TRADEMARK INFRINGEMENT: AN ANALYSIS ON THE IMPLICATIONS OF
CYBERSQUATTING UNDER CYBERCRIME PREVENTION ACT OF 2012 TO
LEGAL STUDIES STUDENTS IN LYCEUM OF THE PHILIPPINES
UNIVERSITY CAVITE
An Undergraduate Thesis Presented to the
Faculty of the College of Liberal Arts and Education
Lyceum of the Philippines University Cavite
In Partial Fulfillment of the
Requirements for the Degree of
Bachelor of Arts in Legal
Studies
Zyrllen Ceasar V. Buhay
Ezra Aurora F.
Guinaban Tricia G.
Simbajon
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
TABLE OF CONTENTS
TITLE PAGE
TABLE OF CONTENTS
LIST OF TABLES AND FIGURES
INTRODUCTION
Background of the Study 3
Statement of the Problem 6
Research Objectives 7
Significance of the Study 8
Scope and Delimitation 9
Theoretical Framework 10
Conceptual Framework 12
Definition of Terms 13
REVIEW OF RELATED LITERATURE
The Primary Objective of Cybercrime Prevention Act of 2012 18
Cybersquatting Incidents in the Philippines 20
Trademark Infringement: Cybersquatting Under Republic Act 10175 22
Cybersquatting: Not Viewed as a Prominent Concern in the Philippines 23
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
No Case of Cybersquatting Raised in the Philippine Supreme Court 25
Policies and Mandates to Solve Trademark Infringement Disputes 26
Types of Cybersquatting 28
Domain Name Basics: Understanding Trademark Infringement 32
Typosquatting: The Infamous Category of Cybersquatting 33
Heightened Awareness on Domain Name Infringement
35
Diverging Methods in Preventing Cybersquatting 36
Synthesis 38
METHODOLOGY
Research Design 41
Variables and Measures 43
Research Locale and Research Respondents 44
Sampling Design and Technique 45
Research Instrument 46
Data Gathering Procedure 47
Data Analysis and Statistical Treatment 49
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
CHAPTER I
INTRODUCTION
The fundamental knowledge and guidelines that govern the study proposal
procedures are presented in this chapter. It includes the objectives and concepts that
collectively make up the research’s framework. It also defines the terms that are
operationally used throughout the study and discusses the study’s significance, scope, and
limitations.
1.1 Background of the Study
Cybersquatting is the act of purchasing, selling, or using a domain name to make
money off the reputation of another person’s trademark. It usually refers to acquiring
domain names that incorporate the names of existing companies to sell them to those
companies for a profit. The act that has come to be known as “cybersquatting” first
appeared when most businesses were still ignorant of the lucrative online opportunities.
Some enterprising individuals registered popular company names as domain names to
sell the names back to the organizations once they realized what they were doing.
Opportunities for cyber squatters are rapidly dwindling as more and more companies
realize how important it is to secure their domain names. (Kaspersky, 2023)
It is stated in the Official Gazette of the Philippines that cybersquatting is
punishable under the Republic Act No. 10175 also known as the Cybercrime Prevention
Act of the Philippines. Section 5 of the Republic Act No. 10175 states that cybersquatting
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
is the acquisition of a domain name over the internet, in bad faith, to profit, mislead,
destroy the reputation, and deprive others of registering the same, if such a domain name
is:
a.) Similar, identical, or confusingly similar to an existing trademark registered
with the appropriate government agency at the time of the domain name
registration;
b.) Identical or in any way similar to the name of a person other than the
registrant, in case of a personal name; and
c.) Acquired without right or with intellectual property interests in it.
Cybersquatting shall be punished with imprisonment or prison mayor or a fine of
at least two hundred thousand pesos (P200,000.00) up to a maximum amount
commensurate to the damage incurred, or both: provided, that if it is committed against
critical infrastructure, the penalty of reclusion temporal, or a fine of at least five hundred
thousand pesos (P500,000.00) up to maximum amount commensurate to the damage
incurred, or both shall be imposed. However, despite the long existence of the law, a lot
of citizens are still not knowledgeable about the implications and repercussions of
cybersquatting in their lives. A lot of Filipinos still use similar or almost identical domain
names when creating websites that are subject to trademark infringement punishable as
above mentioned.
According to McCargo, H. (2022), cybersquatting can take many various forms,
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
all of which are prohibited. Typosquatting is one of them. Typosquatting is one of the
most
common types of cybersquatting. In this instance, the cybersquatter deliberately buys
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
misspelled domain names for popular brands. If a domain name is typed incorrectly, the
intention is to redirect users to a malicious website. The basic goal of typosquatting is to
change a domain’s original spelling by adding or removing digits, characters, or periods.
Additionally, it involves altering the order of the letters or words within a domain.
Typosquatting is the practice of profiting from possible errors. Second, identity theft.
Cybersquatting can be used for identity theft because it allows someone to create a
comparable Uniform Resource Locator (URL) using the identity of a business. A user
visiting that business’s website might instead fall on the fake site. At the given moment,
the cybersquatter effectively took control of the target’s digital identity. Third, there is
the possibility of name-jacking on social media. Creating a profile that represents a
famous or well-known person without a registered domain name may be termed
cybersquatting. Given the proliferation of fan sites currently available online, this is a
murky topic. However, if the website begins selling goods that infringe on the victim’s
brand or without legal license, this might help strengthen the case for cybersquatting.
Lastly, there is Reverse Domain Name Hijacking (RDNH), also known as reverse
cybersquatting, is a practice that is similar to cybersquatting in several aspects. While
cybersquatting is the purchase of a domain name that incorporates a trademark with the
intention of profiting from that trademark, reverse domain hijacking is a little different. It
occurs when a person or business falsely claims to possess a trademark and then takes
unreasonable actions to take away your lawful domain name.
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
Since the 1990s, cybersquatting has been a problem. This is why governments as
well as organizations have enacted legislation to provide victims a fighting chance.
Continuously, it is no secret that it is one of the forms of cybercrime that has shown an
increasing pattern in 2020 and 2021, and it remains confusing to some individuals
(Armstrong, V., 2019). We are also aware of how reputation and credibility can be
exceedingly difficult to acquire but easily lost, causing considerable harm to the
business’s image and legitimacy. The researchers have chosen Cybersquatting to be the
subject of their study because they want people to be familiar with the Republic Act No.
10175 also known as Cybersquatting under the Cybercrime Prevention Act of 2012 to at
least have an elementary knowledge of the law so that they would understand its purpose
and where it came from and what it entails.
1.2. Statement of the Problem
The study aims to determine the implications and repercussions of Republic Act
10175 or the Cybercrime Prevention Act of 2012 in using domain names against
trademark infringement to Legal Studies students in Lyceum of the Philippines
University Cavite.
Specifically, this seeks to answer the following questions:
1. Demographic profile of the respondents:
1.1 Age;
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
1.2 Sex; and
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
1.3 Year level.
2. Have the respondents encountered trademark infringement in the online
community?
3. How knowledgeable are students in terms of cybersquatting, and how do they
seek to adhere against such online infringement?
4. What are the implications of failing to protect intellectual property rights,
including trademarks and domain names, in the online environment?
5. How effective is the implementation and enforcement of Republic Act 10175 in
combating cybersquatting in the Philippines?
1.3 Research Objectives
Generally, this study aims to make an in-depth analysis about the implications of
cybersquatting under Cybercrime Prevention Act of 2012.
Specifically, the study aims to attain the following objectives:
1. Determine the perception of Legal Studies students in Lyceum of the Philippines
University Cavite on cybersquatting and its connection to trademark
infringement;
2. Assess the implications of cybersquatting to Legal Studies students in Lyceum of
the Philippines University Cavite;
3. Depict the effect of such implications to the effectivity of the law concerning
trademark infringement; and
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
4. Identify the issue that the Philippine government should consider in implementing
the Cybercrime Prevention Act concerning cybersquatting.
