Académique Documents
Professionnel Documents
Culture Documents
The author is a professor of law at the Arellano School of Law; Founding Partner of Soriano, Torresyap
and Belmonte Law Offices; Chairman and President of various corporations some of them are in the field
of information technology; a Lieutenant Colonel in the Philippine Army of the AFP reserved force.
2
Kennedy, Angus J., The Internet & World Wide Web, The Rough Guide, 1995, p. 1
Internet technology, a wide array of new legal issues, which did not exist before, has
emerged.
Denise Caruso, digital commerce columnist of the New York Times said3:
It shouldn't be too much of a surprise that the Internet has evolved
into a force strong enough to reflect the greatest hopes and fears of
those who use it. After all, it was designed to withstand nuclear war,
not just the puny huffs and puffs of politicians and religious fanatics."
The E-Commerce Law
Undoubtedly, the Internet has changed the way people transact business. The
brisk increase in online commerce is very notable in recent years. In the United States
alone, it is estimated that about $3.4 trillion shall be spent online for goods and
services by 2004.4 With the Internet, the era of the borderless economy was born.
A more recent report by The Star (IN-TECH 18 April 2000) has demonstrated
that the worldwide Internet economy has surpassed predictions. Reported world wide
statistics show that5:
Internet users in 1998
Internet users in 1999
Internet users in 2003
Internet users growth rate
E-commerce spending in 1998
E-commerce spending in 2001
E-commerce spending in 2003
Internet shoppers in 1998
Internet shoppers in 2003
:
:
:
:
:
:
:
42 Million
:
196 Million
:
600 Million
70 000 users per day
US $ 50 Billion
US $ 1 Trillion
US $ 3 Trillion
31 Million
183 Million
Fully cognizant of this technological development, Republic Act No. 8792 was
enacted by the Philippine Congress on 14 June 2000. Also known as the Electronic
Commerce Act of 2000 (E-Commerce Law), the law was hailed by observers as a
landmark piece of legislation that finally placed the Philippines on the map of
electronic commerce6. Essentially, the law provides that:
1.
2.
http://quotations.about.com/library/weekly/aa011399.htm
By Forrester Research Inc. as cited in http://www.detnews.com/2000/technews
5
Facts and figures were adapted from Excellence Success Network
(http://members.infomak.com/stepbiz/forum.htm)
6
Bagares, Romel, New Rules (of Court) for the New Economy, The Philippine Star, 27 July 2001, p. B-1.
4
4.
5.
Offer, acceptance, and other legal requisites for the formation and
consummation of contracts may be expressed or executed by means of
electronic data message or electronic documents. These contracts shall not
be denied validity or enforceability.
6.
7.
8.
Digital signatures, on the other hand, are provided through a secret code
known as electronic key which secures and defends sensitive information that
crosses over public channel into a form decipherable only with a matching electronic
key10 normally obtained from an Internet security company.
Obviously, both electronic and digital signatures are necessary to ensure the
integrity, reliability and authenticity of the electronic document.
Notwithstanding however the enactment of the E-Commerce Law, certain legal
issues exist when a written contract or a transaction is done through the Internet.
These include the following situations:
1.
The Supreme Court has yet to adopt a system for the electronic
notarization of electronic documents under the E-Commerce Law11. In the
absence of an electronic notarization system, written contracts required by
law to be in the form of a public instrument for their enforceability,
validity or to affect third persons cannot acquire their requisite public
nature if executed in electronic format. These electronic documents
however still partake the nature of a private instrument from legal
contemplation because they are deemed as the functional equivalent of a
written document under existing laws.12
2.
3.
10
4.
Internet Providers
Under existing laws, local Internet providers and operators are considered as a
value-added service (VAS) provider defined as any entity which, relying on the
transmission, switching and local distribution facilities of the local exchange and interexchange operators, and overseas carriers, offers enhanced services beyond those
ordinarily provided for by such carriers.18
As long as it does not put up its own network, a VAS provider is not required to
secure a congressional franchise.19 It needs to register only with the National
Telecommunications Commission. A VAS provider can utilize its own equipment
capable only of routing, storing and forwarding messages in whatever format for the
purpose of providing enhanced or augmented telecommunications using the facilities
of a franchised public telecommunications entity.20
Considering the public nature of an Internet service, entities in this business
based in the Philippines falls within the ambit of a public utility operation which call
for legislative franchise and subject to the 60% Filipino ownership requirement of the
Constitution21. A congressional act or a judicial declaration, in an appropriate
justiciable controversy, may be needed to settle this issue in due time.
