SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
This paper provides an overview of certain provisions of Republic
Act No. 9775 or the Anti-Child Pornography Act of 2009,
particularly those that affect the Internet, the Constitutional
provisions related to the Right to Privacy, other pieces of
legislation as well as jurisprudence related to the Right to Privacy,
and the questions arising from this law’s provisions.
The Anti-Child Pornography Act of 2009:
An Impending Debate on Privacy in the Philippines
1.0 Child Pornography in the Philippines
• STATISTICS: there is scant data available on child pornography
and these statistics do not present the actual extent of the
problem.
Case/ Year 2000 2001 2002 2003
Victims of Pornography 9 4 7 13
Victims of Prostitution 186 224 245 247
Table 1. Reported Cases of Victims of Child Pornography as Compared to
Victims. Survivors of Child Prostitution.
1.1 Paedophilia and Child Pornography in the Philippines
 The need for Anti-Child Pornography legislation in
the Philippines, particularly in relation to the
Internet and the role of the Philippines as a
producer of cybersex and child pornography in
Cyberspace.
 The situation obtaining prior to passage of the
Act, both as regards Child Abuse (e.g. R.A. 7610)
and regulation of the Internet (e.g. R.A. 8792).
1.2 Internet Regulatory Situation Prior to R.A. 9775
2.0 R.A. 9775 – Anti-Child Pornography Act of 2009
2.1 Prohibited Acts
Expressed goal of guaranteeing the fundamental rights of children from all
forms of neglect, cruelty and other conditions prejudicial to their
development; protecting them from all forms of exploitation including their
use in pornographic performances and materials and their inducement or
coercion to engage or be involved in pornography; and complying with
international treaties concerning the rights of children to which the
Philippines is a signatory or a State party.
1. To hire, employ, use, persuade, induce or coerce a child to perform in
the creation or production of any form of child pornography;
2. To produce, direct, manufacture or create any form of child
pornography;
3. To publish offer, transmit, sell, distribute, broadcast, advertise, promote,
export or import any form of child pornography;
4. To knowingly, wilfully and intentionally provide a venue for the
commission of the prohibited acts such as, but not limited to, dens,
private rooms, cubicles, cinemas, houses or in establishments
purporting to be a legitimate business;
2.1 Prohibited Acts (Cont.)
5. To engage in the luring and grooming of a child;
6. To engage in pandering of any form of child pornography;
7. To wilfully access any form of child pornography;
8. To conspire to commit any of the prohibited acts stated; and
9. To possess any form of child pornography and to possess them with
intent to sell, distribute, publish, or broadcast, provided that, possession
of three (3) or more articles of child pornography of the same form shall
be prima facie evidence of the intent to sell, distribute, publish or broad
cast.
In addition, the Act also declares it unlawful:
1. For film directors, theatres and telecommunication companies, by
themselves or in cooperation with other entities, to distribute any form
of child pornography; and
2. For a parent, legal guardian or person having custody or control of a
child to knowingly permit the child to engage, participate or assist in
any form of child pornography.
2.2 Duties of Internet Service Providers (ISPs)
2.2.1 Monitoring (Mandatory Reporting)
All Internet Service Providers (ISPs) shall notify the Philippine
National Police (PNP) or the National Bureau of Investigation (NBI)
within seven (7) days from obtaining facts and circumstances that
any form of child pornography is being committed using its server or
facility. Nothing in this section may be construed to require an ISP to
engage in the monitoring of any user, subscriber or customer or the
content of any communication of such person …
- ISPs now have broad, discretionary, and warrant-less
surveillance powers
- No limits on ISP’s use of monitoring and information for
other purposes: e.g. commercial, marketing or profiling
- Violates principle of ISPs as public utilities
2.2 Duties of ISPs (cont.)
2.2.2 Mandatory Data Retention
Furthermore, an ISP shall preserve such evidence for purposes of
investigation and prosecution by relevant authorities `` …
- No specifics nor limits on the information that ISPs may
collect. Assume any and all.
- No safeguards nor time limits on storage of subscriber data
or information. Forever?
- No safeguards against commercial re-purposing or trading of
subscriber data.
An ISP shall, upon the request of proper authorities, furnish particulars
of users who gained or attempted to gain access to an internet address
that contains any form of child pornography …
