboratory. She was a former professor at the University of the the Committee that the latter asked for(P1,000,000.00) in
Philippines in Diliman, Quezon City, where she developed the exchange for a favorable decision of the former’s pending case
Molecular Biology Program and taught Molecular Biology. with the CA.
In her testimony, Dr. Halos described the process for DNA The text messages were properly admitted by the Committee
paternity testing and asserted that the test had an accuracy since the same are now covered by Sec 1(k), Rule 2 of the Rules
rate of 99.9999% in establishing paternity. on Electronic Evidence65 which provides:
Petitioner opposed DNA paternity testing and contended that
it has not gained acceptability. “Ephemeral electronic communication” refers to telephone
Petitioner further argued that DNA paternity testing violates his conversations, text messages . . . and other electronic forms of
right against self-incrimination. communication the evidence of which is not recorded or
retained.”
ISSUE: Whether or not DNA Paternity testing violates Herrera’s right
against self-incrimination. Under Section 2, Rule 11 of the Rules on Electronic Evidence,
“Ephemeral electronic communications shall be proven by the
RULING: No. testimony of a person who was a party to the same or who has
It is true that in 1997, the Supreme Court ruled in Pe Lim vs CA personal knowledge thereof”
that DNA testing is not yet recognized in the Philippines and at In this case, complainant who was the recipient of said
the time when he questioned the order of the trial court, the messages and therefore had personal knowledge thereof
prevailing doctrine was the Pe Lim case; testified on their contents and import.
however, in 2002 there is already no question as to the Respondent herself admitted that the cellphone number
acceptability of DNA test results as admissible object evidence reflected in complainant’s cellphone from which the messages
in Philippine courts. This was the decisive ruling in the case of originated was hers.
People vs Vallejo (2002). Moreover, any doubt respondent may have had as to the
It is also considered that the Vallejo Guidelines be considered admissibility of the text messages had been laid to rest when
by the courts. The Vallejo Guidelines determines weight and she and her counsel signed and attested to the veracity of the
probative value of DNA test results. text messages between her and complainant.
The Vallejo Guidelines: It is also well to remember that in administrative cases,
1. how the samples were collected; technical rules of procedure and evidence are not strictly
2. how they were handled; applied.
3. the possibility of contamination of the samples; The Court has no doubt as to the probative value of the text
4. the procedure followed in analyzing the samples; messages as evidence in determining the guilt or lack thereof of
5. whether the proper standards and procedures were respondent in this case.
followed in conducting the tests; and
6. the qualification of the analyst who conducted the tests. Garcilliano vs HRET
GR 170338
Nunez vs. Cruz Apao
455 SCRA 288 Facts:
During the hype of Arroyo administration, a new controversy
Facts: arises. During the 2007 election the conversation of President
The complaint arose out of respondent’s solicitation of One Arroyo and the herein petitioner Virgilio Garciliano, COMELEC
Million Pesos (P1,000,000.00) from Zaldy Nuez (Complainant) in regional director, regarding the desire of the president to have
exchange for a speedy and favorable decision of the latter’s a favourable outcome in terms of his senatoriables.
pending case in the Court of Appeals. Such conversation was recorded and was played during the
Complainant earlier sought the assistance of Imbestigador. house of representative investigation. Because of such turn of
The crew of the TV program accompanied him to PAOCCF-SPG events, a petition was filed before the court praying that such
where he lodged a complaint against respondent for extortion. playing of the illegally seized communication was in violation of
Thereafter, he communicated with respondent again to verify if RA 4200 or the anti-wire tapping law.
the latter was still asking for the money and to set up a meeting Also such petition for injunction prays that the Senate
with her. committee be prevented from further conducting such
Upon learning that respondent’s offer of a favorable decision in investigation for the basic reason that there was no proper
exchange for One Million Pesos (P1,000,000.00) was still publication of the senate rules, empowering them to make such
standing, the plan for the entrapment operation was investigation of the unlawfully seized documents.
formulated by Imbestigador in cooperation with the PAOCC.