1.4 Significance of the Study
The acquisition of the research findings will be beneficial to the following
individuals:
1. Legal Studies Students. The findings of this study will help the Legal Studies
students to comprehend cybersquatting and trademark infringement issues within
the Cybercrime Prevention Act of 2012, and contribute to a better understanding
of the effectiveness of existing legal frameworks.
2. Business Owners. The study is significant to business owners because
cybersquatting can harm their brand reputation, lead to financial losses, and
confuse consumers, impacting their ability to maintain customer trust and loyalty.
The study can reveal the disproportionate impact of cybersquatting on small
businesses that may lack resources for legal action, leading to policy
recommendations for their protection. Moreover, this will outline how trademark
infringement affects their businesses legally.
3. Domain Name Registration Practices. Investigating cybersquatting can inform
discussions on domain registration policies, including the need for stricter
verification procedures to prevent malicious actors from acquiring domains. Thus,
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
this will provide a cohesive study on the possibilities that may arise from
trademark infringement.
4. Consumer Trust. This study can reveal how cybersquatting affects consumer
trust in online brands, potentially leading to more informed consumer choices and
increased vigilance against fraudulent websites. Hence, consumers in any
platform will be able to comprehend the implications of cybersquatting in the
products they purchase.
5. Legislators. This study will serve as a guide for legislators in understanding the
implications of the current law affecting cybersquatting. The researchers’
objective is to line out its implications for possible points of the Cybercrime
Prevention Act 2012 for amendments. Legislators can create effective and
enforceable laws that can deter cybercrime, protect individuals and businesses,
and establish a legal framework for dealing with evolving digital threats.
6. Society. This study will enlighten the people of the true nature of the Cybercrime
Law, specifically the implications of cybersquatting. The researchers aim to
present the history and background of the law so as to know where it came from,
and to outline how such affects the society in its every sector. It is crucial for
society to protect intellectual property rights, foster fair competition, and maintain
trust and integrity in online transactions.
1.5 Scope and Delimitation
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
The scope of this study is limited only to all students enrolled under Bachelor of
Arts in Legal Studies for Academic Year 2023-2024 at the Lyceum of the Philippines
University Cavite, excluding the researchers.
The study was focused on determining the perceptions of the Legal Studies
students by subjecting them to a set of questions related to cybersquatting, trademark
infringement and the Cybercrime Prevention Act of 2012. These questions are derived
from the study of Khan et. Al (2015), and were modified according to the information
needed in the research study.
1.6 Theoretical Framework
Bottom-Up Approach and Institutional Fit Approach
The bottom-up approach, which asserted that “implementation is in essence a
political procedure,” emerged as the ideal counterargument to skeptic top-down models
in which regulations is devised by political leaders and manually executed through
impartial providers of services and street-level bureaucrats. Notable die-hard bottom-
uppers include Berman (1978 and 1980), Lipsky (1978), Hull and Hjern (1987), who
contend that a more precise comprehension of how policies are implemented is likely to
be acquired through investigating its actual execution.
Implementation happens on two levels, according to Berman (1978): macro- and
micro-level implementation. The government program is created by centrally placed
actors
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
at the macro-implementation level; at its micro-implementation level, local groups respond
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
to the macro-level plans by creating their particular initiatives and putting them into
action. According to Berman, the “interaction of a rule with the micro-level institutional
setting” is the primary cause for the majority challenges with implementation. The
regulations developed at the national level may be dominated by the local organizations
and context- specific variables, and legislators are unlikely to be able to regulate the
processes. As a result, there are significant differences in how the same national policy is
carried out locally (Palumbo, Maynard-Moody, and Wright 1984). Theorists of the
bottom-up approach have additionally come to conclusions that there certainly cannot be
a “context free” theory of implementations (Palumbo, Maynard-Moody, and Wright,
1984). Implementation is more inclined to fall short if local administrators, or those at the
“street level,” “are lacking in the autonomy and opportunity of adapting regulations to
their own realities.” Additionally, they contend that in order to possess a better grasp of
the course of a given policy, street- level bureaucrats’ activities must be taken as well into
account because it is at the small scale that directly impacts citizens on ground level
(Palumbo 1984).
In order to understand the discrepancy between the initial policy directions
imagined at the national level and their actual execution on the ground, this study will
apply Michael Lipsky’s notion of street-level bureaucrats including their utilization of
freedom of choice. Michael Lipsky described street-level bureaucrats in his seminal work
as “public service workers that relate closely with citizens in the ordinary course of their
duties, and who also have significant control in the performance of their duties” (Meyers
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
and Vorsanger 2003). As a result, they play a distinctive and important part in
the
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
implementation process. Only law enforcement officials, city or provincial prosecutors,
state counsels, government attorneys, judges, and other individuals involved in
cybercrime who directly affect policy execution would be regarded street-level
bureaucrats in this study. This presents us once again to the idea of “institutional fit,”
which means that new programs cannot simply be created at the national level and
brought in in a particular location, particularly if street-level bureaucrats relish some
discretionary freedom (Lejano and Salvador 2006). The amount of alignment between the
policy and its locale context, which is mostly shaped by local bureaucrats and other social
influences, should also be taken into account by legislators (Lejano and Salvador 2006).
1.7 Conceptual Framework
The research study adopts the system approach (Input-Process-Output) in
describing the conceptual framework of the study. An effective method for both
analyzing and capturing the key elements of a transformation process is provided by the
IPO Model. The paradigm below serves as an illustration of the study’s conceptual
framework.
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
Figure 1. A Table Showing the Input Process Output Model of the Study
The study’s input box contains information about the age, sex, and academic year
of the Legal Studies students. In accordance with the Cybercrime Prevention Act of 2012,
it also incorporates some ideas of trademark infringement and cybersquatting.
The procedure box demonstrates how survey questions are distributed while using
both qualitative and quantitative data collection for the undertaking. The mean,
percentage, frequency count, and standard deviation were used to evaluate and interpret
the data. Answers were gathered using SWOT analysis in essay-style questions.
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
The study’s findings are displayed in the output box, giving legal studies students
at the Lyceum of the Philippines University Cavite a thorough understanding of
cybersquatting, trademark infringement, and the Cybercrime Prevention Act of 2012 and
its repercussions.
1.8 Definition of Terms
The following terminologies are operationally used in the study:
Acquisition – refers to the process of one company or organization purchasing or
taking over another company or its assets.
Copyright – a legal protection granted to the creators of original creative works,
such as literature, music, art, software, and other intellectual property.
Cyberbullying – a form of bullying that takes place through digital
communication technologies, such as the internet, social media platforms, text messages,
or other digital means. It involves using these technologies to harass, intimidate, threaten,
or harm others, typically with the intention of causing emotional distress or harm.
Cybercriminals - are individuals or groups who engage in criminal activities
using digital technologies, the internet, and computer networks.
Cybercrime – refers to criminal activities that are carried out using computers,
computer networks, and the internet.
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
Cybersex – refers to a form of sexual interaction or communication that takes
place over the internet or through digital devices. It typically involves individuals using
text, audio, video, or other digital means to engage in sexually explicit conversations or
activities with one another.
Cyber squatters – often take advantage of the fact that some individuals or
companies may want to secure domain names related to their brands or trademarks and
are willing to pay a premium to acquire them.
Cybersquatting – refers to the act of registering, trafficking in, or using an
internet domain name with the intent to profit from the goodwill of someone else’s
trademark.
Damage – refers to harm, injury, or loss suffered by an individual, group, or
entity as a result of the actions or negligence of another party. Damages are a crucial
concept in legal contexts, particularly in civil law, where they are a remedy sought by a
party who has been wronged or injured by another.
Domain name – is a piece of text that corresponds to an IP address that is
alphanumeric and is used to access websites from client software.
Enforcement – refers to the act of compelling or ensuring compliance with a law,
rule, regulation, or agreement.
Implementation – refers to the process of putting a plan, idea, or concept into
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
action or practice.
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
Imprisonment – refers to the act of confining or incarcerating someone, typically
as a legal penalty or punishment for committing a crime.