- Personal information available upon request,
- No warrant, court order or any judicial review required.
2.2.3 Mandatory Filtering
2.2 Duties of ISPs (cont.)
All ISPs shall install available technology, program or software to
ensure that access to or transmittal of any form of child
pornography will be blocked or filtered.
- Legitimizes filtering and prior censorship of Internet content
- No safeguards to limit discretionary filtering powers
- Overly broad and vague, may be misused by ISPs for anti-
competitive practices
- Reliance on technological “magic bullets” that rarely work as
advertised
2.2.4 Safeguards of Civil Liberties and Consumer Rights
- ISPs are provided immunity from civil suit --
Provided that, no ISP shall be held civilly liable for damages
on account of any notice given in good faith in compliance
with this section.
- Overly broad discretionary powers are vested in an “Anti-
Child Pornography Council”
2.3 Duties of Internet Content Host
a person who hosts or who proposes to host Internet
content in the Philippines.
• Internet content hosts are prohibited from hosting any form
of child pornography on its address;
• to report within seven (7) days the presence of any form of
child pornography, as well as the particulars of the person
maintaining, hosting, distributing or in any manner
contributing to child pornography, to the proper authorities;
and
• to preserve such evidence for purposes of investigation and
prosecution by relevant authorities.
In addition, an Internet content host, upon the request of
proper authorities, is required to furnish the particulars of
users who gained or attempted to gain access to an internet
address that contains any form of child pornography.
2.5 Surfacing Tensions
2.5.1 Defining “pornography”
2.5.2 Vesting powers in an “overseer”
• Who decides what is “pornographic”?
• Quis custodiet ipsos custodes?
- Freedom of Expression issues
- Legislating Morality – modes of controlling sexual roles and
identities
• Mission creep (e.g. application to National Security)?
• Emerging problematic legal concepts (e.g. intermediary
liability)
• Surveillance applications in Mobile Telephony
2.4 Comparison to Model Legislation
• Absence of Blocking Provision in ICME framework
• Global norm is voluntary filtering, if any
2.4 Surfacing Tensions (cont.)
2.5.4 Problems with new technologies – exposing socio-
technological gaps
2.5.3 Reliance on technological solutions
• Technological solutions (alone) rarely work
• Vests power in (commercial) vendors of technology
• Locks people into proprietary technologies
• Vendor-capture and graft
• Anonymity on the Internet
• Privacy and the handling of Personally Identifiable Information
3.0 Privacy in the Philippines
3.1 Habeas Data and the Common Right to Privacy
3.2 Constitutional Provisions (Sections 2 and 3-1)
3.3 Civil Code (Articles 26 and 32-1)
3.4 Tañada Anti-Wiretapping Act of 1965 (R.A. 4200)
3.5 E-Commerce Act (R.A. 8792) on ISPs
3.6 Anti-Photo and Video Voyeurism Act of 2009
(R.A. 9995)
3.7 Senate Bill No. 2796: Cybercrime Prevention Act of
2012
Strands of Privacy and Standards for Intrusion
• Locational or situational privacy
• Informational privacy
• Decisional privacy
the standard for a valid intrusion to privacy is either a
valid warrant or lawful order by a court or a law
prescribing such intrusion based on public safety or
public order.
• Morfe vs. Mutuc (
• Ople vs. Torres (Supreme Court nullified A.O. No. 308
-National ID system)
4.0 Existing Legislations
4.1 Anti-Wiretapping law (1965)
4.2 Electronic Commerce Act (2000)
4.3 Anti-Photo and Video Voyeurism Act (2009)
4.4 Data Privacy Act (2012)
4.5 Cyber Crime Prevention Act (2012)
5.0 Contentious Legal Issues
5.1 Efficacy of Technical Means of Cyber-control
5.2 Implementation of Reporting, Monitoring and
Blocking
5.3 Government Attitudes (Feature Creep and Law
Enforcement)
5.4 Commercial Use of Internet Monitoring and Filtering
5.5 Preservation of Evidence
5.6 Furnishing of Particulars of Users
5.7 Blocking, Filtering and Removal
Other Questions:
• Technical Issues
• Efficacy of Filtering
• Public Websites versus Private Exchanges
• Filtering as a Palliative
• Commercial Interests of ISPs
• R.A. 9775’s Implementing Rules and Regulations
6.0 Summary and Recommendations
 Passage of a (newer) Anti-Cybercrime law with
statutory/ judicial safeguards of civil liberties,
specifically to expand upon and supersede the
relevant sections in the Anti-Child Porn Act.
 Amendments and additions to the Data Privacy Bill
that would restrict re-purposing of data.
 Amendments to the Anti-Child Porn IRRs to provide
legal protections, delimit the commercial use of
monitoring and filtering capabilities, include other
stakeholders.
Salamat Po !!!
• Winthrop Yu (ISOC-PH) w.yu@gmx.net
• Gilbert Lumantao (DAP) lumantao@gmail.com
• Charlyn Justimbaste