Issue: Whether or not there was proper publication of the rules as
to empower the senate to further proceed with their investigation?
During the hearing of this case, respondent would like the court
to believe that she never had any intention of committing a Held: No, the Supreme Court mentioned the following:
crime, that the offer of a million pesos for a favorable decision The Senate cannot be allowed to continue with the conduct of
the questioned legislative inquiry without duly published rules
of procedure, in clear derogation of the constitutional A civil case damages was filed by petitioner Socorro Ramirez in
requirement. the Quezon City RTC alleging that the private respondent, Ester
Garcia, in a confrontation in the latter’s office, allegedly vexed,
Section 21, Article VI of the 1987 Constitution explicitly insulted and humiliated her in a “hostile and furious mood” and
provides that "the Senate or the House of Representatives, or any of in a manner offensive to petitioner’s dignity and personality,”
its respective committees may conduct inquiries in aid of legislation contrary to morals, good customs and public policy.”
in accordance with its duly published rules of procedure." In support of her claim, petitioner produced a verbatim
transcript of the event and sought damages. The transcript on
The requisite of publication of the rules is intended to satisfy which the civil case was based was culled from a tape recording
the basic requirements of due process. of the confrontation made by petitioner.
Publication is indeed imperative, for it will be the height of As a result of petitioner’s recording of the event and alleging
injustice to punish or otherwise burden a citizen for the that the said act of secretly taping the confrontation was illegal,
transgression of a law or rule of which he had no notice private respondent filed a criminal case before the Pasay RTC
whatsoever, not even a constructive one. for violation of Republic Act 4200, entitled “An Act to prohibit
What constitutes publication is set forth in Article 2 of the Civil and penalize wire tapping and other related violations of
Code, which provides that "laws shall take effect after 15 days private communication, and other purposes.”
following the completion of their publication either in the Petitioner filed a Motion to Quash the Information, which the
Official Gazette, or in a newspaper of general circulation in the RTC later on granted, on the ground that the facts charged do
Philippines." not constitute an offense, particularly a violation of R.A. 4200.
Respondents justify their non-observance of the The CA declared the RTC’s decision null and void and denied the
constitutionally mandated publication by arguing that the rules petitioner’s MR, hence the instant petition.
have never been amended since 1995 and, despite that, they
are published in booklet form available to anyone for free, and Issue: W/N the Anti-Wiretapping Act applies in recordings by one of
accessible to the public at the Senate’s internet web page. the parties in the conversation
The Court does not agree. The absence of any amendment to
the rules cannot justify the Senate’s defiance of the clear and Held: Yes.
unambiguous language of Section 21, Article VI of the Section 1 of R.A. 4200 entitled, ”An Act to Prohibit and Penalized
Constitution. Wire Tapping and Other Related Violations of Private
The organic law instructs, without more, that the Senate or its Communication and Other Purposes,” provides:
committees may conduct inquiries in aid of legislation only in
accordance with duly published rules of procedure, and does Sec. 1. It shall be unlawful for any person, not being
not make any distinction whether or not these rules have authorized by all the parties to any private communication or spoken
undergone amendments or revision. word, to tap any wire or cable, or by using any other device or
The constitutional mandate to publish the said rules prevails arrangement, to secretly overhear, intercept, or record such
over any custom, practice or tradition followed by the Senate. communication or spoken word by using a device commonly known
The invocation by the respondents of the provisions of R.A. No. as a dictaphone or dictagraph or detectaphone or walkie-talkie or
8792,otherwise known as the Electronic Commerce Act of 2000, tape recorder, or however otherwise described.
to support their claim of valid publication through the internet
is all the more incorrect. The aforestated provision clearly and unequivocally makes it
R.A. 8792 considers an electronic data message or an electronic illegal for any person, not authorized by all the parties to any
document as the functional equivalent of a written document private communication to secretly record such communication
only for evidentiary purposes by means of a tape recorder.
In other words, the law merely recognizes the admissibility in The law makes no distinction as to whether the party sought to
evidence (for their being the original) of electronic data be penalized by the statute ought to be a party other than or
messages and/or electronic documents. different from those involved in the private communication.