Infringement – refers to the violation or a breach of a law, regulation, rule, right,
or agreement, particularly in the context of intellectual property or legal rights.
Intellectual Property – refers to the legal rights that are granted to individuals or
entities for their creations or inventions of the mind.
Law suit – A lawsuit is a legal dispute or case that is brought before a court of
law for resolution. It is a formal legal proceeding in which one party, known as the
plaintiff, files a complaint or a claim against another party, known as the defendant,
alleging that the defendant has violated a legal right, committed a wrongdoing, or caused
harm.
Liberty – is a concept that refers to the state of being free from oppressive
restrictions or control. It encompasses the idea of personal freedom, individual rights, and
the ability to make choices and decisions without undue interference from external
authorities or forces.
Penalty – punishment, fine, or adverse consequence imposed on an individual,
group, or entity for violating a law, rule, regulation, contract, or some established
standard of conduct.
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
Phishing attacks – a type of cyberattack in which cybercriminals use deceptive
tactics to trick individuals or organizations into divulging sensitive information, such as
login credentials, financial data, or personal details.
Stipulations – conditions, terms, or requirements that are specified in a contract,
agreement, or legal document.
Trademark – is a legal concept that refers to a unique symbol, word, phrase,
design, or combination thereof that is used to identify and distinguish the goods or
services of one business or individuals from those of others.
Trademark infringement – is an unauthorized use of a brand or service mark
which might be in relation to products or services, and could cause misunderstandings,
deception, or confusion regarding the true source of a good or service.
Trademark law – a legal framework that governs the protection of trademarks. A
trademark is a distinctive sign, symbol, word, or phrase used by businesses to identify
and distinguish their products or services from those of others.
Trafficking – refers to the illegal trade or transport of goods, services, or
individuals, often involving activities that exploit vulnerable people for various purposes,
including forced labor, sexual exploitation, or other forms of abuse.
Typosquatting – is one of the most common types of cybersquatting. In this
instance, the cyber squatter deliberately buys misspelled domain names for popular
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
brands.
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
If a domain name is typed incorrectly, the intention is to redirect users to a malicious
website.
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
CHAPTER II
LITERATURE REVIEW
The researchers were able to select a number of well-known studies from the wide
variety of resources available. There are numerous materials available online, as well as
some in the university library. A number of critiques of the Cybercrime Prevention Act of
2012, including cybersquatting, which constitutes one of particularly obscure unlawful
practices covered by its provisions, emerged as the general public monitored the
evolution of the law.
2.1 Local Studies
The Primary Objective of Cybercrime Prevention Act of 2012
According to Dizon (2008), the increase in Internet utilization in the
Philippines has concurrently resulted in an escalation in instances of
cybersquatting, which refers to the illicit act of registering and employing a
domain name associated with a prominent brand or trademark that is owned by
another entity. The increasing prevalence of local domain name speculators,
commonly referred to as domainers, is resulting in a higher incidence of
cybersquatting instances within the nation. The COVID-19 pandemic expedited
the utilization of digital breakthroughs as individuals, constrained by mobility
restrictions, hastened their transition to online platforms. Nevertheless, the
proliferation of connections
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
is accompanied by a corresponding rise in cyber dangers. On an individual basis,
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
Filipino individuals exhibit vulnerability to instances of data breaches and
infringements upon their privacy in the online realm.
Cybercrime Prevention Act of 2012 is enacted to address and mitigate
cybercrimes through proactive measures, including pre-emption, prevention, and
prosecution. These cybercrimes encompass a range of illegal activities, such as
violations against the privacy, confidentiality, integrity, and availability of
computer data and systems. Additionally, the act also encompasses offenses that
are directly related to computers, as well as those involving objectionable
material. Similarly, Republic Act 10173 aimed to address identity theft and
unsolicited electronic messages. However, there were other factions that
expressed opposition towards the inclusion of Internet posts under the purview of
libel law. As a result, the Supreme Court intervened by issuing a temporary
restraining order and a status quo ante decree. Moreover, this legislation stipulates
that legal action taken under the Cybercrime Prevention Act of 2012 would not
exempt individuals from any legal consequences for breaching any section of the
Revised Penal Code, as modified, or any other relevant statutes. (Villanueva,
2021)
In connection to cybersquatting, the data provided by the World
Intellectual Property Organization (WIPO) stipulates that there was a 1.3 percent
increase in the number of domain name disputes in 2017 compared to the
previous year. In the year 2018, the United States accounted for the most number
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
of conflicts, reaching
a cumulative total of 920. Certain countries, such as the Philippines and the United
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
States, have implemented strict regulations against cybersquatting that go beyond
the standard provisions of trademark law. In contrast, nations like China have
more relaxed laws pertaining to the protection of intellectual property in the
online realm, hence, creating an environment conducive to the proliferation of
cybersquatting activities. Chinese individuals who engage in squatting activities
have gained notoriety for their practice of registering domain names that have a
resemblance to prominent American firms. An instance worth mentioning is a
legal dispute initiated by Pinterest, a platform for sharing photographs, against an
individual from China. The lawsuit alleges that the said individual registered the
domain name “pintersts.com” with malicious intent. Additionally, the individual
was accused by the corporation of utilizing the distinctive 'red-coloured’ logo
associated with Pinterest on his website, a practice intended solely for the purpose
of displaying adverts. The individual engaged in cybersquatting activities in
China was subjected to a monetary penalty amounting to USD 7.2 million, which
included the costs incurred for judicial proceedings.
Cybersquatting Incidents in the Philippines
A cybersquatting incident is causing a stir in the Philippine e-commerce
industry and domain squatting industry rocks the Philippine e-commerce start up
scene in the Philippines. A local blog that focuses on tech startups, The Bobbery,
revealed that daily deals website Metrodeal is said to be the owner of a number of
domain names that are connected to pornographic websites and are all versions of
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
the names of competing companies. The list of web addresses that were link to
adult content like cash-cash-pinoy.com, cashcashpinoys.com, cashcash-
pinoy.com, deal- grocer.com, dealdozens.com, ensogos.com, and kerendeals.com
were reported to be a subject of trademark infringement.
Cybersquatting is the act of registering a domain name that is confusingly
similar to a well-known website. The person who registered it typically intends to
capitalize on the domain name or even harm the reputation of the intended
website. No matter who the site’s owner is, the prohibitions banning
cybersquatting that are part of the new law are unable to be put into effect due to
the Cybercrime Law’s indefinite suspension as a result of debates over online
libel. Many media professionals, journalists, and citizens reject the Cybercrime
Prevention Act of 2012 (RA 10175), however a Catholic leader by the name of
Legazpi Bishop Joel Baylon asked the populace to allow the newly enacted law
the chance to apply the bill’s provisions. The Chairman of the CBCP Episcopal
Commission on Youth, Legazpi Bishop Joel Baylon, acknowledged that the law
has advantages and disadvantages.
Additionally, Baylon said that citizens who were victims of cyberbullying
and e-libel have a right to protection against those who use the internet with
harmful intent. This protection extends beyond just protecting politicians,
celebrities, and other well-known members of society. Thus, Baylon asked the
administration to
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
execute the IRR, which will negate all of the public’s negative sentiments and
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
assertions. According to the law’s provisions, it is illegal to access or use any
computer data, publish or distribute illegal files online, access or use any account
passwords online, use any illegal online services, or engage in cybersex or child
pornography, all of which are pervasive in today’s society. (Krisa, 2013).