Contenu connexe

Tendances

RA 9344-PRESENTATION.ppt.pptx
RA 9344-PRESENTATION.ppt.pptxRA 9344-PRESENTATION.ppt.pptx
RA 9344-PRESENTATION.ppt.pptxArthurLegaspina3
 
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012armaexen
 
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004Sharon Geroquia
 
The child and youth law in the philippines
The child and youth law in the philippinesThe child and youth law in the philippines
The child and youth law in the philippinesChester Relleve
 
Rape law lectures
 Rape law lectures Rape law lectures
Rape law lecturesJoyCee8
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
6 ra 10630 amending ra 9344
6   ra 10630 amending ra 93446   ra 10630 amending ra 9344
6 ra 10630 amending ra 9344hanahgail
 
Special protection of children against child abuse exploitation and discrim...
Special protection of children against child abuse   exploitation and discrim...Special protection of children against child abuse   exploitation and discrim...
Special protection of children against child abuse exploitation and discrim...Gerald Anthony Lazaro
 
Privilege Speech: Child Cyber Pornography
Privilege Speech: Child Cyber PornographyPrivilege Speech: Child Cyber Pornography
Privilege Speech: Child Cyber PornographySenator Loren Legarda
 
Ra 9262 anti_violence_against_woment_and
Ra 9262 anti_violence_against_woment_andRa 9262 anti_violence_against_woment_and
Ra 9262 anti_violence_against_woment_andJennifer Fabre
 
Children in Substance Abuse and Armed Conflict
Children in Substance Abuse and Armed ConflictChildren in Substance Abuse and Armed Conflict
Children in Substance Abuse and Armed ConflictNilendra Kumar
 

Tendances (20)

Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
RA 9344-PRESENTATION.ppt.pptx
RA 9344-PRESENTATION.ppt.pptxRA 9344-PRESENTATION.ppt.pptx
RA 9344-PRESENTATION.ppt.pptx
 
Ra 7610
Ra 7610Ra 7610
Ra 7610
 
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012
 
OSAEC - pptx
OSAEC - pptxOSAEC - pptx
OSAEC - pptx
 
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
 
Special Protection Against Child Abuse, Exploitation and Discrimination Act (...
Special Protection Against Child Abuse, Exploitation and Discrimination Act (...Special Protection Against Child Abuse, Exploitation and Discrimination Act (...
Special Protection Against Child Abuse, Exploitation and Discrimination Act (...
 
The child and youth law in the philippines
The child and youth law in the philippinesThe child and youth law in the philippines
The child and youth law in the philippines
 
Rape law lectures
 Rape law lectures Rape law lectures
Rape law lectures
 
Ra 9262 (vawc)
Ra 9262 (vawc)Ra 9262 (vawc)
Ra 9262 (vawc)
 
Ra 7610
Ra 7610Ra 7610
Ra 7610
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
6 ra 10630 amending ra 9344
6   ra 10630 amending ra 93446   ra 10630 amending ra 9344
6 ra 10630 amending ra 9344
 
Special protection of children against child abuse exploitation and discrim...
Special protection of children against child abuse   exploitation and discrim...Special protection of children against child abuse   exploitation and discrim...
Special protection of children against child abuse exploitation and discrim...
 