It does not make the internet a medium for publishing laws, The statute’s intent to penalize all persons unauthorized to
rules and regulations. make such recording is underscored by the use of the qualifier
Given this discussion, the respondent Senate Committees, “any”. Consequently, as respondent Court of Appeals correctly
therefore, could not, in violation of the Constitution, use its concluded, “even a (person) privy to a communication who
unpublished rules in the legislative inquiry subject of these records his private conversation with another without the
consolidated cases. knowledge of the latter (will) qualify as a violator” under this
The conduct of inquiries in aid of legislation by the Senate has provision of R.A. 4200.
to be deferred until it shall have caused the publication of the A perusal of the Senate Congressional Records, moreover,
rules, because it can do so only "in accordance with its duly supports the respondent court’s conclusion that in enacting
published rules of procedure." R.A. 4200 our lawmakers indeed contemplated to make illegal,
Indeed the inquiry to be conducted by the senate in aid of unauthorized tape recording of private conversations or
legislation cannot proceed for the reason that the rules that communications taken either by the parties themselves or by
they will observe was not properly published as provided by the third persons.
Fundamental Law of the land. The nature of the conversations is immaterial to a violation of
Such inquiry if allowed without observance of the required the statute. The substance of the same need not be specifically
publication will put a person’s life, liberty and property at stake alleged in the information.
without due process of law. What R.A. 4200 penalizes are the acts of secretly overhearing,
Also, the further assertion of the senate that they already intercepting or recording private communications by means of
published such rules through their web page, in observance of the devices enumerated therein.
the RA 8792 or the Electronic Commerce Act was only viewed The mere allegation that an individual made a secret recording
by the court as matter of evidence and still does not conforme of a private communication by means of a tape recorder would
with what the constitution propounded. suffice to constitute an offense under Sec 1 of R.A. 4200.
In this regard the high court granted the petition for injunction As the Solicitor General pointed out in his COMMENT before
preventing the senate to conduct such inquiry in aid of the respondent court: “Nowhere (in the said law) is it required
legislation. that before one can be regarded as a violator, the nature of the
conversation, as well as its communication to a third person
should be professed.”
Petitioners contend that Section 4(a)(1) fails to meet the strict Section 4(b)(3) of the Cybercrime Law
scrutiny standard required of laws that interfere with the b) Computer-related Offenses:
fundamental rights of the people and should thus be struck (3) Computer-related Identity Theft. The intentional acquisition, use,
down. misuse, transfer, possession, alteration, or deletion of identifying
information belonging to another, whether natural or juridical, Likewise, engaging in sexual acts privately through internet
without right: Provided: that if no damage has yet been caused, the connection, perceived by some as a right, has to be balanced
penalty imposable shall be one (1) degree lower. with the mandate of the State to eradicate white slavery and
the exploitation of women.
Petitioners claim that Section 4(b)(3) violates the constitutional Hence, valid and constitutional.
rights to due process and to privacy and correspondence, and
transgresses the freedom of the press. Section 4(c)(2) of the Cybercrime Law
In Morfe v. Mutuc,it ruled that the right to privacy exists (2) Child Pornography. The unlawful or prohibited acts defined and
independently of its identification with liberty; it is in itself fully punishable by Republic Act No. 9775 or the Anti-Child Pornography
deserving of constitutional protection. Act of 2009, committed through a computer system: Provided, That
Relevant to any discussion of the right to privacy is the concept the penalty to be imposed shall be (1) one degree higher than that
known as the "Zones of Privacy." provided for in Republic Act No. 9775.
Zones of privacy are recognized and protected in our laws.