Much of the integrity of electronic documents, for legal purposes under the ECommerce Law, is anchored on the reliability of the providers or operators of the
Internet service and other medium of on-line communications including certification
authorities that are engaged in issuing cryptographic keys used for the generation of
16
Act 2031
Sec. 30, ibid.
18
Sec.3 (h), Republic Act No. 7925
19
Sec. 11, ibid.; par. 420 (a) Memorandum Circular No. 8-9-95 of the National Telecommunications
Commission.
20
par. 420 (b) (e), ibid.
21
Sec. 11, Article XII, Constitution
17
22
23
To address the foregoing problem, Network Solutions Inc. (NSI), the entity that
manages the InterNIC registry, adopted the practice of requiring applicants for domain
name registration to warrant that their application will not interfere nor infringe upon
the rights of another and in case of suit, the applicant will defend, indemnify and hold
harmless the NSI and the InterNIC. Moreover, when a trademark dispute over a
domain name emerges, NSI suspends the use of the name until the controversy is
resolved in court or by arbitration.24
Legal controversies result when a registered trademark is adopted and used by
another person or entity as his domain name. It only takes a few minutes to register a
domain name while it takes sometime before registration of a trademark could be
effected. A law similar to the US Anti-Cybersquatting Consumer Protection Act should
complement our present consumer protection law25 and the Intellectual Property Code
of the Philippines26 governing the trademark and service mark registration and
ownership.
Electronic Contracts
Contracts are easily enforceable if evidence can be shown that a written
agreement was actually signed that contains the terms to be enforced. Internet
contracts can be consummated either through an exchange of electronic mail (e-mail)
communications, or when one completes and signs an electronic contract by clicking
the Send button on a web site, or through an electronic data interchange (EDI)
where two computers automatically exchange Internet messages to effect a
transaction.
While it may be easier to legally prove the existence of an electronic contract
expressed through e-mail communications because of the facility to produce a selfgenerated printed copy of the electronic communication, it may be difficult, and even
expensive, to do so in case of the Send button or the EDI medium because the data
or information is pretty much under the control of the provider of goods or services.
Hence, it is always advisable that all Internet contracts must have some form of
electronic acknowledgement to prove the terms thereof. In proving contracts or
agreements done on-line, it still becomes necessary to keep a printed file of the
written record to conveniently show proof of the transaction.
A website doing business through e-commerce is strictly speaking doing
business globally because transactions can originate and be consummated in different
parts of the world. This gives rise to the issue as to which law shall apply in case of a
legal action arising from a breach of an electronic contract. Normally, electronic
contracts are governed by the jurisdiction expressly stipulated and agreed upon by the
parties prior to the consummation of the transaction. In the absence of such
specification, there are various schools of thought on the matter and the rule may vary
from country to country. Legal jurisdiction may be based on either:27
24
28
Ibid., p. 151.
Sec. 3 (1), Article III, 1987 Constitution
30
Sec. 33 (a) (d), Republic Act No. 8792
31
Soriano, Jaime N., The RP National ID System: Constitutional Issues and Challeges, National Defense
College of the Philippines (Camp Aguinaldo, Quezon City), July 2000, pp. 55-68
29
http://www.findarticles.com/cf_dls/m0FOX/1999_March_24/54270328/p1/article.jhtml
10
Internet Crimes
The Internet is also a haven for fraud and illegal acts also known as
cybercrimes.
It is difficult to approximate the figures on the cost of Internetrelated crimes worldwide but no one would disagree that the amount could be
staggering.