Privilege Speech: Child Cyber Pornography
Privilege Speech: Child Cyber PornographyPrivilege Speech: Child Cyber Pornography
Privilege Speech: Child Cyber Pornography
 
Ra 9262 anti_violence_against_woment_and
Ra 9262 anti_violence_against_woment_andRa 9262 anti_violence_against_woment_and
Ra 9262 anti_violence_against_woment_and
 
Ra7277 crz
Ra7277 crzRa7277 crz
Ra7277 crz
 
Children in Substance Abuse and Armed Conflict
Children in Substance Abuse and Armed ConflictChildren in Substance Abuse and Armed Conflict
Children in Substance Abuse and Armed Conflict
 
Ra 7610
Ra 7610Ra 7610
Ra 7610
 
ra 10364 new.pptx
ra 10364 new.pptxra 10364 new.pptx
ra 10364 new.pptx
 

En vedette

IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safetyjaenjenny
 
Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)Mark Peralta
 
Cybercrime Bill (House Bill 5808)
Cybercrime Bill (House Bill 5808)Cybercrime Bill (House Bill 5808)
Cybercrime Bill (House Bill 5808)Sonnie Santos
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality reportJonan Momo
 
R.A. No. 9775 - Anti-Child Pornography Act of 2009
R.A. No. 9775 - Anti-Child Pornography Act of 2009R.A. No. 9775 - Anti-Child Pornography Act of 2009
R.A. No. 9775 - Anti-Child Pornography Act of 2009I-Café Pilipinas
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012Jim Ayson
 
Orientation ra 9208 ii
Orientation ra 9208 iiOrientation ra 9208 ii
Orientation ra 9208 iiOmar Jacalne
 
Professional Code of Ethics in Software Engineering
Professional Code of Ethics in Software EngineeringProfessional Code of Ethics in Software Engineering
Professional Code of Ethics in Software EngineeringLemi Orhan Ergin
 
Trespassing The Forgotten and Abandoned: Ethics in Software Development
Trespassing The Forgotten and Abandoned:  Ethics in Software DevelopmentTrespassing The Forgotten and Abandoned:  Ethics in Software Development
Trespassing The Forgotten and Abandoned: Ethics in Software DevelopmentLemi Orhan Ergin
 
Presentation Child Abuse
Presentation Child AbusePresentation Child Abuse
Presentation Child Abuseguestb975669b
 
Laws on children rights and protection
Laws on children rights and protectionLaws on children rights and protection
Laws on children rights and protectionGrace Fabrero
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 

En vedette (18)

Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Mapeh quizstar
Mapeh quizstarMapeh quizstar
Mapeh quizstar
 
Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)
 
Cybercrime Bill (House Bill 5808)
Cybercrime Bill (House Bill 5808)Cybercrime Bill (House Bill 5808)
Cybercrime Bill (House Bill 5808)
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
R.A. No. 9775 - Anti-Child Pornography Act of 2009
R.A. No. 9775 - Anti-Child Pornography Act of 2009R.A. No. 9775 - Anti-Child Pornography Act of 2009
R.A. No. 9775 - Anti-Child Pornography Act of 2009
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
 
Orientation ra 9208 ii
Orientation ra 9208 iiOrientation ra 9208 ii
Orientation ra 9208 ii
 
Professional Code of Ethics in Software Engineering
Professional Code of Ethics in Software EngineeringProfessional Code of Ethics in Software Engineering
Professional Code of Ethics in Software Engineering
 
Child Abuse
Child AbuseChild Abuse
Child Abuse
 
Trespassing The Forgotten and Abandoned: Ethics in Software Development
Trespassing The Forgotten and Abandoned:  Ethics in Software DevelopmentTrespassing The Forgotten and Abandoned:  Ethics in Software Development
Trespassing The Forgotten and Abandoned: Ethics in Software Development
 