Trademark Infringement: Cybersquatting Under Republic Act 10175
Cited in the study of Banzuela and Garcia in 2015, ten years after former
congressman Eric D. Signson’s original proposal, Republic Act 10175, more
commonly referred to as the Cybercrime Prevention Act of 2012, was passed into
law. The passage of the law required some time because it was necessary for
lawmakers and other individuals to comprehend the scope of cybercrime
including whether or not the stipulations for punishment under Republic Act
8792, the E- Commerce Law, were enough. Hence, when these issues emerged,
Republic Act 10175 was enacted. In Philippine law, cybercrimes are enumerated
as follows: (1) Illegal Access; (2) Illegal Interception; (3) Data Interference; (4)
System Interference; (5) Misuse of Devices; (6) Computer-Related Forgery; (7)
Computer- related Identity Theft; (8) Computer-related Fraud; (9) Cybersex; (10)
Child Pornography; (11) Libel; (12) Aiding or Abetting in the commission of
cybercrime;
(13) Attempt in the commission of cybercrime; and the most innominate
cybercrime in the Philippines, (14) cybersquatting.
According to the stipulations of RA 10175, cybersquatting, or the
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
acquisition of domain name over the Internet in bad faith to profit, mislead, destroy
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
reputation, and deprive others from the registering of the same, includes those
existing trademark at the time of registration; the names of persons other than the
registrant; and acquired with intellectual property interests in it. Those who get
domain names of prominent brands and individuals which in turn are used to
damage their reputation, can be sued under such provision. This constitutes the
fact that the freedom of expression and infringement on trademarks or names of
persons are treated separately because a party may exercise his liberty to express
himself without the need to violate the trademarks of brand names or such of a
person.
Moreover, the penalty prescribed under the Revised Penal Code of the
Philippines indicate Prision Mayor or imprisonment of six years and one day up
to twelve years or a fine of at least five hundred thousand pesos (P500,000.00) up
to a maximum amount commensurate to the damage incurred or both shall be
imposed, or if committed against critical infrastructure, Reclusion temporal
(imprisonment for twelve years and one day to twenty years) or a fine of at least
five hundred thousand pesos (P500,000.00) up to a maximum amount
commensurate to the damage incurred or both. (Philippine Republic Act 10175,
2012)
Cybersquatting: Not Viewed as a Prominent Concern in the Philippines
In a study of Secure Connections which is an Initiative of the Asia
Foundation, it was reported in the year 2022 that the underlying essence of the
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
Internet is in the interconnectedness and dissemination of information. The act of
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
exchanging knowledge facilitates the acquisition of insights. Insights serve as
catalysts for the generation of ideas. Ideas serve as the foundation for the
development of both ideology and philosophy. Ideology and philosophy serve as
motivating factors for individuals to engage in self-organization and proactive
behavior. The rate at which information diffuses and ideas are adopted has
accelerated significantly with each successive change in the medium of
dissemination.
The Internet has undeniably facilitated the global distribution of economic
opportunities, resulting in several achievements. These achievements are evident
in the increased integration of supply chains across nations, as corporations strive
to identify the manufacturer offering the most cost-effective and dependable
solutions. The business process outsourcing (BPO) industry in the Philippines has
emerged as an additional avenue for generating service export earnings,
supplementing the traditional reliance on remittances from overseas Filipino
workers.
Cybersquatting is not currently regarded as a prominent concern in the
Philippines. Due to the nascent state of digital transformation in the country, there
appears to be a prevailing assumption that threat actors do not provide a
significant threat or that the Philippines is not a prime target. The global systemic
shocks experienced worldwide were a result of the pandemic and the intense and
divisive polarization of political discourses. These unexpected events
disrupted the
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
established assumptions and prevailing knowledge about the Internet. The twin
shocks, if anything, have revealed the vulnerability of social, economic, and
political frameworks. With heightened urgency, the imperative to proactively
prevent or, at the very least, minimize the potential harm that could arise by
giving more thought and taking more action towards the adoption and
enforcement of cybersecurity protocols.
No Case of Cybersquatting Raised in the Philippine Supreme Court
The Philippines passed the Cybercrime Act in 2012; roughly three years
later, the Departments of Justice, Interior and Local Government, and Science and
Technology published the Act’s Implementing Rules and Regulations (IRR). It
defined several offenses relating to cybercrime, including cybersquatting.
In the study of Alberto and Pelongco in 2020, they stated how the United
States implemented its cybercrime law and what is the Philippines Cybercrime
Act status. It stated that taking into account the newly implemented but untested
provisions of the Philippines’ Cybercrime Act raises the question of how the
Philippine jurisdiction’s designated cybercrime courts would respond to a UDRP
case. The network of contracts that ICANN and Providers use to bind all parties
interested in a dispute is not available to courts. A less-than-friendly climate for
registrants accused of cybersquatting may result from the fact that Philippine
legislation, unlike ACPA in the U.S., does not define reverse domain name
hijacking. In other words, it has yet to be determined if the Cybercrime Act will
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
protect the legitimate claims of trademark owners and registrants.
The Supreme Court emphasized that RTCs designated as Special
Commercial Courts in the same document are also further designated as
Cybercrime Courts to try and decide Cybercrime cases covered by the law in this
Administrative Matter, titled “Designating Certain Branches of the Regional Trial
Courts to Try and Decide Cybercrime Cases Under Republic Act No. 10175.”
Even though cybersquatting is specified by law, no case that directly
addressed the pertinent provisions has ever made it to the Philippine Supreme
Court. The Department of Justice’s (DOJ) Office of Cybercrime reports that there
were just four cases in 2014, two in 2015, and one in 2016. The need for more
legal guidance on handling ongoing or concluded administrative actions involving
cybersquatting cases is even more concerning. As far as the authors are aware,
there have yet to be any instances that address this specific conundrum. There has
yet to be a corresponding law in the Philippines, unlike the U.S., where the courts
have ruled that the UDRP is only a cause of action to begin a review under the
ACPA196 and not an arbitration subject to minimal review. It differs from the
processes that are envisioned by arbitration laws.
2.2 Foreign Studies
Policies and Mandates to Solve Trademark Infringement Disputes
Cybersquatting is illegal as it is a form of extortion or as an attempt to steal
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
business from the authentic owners. Through the laws, rules, and frameworks that
are put into place, cyber security also indirectly influences political interactions
and interactions among nations, regions, international organizations, and
corporate entities. It is impossible to bring cybersquatting under the authority of
only one law. Over and beyond the standard laws governing trademark law,
certain nations have additional prohibitions against cybersquatting. Thus, in an
effort to stop cybersquatting, some countries have imposed rather arbitrary
restrictions on the use of domain names, such as demands that the domain name
be distinct or contain no broad terms.
The World Intellectual Property Organization (WIPO) is the international
organization that acts as a global hub for intellectual property (IP)-related
information, collaboration, and services. In the study of Bhusari and Rampure in
2022, the WIPO has been significant in putting a stop to cybersquatting. Around
7000 cybersquatting cases were submitted to the World Intellectual Property
Organization (WIPO) in 2022, and over 7900 domain names were present in the
total. Particularly since 2012, when there were almost 2900 such conflicts, the
number of cases submitted to the World Intellectual Property Organization has
grown (Petrosyan, 2022). As a result of this, the study of Singh entitled
“Cybersquatting and Regulatory Mechanisms in 2021” stated that providing tools
for online dispute resolution could aid in resolving complaints and increase
consumer confidence in online commerce.
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
To resolve disputes involving domain names, the WIPO established the
Internet Corporation for Assigned Names and Numbers (ICANN) Policy, which is
an online domain name dispute resolution process. Its responsibility is to maintain
the stable and secure operation of the unique identifier systems that are used
throughout the entire global Internet. This approach is not only quicker, but also
more economical. On the other side, the United States became the leading
protector against cybersquatting. Along with the WIPO, the Anticybersquatting
Consumer Protection Act of the United State is working together to offer anti-
cybersquatting protection to people and owners of distinctive trademarked names.
Similarly in the Philippine scenario, the Republic Act No. 10175, otherwise
known as the Cybercrime Prevention Act of 2012, categorizes cybersquatting as a
criminal act (Senate and House of Representatives of the Philippines, 2012).
Under the new Senate Bill, squatters could spend six to twelve years in prison if
found guilty (Realtime Register, 2012). The Philippine adopted the Uniform
Domain Name Dispute Resolution Policy (UDRP) which is the legal basis for
resolving disputes between a domain name registrant and a third party about the
unauthorized registration and use of an Internet domain name in the generic top
level domains (World Intellectual Property Organization, n.d.).