Within these zones, any form of intrusion is impermissible The above merely expands the scope of the Anti-Child
unless excused by law and in accordance with customary legal Pornography Act of 2009(ACPA) to cover identical activities in
process. The meticulous regard we accord to these zones arises cyberspace.
not only from our conviction that the right to privacy is a In theory, nothing prevents the government from invoking the
"constitutional right" and "the right most valued by civilized ACPA when prosecuting persons who commit child
men," but also from our adherence to the Universal Declaration pornography using a computer system. Actually, ACPAs
of Human Rights which mandates that, "no one shall be definition of child pornography already embraces the use of
subjected to arbitrary interference with his privacy" and "electronic, mechanical, digital, optical, magnetic or any other
"everyone has the right to the protection of the law against means."
such interference or attacks." Of course, the law makes the penalty higher by one degree
In the Matter of the Petition for Issuance of Writ of Habeas when the crime is committed in cyberspace. But no one can
Corpus of Sabio v. Senator Gordon, 535 Phil. 687, 714-715 complain since the intensity or duration of penalty is a
(2006). legislative prerogative and there is rational basis for such higher
Two constitutional guarantees create these zones of privacy: penalty.
(a) the right against unreasonable searchesand seizures, which The potential for uncontrolled proliferation of a particular piece
is the basis of the right to be let alone, and of child pornography when uploaded in the cyberspace is
(b) the right to privacy of communication and correspondence incalculable.
Hence, valid and constitutional.
In assessing the challenge that the State has impermissibly
intruded into these zones of privacy, a court must determine Section 4(c)(3) of the Cybercrime Law
whether a person has exhibited a reasonable expectation of (3) Unsolicited Commercial Communications. The transmission of
privacy and, if so, whether that expectation has been violated commercial electronic communication with the use of computer
by unreasonable government intrusion. system which seeks to advertise, sell, or offer for sale products and
Petitioners simply fail to show how government effort to curb services are prohibited unless:
computer-related identity theft violates the right to privacy and
correspondence as well as the right to due process of law. (i) There is prior affirmative consent from the recipient; or
Clearly, what this section regulates are specific actions: the
acquisition, use, misuse or deletion of personal identifying data (ii) The primary intent of the communication is for service and/or
of another. There is no fundamental right to acquire anothers administrative announcements from the sender to its existing users,
personal data. subscribers or customers; or
Further, petitioners fear that Section 4(b)(3) violates the
freedom of the press in that journalists would be hindered from (iii) The following conditions are present:
accessing the unrestricted user account of a person in the news
to secure information about him that could be published. (aa) The commercial electronic communication contains a simple,
The Court held, the press, whether in quest of news reporting valid, and reliable way for the recipient to reject receipt of further
or social investigation, has nothing to fear since a special commercial electronic messages (opt-out) from the same source;
circumstance is present to negate intent to gain which is
required by this Section. (bb) The commercial electronic communication does not purposely
Hence, valid and constitutional. disguise the source of the electronic message; and
Section 4(c)(1) of the Cybercrime Law (cc) The commercial electronic communication does not purposely
(c) Content-related Offenses: include misleading information in any part of the message in order
(1) Cybersex. The willful engagement, maintenance, control, or to induce the recipients to read the message.
operation, directly or indirectly, of any lascivious exhibition of sexual
organs or sexual activity, with the aid of a computer system, for The above penalizes the transmission of unsolicited commercial
favor or consideration. communications, also known as "spam."
The term "spam" surfaced in early internet chat rooms and
Petitioners claim that the above violates the freedom of interactive fantasy games.
expression clause.They express fear that private One who repeats the same sentence or comment was said to
communications of sexual character between husband and wife be making a "spam."
or consenting adults, which are not regarded as crimes under The Government, represented by the Solicitor General, points
the penal code, would now be regarded as crimes when done out that unsolicited commercial communications or spams are
"for favor" in cyberspace. In common usage, the term "favor" a nuisance that wastes the storage and network capacities of
includes "gracious kindness," "a special privilege or right internet service providers, reduces the efficiency of commerce
granted or conceded," or "a token of love (as a ribbon) usually and technology, and interferes with the owners peaceful
worn conspicuously." enjoyment of his property.