Presentation Child Abuse
Presentation Child AbusePresentation Child Abuse
Presentation Child Abuse
 
Laws on children rights and protection
Laws on children rights and protectionLaws on children rights and protection
Laws on children rights and protection
 
Child abuse ppt
Child abuse pptChild abuse ppt
Child abuse ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 

Similaire à Anti-Child Porn Act & Privacy (slides from ICT4PHD)

Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxRomanoGabrillo1
 
Internet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsInternet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsGener Luis Morada
 
Em505 report(pecha kucha video)
Em505 report(pecha kucha video)Em505 report(pecha kucha video)
Em505 report(pecha kucha video)Eunice Alamag
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference Endcode_org
 
Transnational Crime.pptx
Transnational Crime.pptxTransnational Crime.pptx
Transnational Crime.pptxPiodosRostom
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-finalAldrin SuperGo
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesSheila Mable
 
ethcpp05-Unit 3.ppt
ethcpp05-Unit 3.pptethcpp05-Unit 3.ppt
ethcpp05-Unit 3.pptAnil Yadav
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislationTgarmon34
 
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert
 
Privacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal RisksPrivacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal RisksTechWell
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speechUc Man
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowskisegughana
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]leslieannpt
 
Seat Belt, Cybercrime, Anti-Child Pornography Act.pptx
Seat Belt, Cybercrime, Anti-Child Pornography Act.pptxSeat Belt, Cybercrime, Anti-Child Pornography Act.pptx
Seat Belt, Cybercrime, Anti-Child Pornography Act.pptxMartinGeraldine
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislationUlf Mattsson
 
Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesTommy Hobin
 

Similaire à Anti-Child Porn Act & Privacy (slides from ICT4PHD) (20)

Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptx
 
Internet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsInternet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social Controls
 
Em505 report(pecha kucha video)
Em505 report(pecha kucha video)Em505 report(pecha kucha video)
Em505 report(pecha kucha video)
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
 
Transnational Crime.pptx
Transnational Crime.pptxTransnational Crime.pptx
Transnational Crime.pptx
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Right to Information Act
Right to Information ActRight to Information Act
Right to Information Act
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologies
 
How can you improve cybersecurity at your law firm?
How can you improve cybersecurity at your law firm?How can you improve cybersecurity at your law firm?
How can you improve cybersecurity at your law firm?
 
ethcpp05-Unit 3.ppt
ethcpp05-Unit 3.pptethcpp05-Unit 3.ppt
ethcpp05-Unit 3.ppt
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
 
Privacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal RisksPrivacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal Risks
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
 
Seat Belt, Cybercrime, Anti-Child Pornography Act.pptx
Seat Belt, Cybercrime, Anti-Child Pornography Act.pptxSeat Belt, Cybercrime, Anti-Child Pornography Act.pptx
Seat Belt, Cybercrime, Anti-Child Pornography Act.pptx
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislation
 
Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal Liabilities
 

Dernier

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Dernier (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Anti-Child Porn Act & Privacy (slides from ICT4PHD)