Types of Cybersquatting
Cybersquatting is the most severe domain dispute that takes place
worldwide. As old as the World Wide Web (www.) itself, cybersquatting is a
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
recognized practice that dates back to its inception. Many organizations and
individuals lacked a thorough knowledge of the commercial prospects offered
online in the early years of the internet. During this time, some fraudsters would
profit from this situation by registering domains in the names of well-known
businesses (Kaspersky, 2023). According to the study of Bhusari and Rampure in
2022, there are many different sorts of cybersquatting being formed nowadays
because the primary objective of cyber-squatters is to conduct illicit internet
commerce at the expense of the goodwill and trade name of legitimate trademark
owners.
The types of cybersquatting ate the following:
1. Typosquatting
Typosquatting is the most prevalent sort of cybersquatting, in which a
cybersquatter registers domain names with variations of well-known
trademarks (Stella & Kumari, 2022). The cyber squatters will create a typo in
the domain name that will be registered on purpose. Since these typos are
generic in nature, there is a risk that many users will enter them erroneously
and subsequently be forwarded to the website of cybersquatters (Bhusari &
Rampure, 2022).
2. Identity Theft
Identity theft is the common cybercrime that can be under the manipulation of
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
the cybersquatters. The internet sources different identity theft issues. The
cybersquatters monitor the expiration of domain names registered in the
names of renowned or well-known trademark owners using a variety of
techniques, including internet programs. Cybersquatters register domain
names in their own names after the ownership of such names expires in order
to deceive website visitors into believing that the website is maintained by the
same original trademark owner who also owned the domain name .
3. Name Jacking
Name jacking takes place when a cyber squatter utilizes the real name of a
famous person to construct an imitation website. Similarly to the study of
Bhusari and Rampure in 2022, Cybersquatters register domain names in the
names of such well-known public figures with the intention of attracting
visitors to the website associated with their legitimate online identity. They
are typically employed to increase traffic to the website of the cybersquatter,
which may have nothing at all to do with the content of the famous person.
4. Reverse Cybersquatting
This strategy, often referred to as reverse domain name hijacking, involves
hackers taking advantage of the current legal system to help their domain
squatting. Cyber squatters will exploit the law, such as the Anti
Cybersquatting Consumer Protection Act (ACPA), to try and take over the
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
website in question
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
by claiming that the actual owner is web squatting using the business name
that they own (Kaspersky, 2023). The legitimate trademark owner, who
properly registered the domain name and protected it, would be intimidated by
the cyber squatters, who would then urge him to transfer the domain name
into their name.
The growth of trade relationships from the physical world into the digital
one today fosters a positive trading environment for players. However, some
groups have turned the Internet’s expansion into a site of dishonesty in addition to
its positive qualities. Famous brand names and domain names are being misused,
which is leading to unfair market rivalry. This activity is referred to as cyber-
piracy in some nations and unfair competition in others. The goodwill of a firm is
identified and represented through its trademarks. There has been a lot of
controversy in recent years around trademark infringement using various tactics,
including cybersquatting. The future potential of a corporation may be
compromised by such misinformation. However, there is no law in India that
regulates cybersquatting, and efforts to do so have largely been fragmented. Even
if there is a global framework to stop cybersquatting, it is not enough to stop the
growing menace of cybersquatting. This document lays the foundation for anti-
cybersquatting legislation to be passed in India. In order to reach their results, the
authors employed secondary sources such as books, online journals, databases,
media reports, statistical data, etc. (Hein Online, 2021) The words, images,
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
expressions, logos, or mottos that distinguish one company from another are
known as trademarks.
Nowadays, trademark encroachment is frequently observed in an effort to
capitalize on the generosity of an existing brand name. Cybersquatting is one such
type of brand name infringement. Cybersquatting is described as a method for
registering, purchasing, or using a domain name with the intention of profiting
from the generosity of another person’s existing brand name. It pertains to the
practice of buying up domain names that contain the names of already-established
businesses with the intention of offering them at a profit to those legitimate
owners or to masquerade as the official website of the brand in an effort to
confuse or dupe current and potential customers. Although there are related laws
and international structures in this way, some laws does not have a specific
systematized method to handle instances of cybersquatting. As a result, they fall
short of effectively managing the constantly growing risk of cybersquatting.
Domain Name Basics: Understanding Trademark Infringement
In Khal, et. Al, study in 2015, it was cited that understanding the
technological context that has allowed the problems outlined in the research study
have developed is crucial. Alongside every website moniker on the Internet is an
IP address. A Domain Name System (DNS) is necessary for every web server in
order to convert domain names to IP addresses. A collection of numbers called an
IP address looks like 192.91.247.53. Characters which are simpler to remember
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
make up the domain name. In Figure 2, a domain name example is shown.
Figure 2. A Diagram Showing Domain Name System
In order to route demands to link computers on the Internet, dispersed
databases execute the task of locating domain names to their respective IP
addresses. These databases hold a database containing domain names and their
associated Internet Protocol (IP) addresses. The hierarchical nature of the DNS
enables a distributed administration of name-to-address conversion. (Khan, et. Al,
2015)
Typosquatting: The Infamous Category of Cybersquatting
Typosquatting, where a cyber squatter registers domain names with
variations of well-known trademarks, is the most prevalent type of cyber
squatting.
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
Typo squatters are dependent on the assumption that people using the Internet will
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
type domain addresses incorrectly into the web browsers they use. Through these
minor misconstructions, people will unconsciously delve into infringed domain
names, which will negatively affect the original owner of a trademark. People will
be able to open the infringed versions of the authentic domain name. Some
instances of typosquatting consist of the following:
Table 1. A Table Showing Different Kinds of Typosquatting
It is important to remember that the Internet Corporation for Assigning
Names and Numbers (“ICANN”) is responsible for managing and coordinating
the domain name system by controlling the dispersion of distinctive Internet
Protocol (“IP”) addresses and domain names. However, many domain name
registries located throughout the world are responsible for handling actual domain
name registration. Cybersquatting Competitor Disputes and Parody Disputes have
been the key concerns in the different domain name disputes that have been
brought before courts across the world.
By doing this, a cyber squatter violates the trademark proprietor’s
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
entitlement to make use of his own brand. In this way, the online squatter
infringes the trademark owner’s fundamental freedom to utilize the trademark.
The domain names which have been “squatted” are occasionally, however not
constantly paid for within the process for registration by the cybersquatters, which
makes cybersquatting somewhat distinct. It is crucial to remember, though, that
registering a domain name is a perfectly acceptable procedure. Entrepreneurs who
attempt to capitalize on the goodwill generated by others through declaring
domain names that draw in the public are adding to the problem caused by
cybersquatting. Of particular concern is the practice that is on the rise of
registering celebrities’ names, especially when the domain name ends up being
utilized for a pornographic website. The fact that more cybersquatting claims have
been submitted with the World Intellectual Property Organization (WIPO) in
2005 than in 2004 is further evidence of the nuisance that cybersquatting causes
more today that the world is in a more modernized and globalized situation.
Heightened Awareness on Domain Name Infringement
During the early days of the Internet, a significant number of enterprises
and individuals had only a little understanding of the broad spectrum of
commercial prospects that existed in the online realm. During this period, a subset
of hackers exploited the situation by engaging in the registration of domains under
the guise of reputable companies, so capitalizing on this activity for financial
gain. This
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
marked the inception of the practice commonly known as cybersquatting. In
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
contemporary times, the prevalence of technological literacy among individuals
has increased significantly, leading to a heightened awareness of the significance
of managing domain names associated with their own corporate enterprises.
Consequently, the practice of cybersquatting has witnessed a decline in frequency
compared to previous periods. However, despite efforts to mitigate its occurrence,
cybercrime continues to persist, posing unexpected challenges for its targets.
Consequently, it is imperative for prominent corporations and individuals to
acquire a comprehensive understanding of its mechanisms and potential impact.