In 1997, the US Federal Trade Commission reported that in nearly 100 federal
district cases brought by the agency between October 1995 and December 1996,
fraudulent sales in these actions cost consumers more than US$250 million and more
than US$700 million over the life of the schemes.33
In a survey conducted by the Computer Security Institute, a San Francisco
based association of information security professionals, some 75% of the respondents
reported losses due to security breaches ranging from financial fraud, theft of
proprietary information, sabotage of data or network, to computer viruses, system
penetration from the outside, and laptop theft.34
Some of the pernicious acts committed in cyberspace may include:
2. Identity Theft. This occurs when an unscrupulous person steals the personal
data of another and makes unauthorized online purchases or transactions.
This act could damage the reputation and financial health of the real owner
of the personal information.
4. Online Fraud. This perpetrated by con artists for financial gain like stealing
money on-line, using stolen credit cards and computer passwords, phone
dialing scams coursed through e-mail. Online gambling, online stock
trading, online insurance, online credit can be a vehicle for manipulation
schemes.
and financial system. Unfortunately, the Internet has been the venue of
money laundering schemes in recent years. US authorities are convinced
that the Internet particularly online gambling sites cater to money
33
Janal, Daniel S., Risky Business. John Wiley & Sons Inc., US, 1998, p. 5
ibid.
35
ibid, p. 9
34
11
launderers. Aside from gambling sites, there are other kinds of websites
that engage in harmless electronic commerce using own currency called
cybercash or e-money. Anyone who goes through these sites is made to
convert traditional money to cybercash to engage in business. 36 Following
the admonition of the Paris based Financial Action Task Force, Congress
enacted the Anti-Money Laundering Act of 200137.
After the country was placed at the center stage for being the source of the
notorious I Love You virus which bogged down on 4 May 2000 about 45 million
computers worldwide including those at the Pentagon and the British Parliament 42, the
E-Commerce law was passed imposing penalties of fine and/or imprisonment on:
1. Hacking, cracking or any unauthorized access or entry in computer and
communication systems, networks or servers;
36
Ocampo, Junep, Money Laundering On-Line, The Philippine Star, 23 October 2001, p. B-2.
Republic Act 9160
38
Janal, Daniel S., Risky Business. John Wiley & Sons Inc., US, 1998, p. 62.
39
Cracker is one who without adequate knowledge in network protocol attempts to break into a system
while a hacker is one having sufficient knowledge of TCP/IP implementations and protocols to gain
system access. see http://www.mgmua.com/hackers/inventory/definitions.html
40
Janal, Daniel S., op. cit.
41
Forever Caught in the Web, Malaya, 30 November 2001, p. 13
42
Favis-Villafuerte, Nelly, Interesting Trivia on IT, Philippine Panorama, 30 December 2001, p. 17
37
12
2. Introduction of computer virus and other means that will corrupt, destroy,
alter, or result in the theft or loss of electronic data messages or electronic
document;
3. Piracy or unauthorized copying, distribution, use, alteration, or
transmission of works and materials protected by intellectual property
laws;
4. Violations of the Consumer Act (Republic Act No. 7394) through electronic
means; and,
5. Other violations of the provisions of the E-Commerce Law.
It may be fitting for our government authorities to take a serious review of our
penal laws to determine which of the present day mode of committing cybercrimes
has not found its way in our statute books. If necessary, Congress should pass
appropriate legislations to address the need of our changing world.
Conclusion
The development of Internet technology is taking place at the speed of light
and our laws should be able to cope up with this growth. The American government in
approving its anti-terrorism law recently made sure that it can now prosecute foreign
hackers when they attack computers in their own or other countries outside of its
jurisdiction.43 Jack Welch, Chief Executive Officer of General Electric, once said:
Anytime there is change, there is opportunity. So it is paramount
that an organization get energized rather than paralyzed.44
The Executive, Legislative and Judicial Branch of our government should
therefore adopt a proactive stance to address the increasing legal ramifications of
Internet technology in our day-to-day lives. Rather than be awed and be paralyzed by
its rapid advancement, Internet technology should be enhanced as state resource for
the benefit of every Filipino.
43
Lagniton, Francis, Anti-Terror Target: Hackers, The Philippine Star, 30 November 2001, p. B-1.
Gates, Bill, Business@The Speed of Thought, Warner Books Inc., New York, 1999, p. 453.
44
13