This meaning given to the term "favor" embraces socially Transmitting spams amounts to trespass to ones privacy since
tolerated trysts. The law as written would invite law the person sending out spams enters the recipients domain
enforcement agencies into the bedrooms of married couples or without prior permission. The OSG contends that commercial
consenting individuals. speech enjoys less protection in law.
These have never been outlawed as nuisance since people
The Act actually seeks to punish cyber prostitution, white slave might have interest in such ads. What matters is that the
trade, and pornography for favor and consideration. This recipient has the option of not opening or reading these mail
includes interactive prostitution and pornography, i.e., by
webcam.
ads. That is true with spams. Their recipients always have the of when the penal code provisions on libel were enacted. The
option to delete or not to read them. culture associated with internet media is distinct from that of
To prohibit the transmission of unsolicited ads would deny a print.
person the right to read his emails, even unsolicited commercial The internet is characterized as encouraging a freewheeling,
ads addressed to him. Unsolicited advertisements are anything-goes writing style. In a sense, they are a world apart in
legitimate forms of expression. terms of quickness of the readers reaction to defamatory
Hence, void for being unconstitutional. statements posted in cyberspace, facilitated by one-click reply
options offered by the networking site as well as by the speed
Articles 353, 354, and 355 of the Penal Code and Section 4(c)(4) of with which such reactions are disseminated down the line to
the Cyber Crime Law other internet users.
Hence, Section 4(c)(4) penalizing online libel is valid and
Petitioners dispute the constitutionality of both the penal code constitutional with respect to the original author of the post;
provisions on libel as well as Section 4(c)(4) of the Cybercrime but void and unconstitutional with respect to others who
Prevention Act on cyberlibel. simply receive the post and react to it.
2. Child pornography committed online as to which, charging the The court warrant required under this section shall only be
offender under both Section 4(c)(2) of Republic Act 10175 and issued or granted upon written application and the examination
Republic Act 9775 or the Anti-Child Pornography Act of 2009 also under oath or affirmation of the applicant and the witnesses he
constitutes a violation of the same proscription, and, in respect to may produce and the showing:
these, is void and unconstitutional. (1) that there are reasonable grounds to believe that any of the
crimes enumerated hereinabove has been committed, or is
being committed, or is about to be committed;
Section 8 of the Cybercrime Law (2) that there are reasonable grounds to believe that evidence
Sec. 8. Penalties. Any person found guilty of any of the punishable that will be obtained is essential to the conviction of any person
acts enumerated in Sections 4(a) and 4(b) of this Act shall be for, or to the solution of, or to the prevention of, any such
crimes; and (3) that there are no other means readily available evidence in a case, the mere furnishing to such service provider of
for obtaining such evidence. the transmittal document to the Office of the Prosecutor shall be
deemed a notification to preserve the computer data until the
Petitioners assail the grant to law enforcement agencies of the termination of the case.
power to collect or record traffic data in real time as tending to
curtail civil liberties or provide opportunities for official abuse. The service provider ordered to preserve computer data shall keep
They claim that data showing where digital messages come confidential the order and its compliance.
from, what kind they are, and where they are destined need
not be incriminating to their senders or recipients before they Petitioners in G.R. No. 203391 (Palatino v. Ochoa)claim that
are to be protected. Section 13 constitutes an undue deprivation of the right to
Petitioners invoke the right of every individual to privacy and to property. They liken the data preservation order that law
be protected from government snooping into the messages or enforcement authorities are to issue as a form of garnishment
information that they send to one another. of personal property in civil forfeiture proceedings. Such order
Undoubtedly, the State has a compelling interest in enacting prevents internet users from accessing and disposing of traffic
the cybercrime law for there is a need to put order to the data that essentially belong to them.
tremendous activities in cyberspace for public good. To do this, No doubt, the contents of materials sent or received through
it is within the realm of reason that the government should be the internet belong to their authors or recipients and are to be
able to monitor traffic data to enhance its ability to combat all considered private communications. But it is not clear that a
sorts of cybercrimes. service provider has an obligation to indefinitely keep a copy of
Informational privacy has two aspects: the right not to have the same as they pass its system for the benefit of users.