(Kapersky, 2023)
In addition, he provided that In order to address an instance of
cybersquatting, a corporation or proprietor of a trademark may opt to initiate
communication with the individual engaging in the practice and provide monetary
compensation in exchange for obtaining control over the domain name.
Nevertheless, the existence of specific legislative measures has facilitated the
potential for constructing a legal argument against the individual occupying the
property without authorization, enabling the initiation of criminal proceedings.
(Kapersky, 2023)
● The burden of proof is with the claimant in establishing a case of illicit
online squatting. In order to accomplish this task, it is typically necessary
for individuals to provide substantiating proof that:
● The reputation or trademark of the entity in question has become widely
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
recognized and has been weakened due to the practice of domain squatting.
● The individual who engaged in squatting activities deliberately registered
a domain name with the purpose of encroaching upon the rights of, and
deriving financial gain from, the pre-existing corporation, individual, or
owner of a trademark.
● In order for a web squatting site to be established, it is necessary for the
domain to either match or bear resemblance to an already existing name or
trademark.
Diverging Methods in Preventing Cybersquatting
In relation to the substantive basis of a claim, Panton, V. (2013) stated that
there exists a wide range of methods. It is worth noting that a majority of
European countries tend to derive the foundations of anti-cybersquatting
assertions from overarching legislations pertaining to trademarks, unfair
competition, passing off, as well as the safeguarding of personal and trade names.
This study presents an analysis indicating that in certain instances, conventional
legal mechanisms prove inadequate in addressing the complexities posed by the
Internet, resulting in jurisprudential outcomes that are deemed unacceptable. The
phenomenon of cybersquatting, specifically when it involves obstructing domain
name registrations, presents challenges for courts when it comes to determining
the concept of “use in commerce” within the context of trademark law, as well
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
as in
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
cases involving deception in passing off actions. The realm of conflicts between
competing rights, including trademarks and personal and trade names, presents an
additional source of stress. The absence of well-defined regulations in this area
contributes to a state of uncertainty. Several governments, such as Belgium,
Finland, France, and Denmark, have deemed the matter critical and have
implemented specialized legislation to address the issue of cybersquatting. The
implementation of anti-cybersquatting legislation effectively addresses the
challenges arising from the endeavor to apply conventional legal rules, while
preserving their supplementary applicability, without any bias.
The utilization of trademark infringement continues to be the predominant
strategy employed in addressing the issue of cybersquatting. Numerous European
nations have created an established corpus of legal precedents pertaining to
domain names that violate trademark rights. The confrontation between the
accessibility of cyberspace and the idea of territoriality gives rise to several
challenges. Put differently, there exists the possibility of a single domain name,
such as xyz.com or xyz.de, with 200 trademark registrations for the term “xyz” in
100 distinct nations, each registered within different classes. These circumstances
give rise to conflicts between trademarks and domain names. Furthermore, it
appears that trademark law is inadequately equipped to address the issue of cyber
squatters, and the judicial system has encountered difficulties in applying the
principles of trademark infringement to cases involving cybersquatting. The
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
concept of “use in commerce”
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
refers to the requirement for a trademark to be actively utilized in connection with
the sale or provision of goods or services in order to establish and maintain legal
protection. Various legal avenues are available to address the issue of
cybersquatting. These include pursuing claims of trademark infringement, unfair
competition, passing off, relying on specific anti-cybersquatting legislation,
seeking protection for personal names, and exploring sui generis solutions. The
consideration of these factors will be examined sequentially within the
jurisdictions of countries that adhere to the common law and civil law legal
systems. (Panton, 2013)
2.3 Synthesis
A trademark, design, slogan, or instantly recognizable image is a carefully
designed personality profile of a person, organization, business, good, or service. (Khan,
et. Al, 2015) This means that image cannot be easily remembered without studiously
crafting one’s personality profile. The market for internet domain names is enormous.
The globe is seeing a major revolution in the area of communications, which has given
internet residents countless new options. The wide-ranging web has evolved into an
effective instrument for organizations to market, advertise, as well as sell products and
solutions as a result of its growing relevance. Unfortunately, cybersquatting, which
results from dishonest and illegal behavior, has also proliferated.
According to the study’s review of related literature, cybersquatting, also known as
domain name squatting, is defined by the Cybercrime Prevention Act of 2012 as the
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
registration, trafficking, or use of a domain name alongside the malicious intention of
generating revenue by exploiting the goodwill of another person’s trademark. The cyber
squatter then makes an exorbitant offer to market the domain to the individual or business
that is the owner of the trademark associated with the name. The word originates from
“squatting,” which is the action of inhabiting an empty or deserted property or place
without the owner’s, tenant’s, or other authorized user’s approval. The domain names
which have been “squatted” are occasionally, however not constantly paid for within the
process for registration by the cyber squatters, which makes cybersquatting somewhat
distinct. The costs cyber squatters typically want are much higher than the ones they
originally paid. Several cyber squatters post disparaging comments about the person or
business the domain is meant to symbolize in an attempt to persuade the target to
purchase the domain from them. Others monetize their squatting by posting sponsored
connections through ad networks to the real website that the user probably wanted.
In conclusion, cybersquatting in the Philippines has broad repercussions in the fields
of cybersecurity, law, and economics. Cybercriminals might use cybersquatting to set up
phishing attacks, disseminate malware, or steal confidential data. Cybersquatting
litigation or arbitration is frequently used to settle disputes, which can be time-consuming
and expensive. This burdens the legal system and raises the cost to those who are
affected. To preserve intellectual property, uphold online trust, and promote a secure
digital environment, enterprises, governmental organizations, and international
stakeholders must work together to address this issue.
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
CHAPTER III
METHODOLOGY
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
This chapter presents the research design, the sampling design, respondents’
description, research instruments, data gathering procedure, data analysis, as well as
statistical treatments used in order to establish reliable and pertinent study results.
3.1 Research Design
In the research study, mixed methods were employed to gain a comprehensive
understanding of the complex relationship between Legal Studies student perceptions of
trademark infringement and the implications of cybersquatting. By incorporating both
qualitative and quantitative approaches, researchers aimed to delve deeply into the
subjective experiences and attitudes of Legal Studies students regarding trademark
infringement (qualitative) while simultaneously quantifying the extent and impact of
cybersquatting (quantitative). This mixed methods approach allowed for a multifaceted
exploration, enabling the researchers to triangulate data from diverse sources. Qualitative
data provided rich insights into students’ perceptions, motivations, and contextual factors
influencing their understanding of trademark infringement, offering a nuanced
perspective. On the other hand, quantitative data pertaining to cybersquatting helped
establish statistical patterns and correlations, providing a broader perspective on the
prevalence and implications of this phenomenon. By combining these methods, the study
could offer a holistic view, bridging the qualitative nuances of student perceptions with
the quantitative data on cybersquatting’s tangible consequences, thus enriching the
overall analysis and enhancing the depth of the research findings.
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
Consequently, Explanatory Sequential Design (ESD) will be applied to the study.
In this approach, the research begins with qualitative data collection and analysis,
followed by quantitative data collection to explain or validate the initial qualitative
findings. In this study, researchers initially conduct qualitative surveys with Legal
Studies students to explore their perceptions of trademark infringement in-depth.
Through open-ended questions, researchers can gather rich qualitative data, capturing the
nuances and underlying reasons behind the students’ attitudes and beliefs regarding
trademark infringement. Qualitative methods allow for a deep exploration of the topic,
uncovering various perspectives and contextual factors that might influence students’
views.
Essentially, a SWOT analysis on the essay questions concerning the perceptions
of Legal Studies students on cybersquatting and trademark infringement will provide
valuable insights into the qualitative data gathered. By utilizing this structured analytical
framework, researchers can systematically evaluate the content of the essay responses.
This methodical approach enhances the understanding of students’ perceptions and
allows for tailored interventions and educational strategies to address specific areas of
improvement, ultimately contributing to a more nuanced and informed perspective on
cybersquatting and trademark infringement within the Legal Studies context.