  • 1. This paper provides an overview of certain provisions of Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, particularly those that affect the Internet, the Constitutional provisions related to the Right to Privacy, other pieces of legislation as well as jurisprudence related to the Right to Privacy, and the questions arising from this law’s provisions. The Anti-Child Pornography Act of 2009: An Impending Debate on Privacy in the Philippines
  • 2. 1.0 Child Pornography in the Philippines • STATISTICS: there is scant data available on child pornography and these statistics do not present the actual extent of the problem. Case/ Year 2000 2001 2002 2003 Victims of Pornography 9 4 7 13 Victims of Prostitution 186 224 245 247 Table 1. Reported Cases of Victims of Child Pornography as Compared to Victims. Survivors of Child Prostitution.
  • 3. 1.1 Paedophilia and Child Pornography in the Philippines  The need for Anti-Child Pornography legislation in the Philippines, particularly in relation to the Internet and the role of the Philippines as a producer of cybersex and child pornography in Cyberspace.  The situation obtaining prior to passage of the Act, both as regards Child Abuse (e.g. R.A. 7610) and regulation of the Internet (e.g. R.A. 8792). 1.2 Internet Regulatory Situation Prior to R.A. 9775
  • 4. 2.0 R.A. 9775 – Anti-Child Pornography Act of 2009 2.1 Prohibited Acts Expressed goal of guaranteeing the fundamental rights of children from all forms of neglect, cruelty and other conditions prejudicial to their development; protecting them from all forms of exploitation including their use in pornographic performances and materials and their inducement or coercion to engage or be involved in pornography; and complying with international treaties concerning the rights of children to which the Philippines is a signatory or a State party. 1. To hire, employ, use, persuade, induce or coerce a child to perform in the creation or production of any form of child pornography; 2. To produce, direct, manufacture or create any form of child pornography; 3. To publish offer, transmit, sell, distribute, broadcast, advertise, promote, export or import any form of child pornography; 4. To knowingly, wilfully and intentionally provide a venue for the commission of the prohibited acts such as, but not limited to, dens, private rooms, cubicles, cinemas, houses or in establishments purporting to be a legitimate business;
  • 5. 2.1 Prohibited Acts (Cont.) 5. To engage in the luring and grooming of a child; 6. To engage in pandering of any form of child pornography; 7. To wilfully access any form of child pornography; 8. To conspire to commit any of the prohibited acts stated; and 9. To possess any form of child pornography and to possess them with intent to sell, distribute, publish, or broadcast, provided that, possession of three (3) or more articles of child pornography of the same form shall be prima facie evidence of the intent to sell, distribute, publish or broad cast. In addition, the Act also declares it unlawful: 1. For film directors, theatres and telecommunication companies, by themselves or in cooperation with other entities, to distribute any form of child pornography; and 2. For a parent, legal guardian or person having custody or control of a child to knowingly permit the child to engage, participate or assist in any form of child pornography.
  • 6. 2.2 Duties of Internet Service Providers (ISPs) 2.2.1 Monitoring (Mandatory Reporting) All Internet Service Providers (ISPs) shall notify the Philippine National Police (PNP) or the National Bureau of Investigation (NBI) within seven (7) days from obtaining facts and circumstances that any form of child pornography is being committed using its server or facility. Nothing in this section may be construed to require an ISP to engage in the monitoring of any user, subscriber or customer or the content of any communication of such person … - ISPs now have broad, discretionary, and warrant-less surveillance powers - No limits on ISP’s use of monitoring and information for other purposes: e.g. commercial, marketing or profiling - Violates principle of ISPs as public utilities
  • 7. 2.2 Duties of ISPs (cont.) 2.2.2 Mandatory Data Retention Furthermore, an ISP shall preserve such evidence for purposes of investigation and prosecution by relevant authorities `` … - No specifics nor limits on the information that ISPs may collect. Assume any and all. - No safeguards nor time limits on storage of subscriber data or information. Forever? - No safeguards against commercial re-purposing or trading of subscriber data. An ISP shall, upon the request of proper authorities, furnish particulars of users who gained or attempted to gain access to an internet address that contains any form of child pornography … - Personal information available upon request, - No warrant, court order or any judicial review required.