private information disclosed, and the right to live freely By virtue of Section 13, however, the law now requires service
without surveillance and intrusion.In determining whether or providers to keep traffic data and subscriber information
not a matter is entitled to the right to privacy, this Court has relating to communication services for at least six months from
laid down a two-fold test. The first is a subjective test, where the date of the transaction and those relating to content data
one claiming the right must have an actual or legitimate for at least six months from receipt of the order for their
expectation of privacy over a certain matter. The second is an preservation.
objective test, where his or her expectation of privacy must be At any rate, as the Solicitor General correctly points out, the
one society is prepared to accept as objectively reasonable. 429 data that service providers preserve on orders of law
U.S. 589 (1977) enforcement authorities are not made inaccessible to users by
Since the validity of the cybercrime law is being challenged, not reason of the issuance of such orders. The process of preserving
in relation to its application to a particular person or group, data will not unduly hamper the normal transmission or use of
petitioners challenge to Section 12 applies to all information the same.
and communications technology (ICT) users, meaning the large Hence, valid and constitutional
segment of the population who use all sorts of electronic
devices to communicate with one another. Consequently, the Section 14 of the Cybercrime Law
expectation of privacy is to be measured from the general Sec. 14. Disclosure of Computer Data. Law enforcement authorities,
publics point of view. Without reasonable expectation of upon securing a court warrant, shall issue an order requiring any
privacy, the right to it would have no basis in fact. person or service provider to disclose or submit subscribers
In Whalen v. Roe, 429 U.S. 589 (1977)the United States information, traffic data or relevant data in his/its possession or
Supreme Court classified privacy into two categories: decisional control within seventy-two (72) hours from receipt of the order in
privacy and informational privacy. Decisional privacy involves relation to a valid complaint officially docketed and assigned for
the right to independence in making certain important investigation and the disclosure is necessary and relevant for the
decisions, while informational privacy refers to the interest in purpose of investigation.
avoiding disclosure of personal matters. It is the latter rightthe
right to informational privacythat those who oppose The process envisioned in Section 14 is being likened to the
government collection or recording of traffic data in real-time issuance of a subpoena.
seek to protect. Besides, what Section 14 envisions is merely the enforcement
of a duly issued court warrant, a function usually lodged in the
Section 12 does not permit law enforcement authorities to look into hands of law enforcers to enable them to carry out their
the contents of the messages and uncover the identities of the executive functions. The prescribed procedure for disclosure
sender and the recipient. would not constitute an unlawful search or seizure nor would it
violate the privacy of communications and correspondence.
Section 12, of course, limits the collection of traffic data to Disclosure can be made only after judicial intervention.
those "associated with specified communications." But this Hence, valid and constitutional.
supposed limitation is no limitation at all since, evidently, it is
the law enforcement agencies that would specify the target Section 15 of the Cybercrime Law
communications. Sec. 15. Search, Seizure and Examination of Computer Data. Where a
The power is virtually limitless, enabling law enforcement search and seizure warrant is properly issued, the law enforcement
authorities to engage in "fishing expedition," choosing authorities shall likewise have the following powers and duties.
whatever specified communication they want. This evidently
threatens the right of individuals to privacy. Within the time period specified in the warrant, to conduct
The Court must ensure that laws seeking to take advantage of interception, as defined in this Act, and:
these technologies be written with specificity and definiteness (a) To secure a computer system or a computer data storage
as to ensure respect for the rights that the Constitution medium;
guarantees. (b) To make and retain a copy of those computer data secured;
Hence, void for being unconstitutional (c) To maintain the integrity of the relevant stored computer data;
(d) To conduct forensic analysis or examination of the computer
Section 13 of the Cybercrime Law data storage medium; and
Sec. 13. Preservation of Computer Data. The integrity of traffic data (e) To render inaccessible or remove those computer data in the
and subscriber information relating to communication services accessed computer or computer and communications network.
provided by a service provider shall be preserved for a minimum
period of six (6) months from the date of the transaction. Content
data shall be similarly preserved for six (6) months from the date of
receipt of the order from law enforcement authorities requiring its
preservation.