After analyzing the qualitative data, the researchers can identify patterns, themes,
and hypotheses. To further validate and explain these qualitative findings, quantitative
methods can be employed. A structured, Likert-scale based survey designed to quantify
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
the prevalence of certain attitudes or beliefs identified during the qualitative phase,
will be
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
employed. In essence, researchers develop a questionnaire assessing students’ awareness
of cybersquatting cases and their perceived impact on trademark infringement. By
employing an Explanatory Sequential Design, the study can provide a comprehensive
understanding of Legal Studies student perceptions of trademark infringement and its
relation to cybersquatting. The qualitative phase offers depth and context, while the
quantitative phase validates the qualitative findings on a larger scale, enhancing the
study’s overall reliability and validity.
3.2 Variables and Measures
The table below shows the variables and measures used in the study.
VARIABLES MEASURES
Perception of Legal Studies The researchers adapted questions from Khan et al.'s
students with trademark (2015) study, specifically tailored to explore a unique
infringement. set of questions to probe the respondents' perspectives
on cybersquatting and trademark infringement. These
questions were meticulously designed to delve into the
participants' views, shedding light on their perceptions
concerning the cybersquatting and trademark
infringement cases in the realm of cybercrimes.
Perception of the Legal Modified questions from Khan et al. (2015) that would
Studies students on their establish the effects of their familiarity on
familiarity with the cybersquatting and how it would affect their day to day
cybercrime of cybersquatting. online activities.
Perception of Legal Studies Modified questions from Khan et.al (2015) regarding
students with the effect of the trademark infringement in a cyber setting and lay
Cybersquatting under out its effects under Republic Act 10175.
Cybercrime Prevention Act
of 2012.
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
Table 2. A Table showing the variables and measures of the study
3.3 Research Locale and Research Respondents
The research was conducted at Lyceum of the Philippines University Cavite,
situated at Governor’s Drive, Barangay Manggahan, City of General Trias, Cavite. The
university, established in June 2008, served as the backdrop for this study.
The participants selected for this research were students enrolled in the Legal
Studies program at Lyceum of the Philippines University-Cavite Campus during the
academic year 2023-2024. The researchers gathered information from the College of
Liberal Arts and Education (CLAE) and LPU Legal Studies Society (LLSS) indicating
that the Legal Studies program comprised 67 students, both male and female, excluding
the researchers themselves.
These students were chosen as respondents due to their relevance to the study’s
subject matter, aligning with their course of study. Furthermore, their age group
represents one of the initial generations exposed to the 21 st century, constituting
approximately seventy percent of the Philippine population. Moreover, they possess
diverse knowledge about technological advancements and are well-versed in
modernization, which is particularly pertinent given that cybersquatting incidents
primarily stem from technological advancements.
3.4 Sampling Design and Technique
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
For this study on the perceptions of Legal Studies students regarding
cybersquatting and trademark infringement, a stratified random sampling method will be
employed. The population of interest comprises 67 Legal Studies students at Lyceum of
the Philippines University-Cavite Campus during the academic year 2023-2024. The
students will be divided into strata based on their familiarity and experience with online
activities and intellectual property issues, which are directly relevant to the study on
trademark infringement and cybersquatting.
The stratification will take place by dividing the 67 Legal Studies students into
strata based on their level of engagement with online activities, such as social media
usage, online shopping, blogging, or website ownership. This division ensures that
participants have varying degrees of exposure to the online environment, where issues
like cybersquatting and trademark infringement commonly occur.
Stratum 1: Students actively engaged in online activities (e.g., frequent social media
users, online entrepreneurs).
Stratum 2: Students moderately engaged in online activities (e.g., occasional social
media users, online shoppers).
Stratum 3: Students with minimal online activity (e.g., infrequent internet users,
limited social media presence).
For the survey administration, the researchers will administer the survey
questionnaire to the randomly selected students within each stratum. The questionnaire will
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
focus on gathering the students’ perceptions of cybersquatting and trademark
infringement. Then the researchers will analyze the survey responses to draw conclusions
about the perceptions of Legal Studies students regarding cybersquatting and trademark
infringement. Ensure the findings are representative of the entire Legal Studies student
population by accounting for the stratified sampling method during the analysis.
By stratifying the students based on their online activities and intellectual
property awareness, you ensure that the sampled participants represent diverse
backgrounds and experiences relevant to the study’s focus on trademark infringement and
cybersquatting. This approach provides a nuanced understanding of how different levels
of online engagement and intellectual property awareness influence Legal Studies
students’ perceptions in these areas.
3.5 Research Instrument
The researchers formulated a survey questionnaire comprising questions
structured on the Likert scale and open-ended inquiries. These questions were fashioned
based on themes explored in the study conducted by Khan et al. (2015). These themes
encompassed students’ perceptions regarding trademark infringement, the ramifications
of these perceptions within a cyber context, and their influence on cybersquatting
implications under the Cybercrime Prevention Act of 2012. To mitigate bias, the
researchers meticulously consulted their research adviser, ensuring the questionnaire’s
integrity. Subsequently, following validation by experts, the questionnaire was finalized.
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
Prior to survey administration, the researchers diligently sought approval from the
Dean of the College of Liberal Arts and Education, formally addressing this request
through a letter. Upon securing consent, the survey was administered to the participants.
The questionnaire included a consent letter, aimed at affirming participants’ voluntary
agreement to partake and acknowledging that their responses would be subject to the
Data Privacy Act. Essentially, the questionnaire encompassed socio-demographic
information, Likert scale-based queries, and subsequent open-ended questions. These
elements were strategically designed to extract pertinent insights from respondents,
illuminating their perspectives on trademark infringement within a cyber context and its
concomitant implications on cybersquatting under the Cybercrime Prevention Act of
2012.
3.6 Data Gathering Procedure
The researchers followed a systematic procedure, which included the following
steps:
1. Submit the research proposal for approval;
2. Validate the survey questionnaire meticulously by experts in the respective field.
3. Obtain approval to conduct the study through a formal letter signed by the
Dean of the College of Liberal Arts and Education.
4. To gather data, two distinct methods were employed. The first method involved
data mining, wherein the researchers explored various sources such as research
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
articles, journals, published theses, and unpublished theses, primarily accessed
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
through online platforms. The second method encompassed a survey approach,
aiming to elucidate the self-reported characteristics of the target population. This
survey method involved setting study objectives, selecting a suitable survey
frame, determining the sample design, questionnaire design, data collection,
processing, analysis, distribution, and comprehensive documentation of the
survey process.
5. The researchers will personally collect the completed survey questionnaires
from the participants.
6. Subsequent to the collection phase, the researchers will collate and analyze the
gathered data. They will collaborate with a statistician and utilize XLSTAT in
Microsoft Excel for this purpose.
7. The results of the descriptive survey will be methodically compiled, tabulated,
and computed utilizing quantitative data descriptive statistics such as frequency
count, mean, percentage, rank, and standard deviation. Additionally, the responses
to open-ended questions were compared, grouped, and summarized utilizing
SWOT analysis techniques.
3.7 Data Analysis and Statistical Treatment
The researchers employed a comprehensive approach, integrating qualitative and
quantitative data to evaluate the perceptions of Legal Studies students regarding the
ramifications of Cybersquatting under the Cybercrime Prevention Act of 2012.
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
To gauge these perceptions accurately, a refined 4-point Likert Scale was utilized.
This scale allowed participants to express their opinions clearly, with each point
representing a distinct viewpoint on the topic. The Likert scale encompassed responses
ranging from “strongly agree” to “strongly disagree,” ensuring a forced choice of opinion
and preventing neutral responses. This structured approach enabled a meticulous analysis
of students’ attitudes and viewpoints concerning cybersquatting and its implications,
providing valuable insights into their perspectives on trademark infringement within the
digital realm.