  • 8. 2.2.3 Mandatory Filtering 2.2 Duties of ISPs (cont.) All ISPs shall install available technology, program or software to ensure that access to or transmittal of any form of child pornography will be blocked or filtered. - Legitimizes filtering and prior censorship of Internet content - No safeguards to limit discretionary filtering powers - Overly broad and vague, may be misused by ISPs for anti- competitive practices - Reliance on technological “magic bullets” that rarely work as advertised
  • 9. 2.2.4 Safeguards of Civil Liberties and Consumer Rights - ISPs are provided immunity from civil suit -- Provided that, no ISP shall be held civilly liable for damages on account of any notice given in good faith in compliance with this section. - Overly broad discretionary powers are vested in an “Anti- Child Pornography Council”
  • 10. 2.3 Duties of Internet Content Host a person who hosts or who proposes to host Internet content in the Philippines. • Internet content hosts are prohibited from hosting any form of child pornography on its address; • to report within seven (7) days the presence of any form of child pornography, as well as the particulars of the person maintaining, hosting, distributing or in any manner contributing to child pornography, to the proper authorities; and • to preserve such evidence for purposes of investigation and prosecution by relevant authorities. In addition, an Internet content host, upon the request of proper authorities, is required to furnish the particulars of users who gained or attempted to gain access to an internet address that contains any form of child pornography.
  • 11. 2.5 Surfacing Tensions 2.5.1 Defining “pornography” 2.5.2 Vesting powers in an “overseer” • Who decides what is “pornographic”? • Quis custodiet ipsos custodes? - Freedom of Expression issues - Legislating Morality – modes of controlling sexual roles and identities • Mission creep (e.g. application to National Security)? • Emerging problematic legal concepts (e.g. intermediary liability) • Surveillance applications in Mobile Telephony 2.4 Comparison to Model Legislation • Absence of Blocking Provision in ICME framework • Global norm is voluntary filtering, if any
  • 12. 2.4 Surfacing Tensions (cont.) 2.5.4 Problems with new technologies – exposing socio- technological gaps 2.5.3 Reliance on technological solutions • Technological solutions (alone) rarely work • Vests power in (commercial) vendors of technology • Locks people into proprietary technologies • Vendor-capture and graft • Anonymity on the Internet • Privacy and the handling of Personally Identifiable Information
  • 13. 3.0 Privacy in the Philippines 3.1 Habeas Data and the Common Right to Privacy 3.2 Constitutional Provisions (Sections 2 and 3-1) 3.3 Civil Code (Articles 26 and 32-1) 3.4 Tañada Anti-Wiretapping Act of 1965 (R.A. 4200) 3.5 E-Commerce Act (R.A. 8792) on ISPs 3.6 Anti-Photo and Video Voyeurism Act of 2009 (R.A. 9995) 3.7 Senate Bill No. 2796: Cybercrime Prevention Act of 2012
  • 14. Strands of Privacy and Standards for Intrusion • Locational or situational privacy • Informational privacy • Decisional privacy the standard for a valid intrusion to privacy is either a valid warrant or lawful order by a court or a law prescribing such intrusion based on public safety or public order. • Morfe vs. Mutuc ( • Ople vs. Torres (Supreme Court nullified A.O. No. 308 -National ID system)
  • 15. 4.0 Existing Legislations 4.1 Anti-Wiretapping law (1965) 4.2 Electronic Commerce Act (2000) 4.3 Anti-Photo and Video Voyeurism Act (2009) 4.4 Data Privacy Act (2012) 4.5 Cyber Crime Prevention Act (2012)
  • 16. 5.0 Contentious Legal Issues 5.1 Efficacy of Technical Means of Cyber-control 5.2 Implementation of Reporting, Monitoring and Blocking 5.3 Government Attitudes (Feature Creep and Law Enforcement) 5.4 Commercial Use of Internet Monitoring and Filtering 5.5 Preservation of Evidence 5.6 Furnishing of Particulars of Users 5.7 Blocking, Filtering and Removal
  • 17. Other Questions: • Technical Issues • Efficacy of Filtering • Public Websites versus Private Exchanges • Filtering as a Palliative • Commercial Interests of ISPs • R.A. 9775’s Implementing Rules and Regulations
  • 18. 6.0 Summary and Recommendations  Passage of a (newer) Anti-Cybercrime law with statutory/ judicial safeguards of civil liberties, specifically to expand upon and supersede the relevant sections in the Anti-Child Porn Act.  Amendments and additions to the Data Privacy Bill that would restrict re-purposing of data.  Amendments to the Anti-Child Porn IRRs to provide legal protections, delimit the commercial use of monitoring and filtering capabilities, include other stakeholders.
  • 19. Salamat Po !!! • Winthrop Yu (ISOC-PH) w.yu@gmx.net • Gilbert Lumantao (DAP) lumantao@gmail.com • Charlyn Justimbaste