Law enforcement authorities may order a one-time extension for Pursuant thereof, the law enforcement authorities may order
another six (6) months: Provided, That once computer data any person who has knowledge about the functioning of the
preserved, transmitted or stored by a service provider is used as computer system and the measures to protect and preserve the
computer data therein to provide, as is reasonable, the But since the non-compliance would be punished as a violation
necessary information, to enable the undertaking of the search, of (P.D.) 1829, PENALIZING OBSTRUCTION OF APPREHENSION
seizure and examination. AND PROSECUTION OF CRIMINAL OFFENDERS. Section 20
Law enforcement authorities may request for an extension of necessarily incorporates elements of the offense which are
time to complete the examination of the computer data storage defined therein.
medium and to make a return thereon but in no case for a Thus, the act of non-compliance, for it to be punishable, must
period longer than thirty (30) days from date of approval by the still be done "knowingly or willfully." There must still be a
court. judicial determination of guilt, during which, as the Solicitor
Petitioners challenge Section 15 on the assumption that it will General assumes, defense and justifications for non-compliance
supplant established search and seizure procedures. may be raised. Thus, Section 20 is valid insofar as it applies to
The exercise of these duties do not pose any threat on the the provisions of Chapter IV which are not struck down by the
rights of the person from whom they were taken. Section 15 Court.
does not appear to supersede existing search and seizure rules Hence, valid and constitutional.
but merely supplements them.
Hence, valid and constitutional. Sections 24 and 26(a) of the Cybercrime Law
Section 17 of the Cybercrime Law Sec. 24. Cybercrime Investigation and Coordinating Center. There is
Sec. 17. Destruction of Computer Data. Upon expiration of the hereby created, within thirty (30) days from the effectivity of this
periods as provided in Sections 13 and 15, service providers and law Act, an inter-agency body to be known as the Cybercrime
enforcement authorities, as the case may be, shall immediately and Investigation and Coordinating Center (CICC), under the
completely destroy the computer data subject of a preservation and administrative supervision of the Office of the President, for policy
examination. coordination among concerned agencies and for the formulation and
enforcement of the national cybersecurity plan.
Petitioners claim that such destruction of computer data
subject of previous preservation or examination violates the Sec. 26. Powers and Functions. The CICC shall have the following
users right against deprivation of property without due process powers and functions:
of law.
But, as already stated, it is unclear that the user has a (a) To formulate a national cybersecurity plan and extend immediate
demandable right to require the service provider to have that assistance of real time commission of cybercrime offenses through a
copy of the data saved indefinitely for him in its storage system. computer emergency response team (CERT); x x x.
If he wanted them preserved, he should have saved them in his
computer when he generated the data or received it. He could Petitioners mainly contend that Congress invalidly delegated its
also request the service provider for a copy before it is deleted. power when it gave the Cybercrime Investigation and
Hence, valid and constitutional. Coordinating Center (CICC) the power to formulate a national
cybersecurity plan without any sufficient standards or
Section 19 of the Cybercrime Law parameters for it to follow.
Sec. 19. Restricting or Blocking Access to Computer Data. When a In order to determine whether there is undue delegation of
computer data is prima facie found to be in violation of the legislative power, the Court has adopted two tests: the
provisions of this Act, the DOJ shall issue an order to restrict or block completeness test and the sufficient standard test.
access to such computer data. 1) Under the first test, the law must be complete in all its
terms and conditions when it leaves the legislature such
Petitioners contest Section 19 in that it stifles freedom of that when it reaches the delegate, the only thing he will
expression and violates the right against unreasonable searches have to do is to enforce it.
and seizures. 2) The second test mandates adequate guidelines or
The Solicitor General concedes that this provision may be limitations in the law to determine the boundaries of the
unconstitutional. But since laws enjoy a presumption of delegates authority and prevent the delegation from
constitutionality, the Court must satisfy itself that Section 19 running riot. Gerochi v. Department of Energy, 554 Phil.
indeed violates the freedom and right mentioned. 563 (2007).
