Monday, May 20, 2013

TECH AND THE LAW (IPL)


Through time, the human race has evolved and with evolution came different invention; inventions which has become necessary in our everyday life. In today's world, ideas have become a commodity. A very valuable commodity in  which people could benefit from. The more innovative the idea the more valuable it is. However, an idea can be compared to a generic thing which anyone is able to create or conceptualize. But what makes an idea different and mor valuable is its author's originality, no wonder why people feel the need to protect their own ideas.

The Philippine Constitution recognizes that an effective intellectual and industrial property system is vital to the development of creative activity. To this end, it enjoins the State to protect and secure the exclusive rights of scientists, inventors, artists, and other gifted citizens to their intellectual property and creation. To fulfill this mandate, the Philippine Congress passed the Intellectual Property Code, Republic Act 8293, which took effect in 1998. The country also acceded to the Berne Convention, which protects the property rights of artists and writers, and as a member of the World Trade Organization, accepted its mandate to protect intellectual protection expressed and distributed in the various modes and channels invented by man.1 

In the Philippines, copyright laws  protect patents, trademarks, and other forms of intellectual property.

Recently, an amendment was made with the intellectual property law. Malacanang has released its interpretations with the said amendments. Interpretations of which are considered to be accurate in some aspects, and contrary to others.

According to the Malacanang, importing of books, DVDs, and CDs from abroad is still allowed. In fact, the amendments to the Intellectual Property Code have removed the original limitation of three copies when bringing legitimately acquired copies of copyrighted material into the country. Only the importation of pirated or infringed material is illegal. As long as they were legally purchased, you can bring as many copies you want, subject to Customs regulations.

“SEC 190. Importation and Exportation of Infringing Materials. – Subject to the approval of the Secretary of Finance, the Commissioner of Customs is hereby empowered to make rules and regulations for preventing the importation or exportation of infringing articles prohibited under Part IV of this Act and under relevant treaties and conventions to which the Philippines may be a party and for seizing and condemning and disposing of the same in case they are discovered after they have been imported or before they are exported. (Sec. 30, P.D. No. 49)”

An issue has been raised regarding the importation and exportation of purchsed subject. One in particular has been the controversy that Balikbayans no longer enjoy the right to bring home copyrighted music, movies, and books from abroad 2 .However in the explanation given by Malacanang, only importation of pirated materials or infringed material is illegal and that the Secrety of Finance and the Commiser of Customs determine the importation or exportation of infringing articles. 

The reproduction of copyrighted material for personal purposes is not punishable by this law. Infringement in this context refers to the economic rights of the copyright owner. So, if you transfer music from a lawfully acquired CD into a computer, then download it to a portable device for personal use, then you didn’t commit infringement. But if, for example, you make multiple copies of the CD to sell, then infringement occurs. 

There is the 'fair use' doctrine which is base on the American Jurisprudence. Fair use is an affirmative defense that can be raised by an individual who is sued for copyright infringement (or an individual against whom a claim of copyright infringement is alleged) (Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569 (1994)). Once the plaintiff has proven that his or her copyright was infringed upon, the burden lies with the defendant who invokes the fair use defense to prove that her or his use of the copyrighted work of another should be legally permitted, notwithstanding the copyright owner's exclusive rights in her work.3

What is sought to be prevented here is piracy. Making multiple copies of materials, for example CDs and selling them after is prohibited under the law. However legitimately acquiring CDs and transfering them for personal use and for non-profit is allowed. We apply the fair use doctrine in determining whether or not there has been infringment to the owner's right.  If your use is fair, it is not an infringement of copyright, even if it is without the authorization of the copyright holder.4

The law also provides under section 184 to wit; the reproduction or distribution of published articles or materials in a specialized format exclusively for the use of the blind, visually- and reading-impaired persons: Provided, That such copies and distribution shall be made on a nonprofit basis and shall indicate the copyright owner and the date of the original publication. 

Possession of a music file procured through an infringing activity is a violation of the law only if it can be proven that the person benefitting from the music file has knowledge of the infringement, and the power and ability to control the person committing the infringement. 

“SEC. 216. Infringement, states that– 
A person infringes a right protected under this Act when one: 

“(c) With knowledge of infringing activity, induces, causes or materially contributes to the infringing conduct of another.

Infringement is commited only when the copyright owner knew that such a thing has occured. There must be knowledge of the infinging activity and it must be proven in order for a person to be liable under this law.

Jailbreaking or rooting by themselves are not illegal. However, downloading pirated material, or committing infringement with a “jailbroken” phone increases the penalty and damages imposed on the person found guilty of infringement. 

Under section 185.1 of the ammended copyright law of the Philippines,
Decompilation, which is understood here to be the reproduction of the code and translation of the forms of a computer program to achieve the interoperability of an independently created computer program with other programs may also constitute fair use under the criteria established by this section, to the extent that such decompilation is done for the purpose of obtaining the information necessary to achieve such interoperability.

Under the law, jailbreaking is allowed. However if the device is jailbroken, companies have the right to impose conditions or limitations such as the right to revoke warranty if jailbreak was performed on one's device.