Furthermore, the study delved into additional factors such as participants’
awareness of legal regulations, prior experiences, and socio-demographic characteristics,
enhancing the depth and breadth of the data analysis and statistical treatment. By
incorporating these multifaceted elements, the research aimed to yield a comprehensive
understanding of Legal Studies students’ perceptions, enriching the study’s findings and
implications.
REFERENCES
Berman, P. (1978). “The Study of Macro- and Micro-Implementation.” Public Policy 26,
no. 2: 157-84.
Bernat, F. P., & Makin, D. (2014). Cybercrime Theory and Discerning if there is a Crime:
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
The Case of Digital Piracy. International Review of Modern Sociology, 40(2), 99–
119. http://www.jstor.org/stable/43499904
Bhusari, R., & Rampure, K. (2022, January 15). Cybersquatting: A Threat To The
Globalising World. Indian Journal of Law and Legal Research, 3(2). https://doi-
ds.org/doilink/01.2022-68535724/IJLLR/V3/I2/A221
Cabel, K. (2015). Combating Cybercrime in the Philippines. United Nations Asia and Far
East Institute Resource Material Series No. 97. Tokyo, Japan.
http://www.unafei.or.jp/english/pdf/RS_No97/No97_IP_Philippines.pdf
Dizon, D., (2008, September 13). Cybersquatting cases in RP rising. ABS-CBN News.
https://news.abs-cbn.com/features/09/11/08/cybersquatting-cases-rp-rising
Domingo, F. (2016). Strategic Considerations for Philippine Cyber Security. ADR
Institute for Strategic and International Studies.
http://www.academia.edu/20823505/Strategic_Considerations_for_Philippine_Cy
ber_Security.
Hein Online. (2021, March 8). About | HeinOnline.
https://heinonline.org/HOL/LandingPage?handle=hein.journals/ijlmhs13&div=73
&id=&page=
Hjern, S., Benny, F. and Chris, H. (1987). “Implementation Research as Empirical
Constitutionalism.” European Journal of Political Research 10, no. 2: 105-16.
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
Ivankova, N. V., Creswell, J. W., & Stick, S. L. (2006, February). Using Mixed-Methods
Sequential Explanatory Design: From Theory to Practice. Field Methods, 18(1),
3–
20. https://doi.org/10.1177/1525822x05282260
Johnson, R. B., & Onwuegbuzie, A. J. (2004). Mixed Methods Research: A Research
Paradigm Whose Time Has Come. Educational Researcher, 33(7), 14–26.
http://www.jstor.org/stable/3700093
Kaspersky. (2023). Cybersquatting Issues. www.kapersky.com. Retrieved September 16,
2023, from https://www.kaspersky.com/resource-center/preemptive-
safety/cybersquatting
Kapersky. (2023, April 19). What Is Cybersquatting? www.kaspersky.com. Retrieved
October 9, 2023, from https://www.kaspersky.com/resource-center/preemptive-
safety/cybersquatting
Krisa, J. (2013, March 19) Review of Related Literature on Cybersquatting. Jamelle Krisa
Blog Spot. http://jamellekrisa.blogspot.com/?m=1
Lipton, J. (2009). Bad Faith in Cyberspace: Grounding Domain Name Theory in
Trademark, Property and Restitution. Harvard Journal of Law and Technology,
Forthcoming, Case Legal Studies Research Paper No. 09-28.
https://ssrn.com/abstract=1484763
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
Lipsky, M. (1980). Street level bureaucracy: Dilemmas of the Individual in Public Service.
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
New York: Russel Sage Foundation.
Lipsky, M. (1978). “Standing the Study of Policy Implementation on Its Head.”
Cambridge, Massachussets: MIT Press.
Magdirila, F. (2013). Domain Squatting Controversy Rocks E-Commerce Startup Scene.
Tech in Asia – Connecting Asia’s Startup Ecosystem.
https://www.techinasia.com/domain-squatting-controversy-rocks-ecommerce-
startup-scene-philippines
Matland, R. (1995). “Synthesizing the Implementation Literature: The Ambiguity-
Conflict Model of Policy Implementation.” Journal of Public Administration
Research and Theory 5, no. 2: 145-74.
http://orion.luc.edu/~rmatlan/pdf/1995SynthesizingtheImplementationLiterature.p
df.
Matland, R. (1995). “Synthesizing the Implementation Literature: The Ambiguity-
Conflict Model of Policy Implementation.” Journal of Public Administration
Research and Theory, 5:02:145-174.
Mazmanian, D., and Sabatier, P. (1984). “Implementation and Public Policy,” Policy
Sciences 17, No. 1: 95-97.
Pantov, V. (2013, September 10). The prevention of cybersquatting in Europe: diverging
approaches and prospects for harmonization.
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2427582
Petrosyan, A. (2022, December 13). Cybersquatting: most domain name dispute filings
2022. Statista. Retrieved September 17, 2023, from
https://www.statista.com/statistics/416159/domain-name-cases-filings-wipo/
Rodriguez, A., (2012, February 5). Cybersquatters Face Serious Sentences in the
Philippines. Realtime Register. Retrieved September 17, 2023, from
https://realtimeregister.com/blog/cybersquatters-face-serious-sentences-in-the-
philippines/
Rupal, P. (2019, July 6). Jaiswal Symbisosis Law School. Volume 6. The Web of
Cybersquatting. http://penalclaims.com/wp-content/uploads/2019/07/Rupal-
Jaiswal
Saydjari, O. Sami. (2008) “Structuring for Strategic Cyber Defense: A Cyber Manhattan
Project Blueprint.” (paper presented at the Twenty-Fourth Annual Computer
Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-
12).
Shackelford, Scott, Scott Russell, and Jeffrey H. (2015) Bottoms Up: A Comparison of
Voluntary Cybersecurity Frameworks. United States: UC Davis Business Law
Journal.
Sosa, Gilbert. (2015). Country Report On Cybercrime: The Philippines. The Criminal
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
Justice Response To Cybercrime Course.
Senate and House of Representatives of the Philippines. (2012, September 12). Republic
Act No. 10175. Official Gazette. Retrieved September 17, 2023, from
https://www.officialgazette.gov.ph/2012/09/12/republic-act-no-10175/
Singh, V. (2021, December 16). Analysis of Current Global position on Cybersquatting.
Khurana And Khurana Advocates and IP Attorneys. Retrieved September 17,
2023, from https://www.khuranaandkhurana.com/2021/12/16/cybersquatting-
regulatory-
mechanisms/
Stella, J., & Kumari, A. (2022, March). Cyber Squatting – The Digital Version of Passing
Off. The Law Brigade, 8(2). https://thelawbrigade.com/wp-
content/uploads/2022/03/Jenifer-Stella-S-JLSR-1.pdf.
Stephan, F. F. (1941). Stratification in Representative Sampling. Journal of Marketing,
6(1), 38–46. https://doi.org/10.2307/1245763
Timans, R., Wouters, P., & Heilbron, J. (2019). Mixed methods research: what it is and
what it could be. Theory and Society, 48(2), 193–216.
http://www.jstor.org/stable/45200451
Van, M., Donald S., Carl E., and Van H. (1975). “The Policy Implementation Process: A
Conceptual Framework.” 6, no. 4: 445-88. Accessed December 20, 2016.
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
Villanueva, V. (2021, December 5). R.A. No. 10175: The Cybercrime Prevention Act: The
COLLEGE OF LIBERAL ARTS AND EDUCATION
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
Net Commandments. Philippine Legal Research.
https://legalresearchph.com/2021/12/05/r-a-no-10175-the-cybercrime-prevention-
act-the-net-commandments/
World Intellectual Property Organization. (n.d.). WIPO Guide to the Uniform Domain
Name Dispute Resolution Policy (UDRP). WIPO. Retrieved September 17, 2023,
from https://www.wipo.int/amc/en/domains/guide/
Winter, S. (1986) “How Policy-Making Affects Implementation: The Decentralization of
the Danish Disablement Pension Administration.” Scandinavian Political Studies
9, no. 4: 361-85. Accessed December 20, 2016.
COLLEGE OF LIBERAL ARTS AND EDUCATION