Not only does Section 19 preclude any judicial intervention, but
it also disregards jurisprudential guidelines established to Here, the cybercrime law is complete in itself when it directed
determine the validity of restrictions on speech. the CICC to formulate and implement a national cybersecurity
Restraints on free speech are generally evaluated on one of or a plan. Also, contrary to the position of the petitioners, the law
combination of three tests: the dangerous tendency doctrine, gave sufficient standards for the CICC to follow when it
the balancing of interest test, and the clear and present danger provided a definition of cybersecurity.
rule. Section 19, however, merely requires that the data to be Cybersecurity refers to the collection of tools, policies, risk
blocked be found prima facie in violation of any provision of the management approaches, actions, training, best practices,
cybercrime law. assurance and technologies that can be used to protect cyber
Taking Section 6 into consideration, this can actually be made environment and organization and users assets.
to apply in relation to any penal provision. It does not take into This definition serves as the parameters within which CICC
consideration any of the three tests mentioned above. should work in formulating the cybersecurity plan.
The Court is therefore compelled to strike down Section 19 for Further, the formulation of the cybersecurity plan is consistent
being violative of the constitutional guarantees to freedom of with the policy of the law to "prevent and combat such [cyber]
expression and against unreasonable searches and seizures. offenses by facilitating their detection, investigation, and
prosecution at both the domestic and international levels, and
Section 20 of the Cybercrime Law by providing arrangements for fast and reliable international
Sec. 20. Noncompliance. Failure to comply with the provisions of cooperation." This policy is clearly adopted in the interest of
Chapter IV hereof specifically the orders from law enforcement law and order, which has been considered as sufficient
authorities shall be punished as a violation of Presidential Decree standard.
No. 1829 with imprisonment of prision correctional in its maximum Hence, Sections 24 and 26(a) are likewise valid and
period or a fine of One hundred thousand pesos (Php100,000.00) or constitutional.
both, for each and every noncompliance with an order issued by law
enforcement authorities.
2. Relevant questions – pertaining to the issue under d. Excessive activity of the Adam’s apple – on account of
investigation (ex: Did you shoot to death Mr. X?) dryness of the throat, subject will swallow saliva which
causes frequent upward and downward movement of
3. Control questions – unrelated to the matter under investigation the Adam’s apple.
but are of similar nature although less serious as compared to
those relevant questions (ex: Have you ever used a gun?) e. Fidgeting – constantly moving about in the chair,
pulling his ears, rubbing his face, picking and tweaking
c. Post-test interrogation the nose, etc. Indicative of nervous tension.
b. Based on the state of mind: The State shall endeavor to provide free medical care to
i. Rational offenders – commit crime with motive or paupers.”
intention
ii. Irrational offenders – commit crime without knowing d. Patients Bill of Rights
the nature and quality of his act.
1. Right to Life
c. Based on proficiency 2. Right to Quality Health Care and Humane Treatment
i. Ordinary offenders – engaged in crimes which require 3. Right to Informed Consent to Diagnostic and Treatment
limited skill Procedures
ii. Professional offenders – commit crimes which 4. Right to Religious Belief
require special skills rather than violence. 5. Right to Privacy
6. Right of Disclosure of Information
d. Psychological classification 7. Right to Confidential Information
i. Emotional offenders – commit crimes in the heat of 8. The Right to Choose His Physicians
passion, anger, or revenge. 9. Right to Treatment
ii. Non-emotional offenders – commit crimes for 10. Right to Refuse Necessary Treatment
financial gain and are usually recidivist or repeaters. 11. Other Rights of Patients When Confined In The Hospital
i. RA 9262 VAWC
- Melgar vs. People G.R. No. 223477 (VAWC)
- STEVEN R. PAVLOW, Petitioner, v. CHERRY L.
MENDENILLA, Respondent. G.R. No. 181489, April 19, 2017 (VAWC)
- AAA, Petitioner vs.BBB, Respondent, G.R. No. 212448
- Garcia vsDrilon GR 179267