Mall owners are not automatically penalized for the infringing acts of their tenants. When a mall owner or lessor finds out about an infringement activity, he or she must give notice to the tenant, then he or she will be afforded time to act upon this knowledge. As stated above, the law requires that one must have both proven knowledge of the infringement, and the ability to control the activities of the infringing person, to be held liable. The mall owner must also have benefitted from the infringement.

The explanation of malacanang in this is found to be contrary to what is writen in the law. Mall owners who receive rental payments from stall owners, the latter happens to have commited an infringement. In this situation mall owners benefit from the rental payment of thr stall owners. Therefore, they are liable if they have received the notice.

Section 126 -infingement states that -

(b) Benefits from the infringing activity of another person who commits an infringement if the person benefiting has been given notice of the infringing activity and has the right and ability to control the activities of the other person;

It is understood that mere notice constitutes as an infringing activity which makes mall owners already liable for the act. Further, the law does not provide proper remedy to mall owners in case such occurs. Due process on the part of mall owners is not found in this provision.

The Intellectual Property Office (IPO) may visit establishments based on reports and complaints; this in itself is constitutional.  However, if the IPO intends to perform a search and seizure, it must comply with constitutional requirements, such as having a search warrant. A warrant wouldn’t be required, however, if the IPO is accompanied by the Bureau of Customs or the Optical Media Board—two agencies that can perform a search and seizure on theirhis  own right without a warrant (per Republic Act No. 1937 and 9239, respectively)

In the Malacanang explanation, there is still the requirement of warrant and that Intellectual Property Office may 'visit' the establishment based on reports and complaints. The exception to this rule is that when the IPO intends to perform a search and seizure which must constitute a search warrant. 

The revised Section 7(d) states  that authorities can --
conduct visits during reasonable hours to establishments and businesses engaging in activities violating intellectual property rights and provisions of this Act based on report, information or complaint received by the office.

Contrary to the explanation of Malacanang in Section 7(d) there is warrantless search conducted by the IPO in 'visiting' the said establishments based on report, information or complaint received by the office. 'Visiting' without warrant would be violative of the Constitutional right to a search warrant. In its explanation, Malacanang distinguished visiting from seach and seizure. Visiting the private establishment by the government agency is prohibited by the Constitution.

Based on the issues raised contrary to certain provision of the Intellectual Property Law as amended,( “SEC. 216. Infringement– A person infringes a right protected under this Act when one: “(c) With knowledge of infringing activity, induces, causes or materially contributes to the infringing conduct of another) I see that there is a burden in terms of ambiguous interpretation of the law which governs what should be protected when it comes to the scopeand technicalities of copyrighted materials or products. To this end, there is a need for the Congress to review said provisions for possible amendments or revision.

Endnotes:
1. http://eprints.rclis.org/11219/1/Copyright_Protection.pdf, May 17, 2013
2.http://www.gmanetwork.com/news/story/294998/scitech/technology/new-ip-law-allows-warrantless-searches-erases-right-to-personal-use, May 19, 2013
3.http://chillingeffects.org/fairuse/faq.cgi, May 20,2013
4.http://chillingeffects.org/fairuse/faq.cgi, May 20,2013
5.http://raissarobles.com/2013/02/14/the-legislative-history-of-amendments-to-the-intellectual-property-code-ra-8293/, May 17, 2013
6.http://www.gov.ph/2013/03/08/faqs-on-the-amendments-to-the-intellectual-property-code-of-the-philippines/, May 14, 2013
7. http://jlp-law.com/blog/republic-act-10372-amending-the-intellectual-property-code-of-the-philippines-ra-8293/, May 14, 2013


Sunday, May 5, 2013

Trial

Aabbccdd

The Data Privacy Act of 2012

Disclaimer: This is only a law student's opinion.

“[T]he ways in which the information we give off about our selves, in photos and e-mails and MySpace pages and all the rest of it, has dramatically increased our social visibility and made it easier for us to find each other but also to be scrutinized in public.”
― Clay Shirky, Here Comes Everybody: The Power of Organizing Without Organizations

The right to privacy is concisely defined as the right to be left alone. It has also been defined as the right of a person to be free from unwanted publicity or disclosure and as the right to live without unwarranted interference by the public in matters with which the public is not necessarily concerned. 1

The right to privacy is a person's natural right however it is not an absolute right and can be limited by the State.

Along with advances in technology bringing about enhancements in the ability of the government to look, listen and pry into the affairs of the citizens, comes a heightened concern of privacy concerns. It is necessary to stress that unless the creeping interference of the government in essentially private matters is moderated, it is likely to destroy that prized and peculiar virtue of the free society – individualism. Every member of the society, while paying proper deference to the general welfare, must not be deprived of the right to be left alone or, in the idiom of the day, “to do his things.”

The protection of the right to privacy was, among others, the reason for the invalidation of Administrative Order No. 308 entitled, Adoption of a National Computerized Identification Reference System in Ople v. Torres. The Court, through Chief Justice Puno speaking, opined that:

Zones of privacy are likewise recognized and protected in our laws. The Civil Code provides that every person shall respect the dignity, personality, privacy and peace of mind of his neighbors and other persons and punishes as actionable torts several acts by a person of meddling and prying into the privacy of another. It also holds a public officer or employee or any private individual liable for damages for any violation of the rights and liberties of another person, and recognizes the privacy of letters and other private communications. The Revised Penal Code makes a crime the violation of secrets by an officer, the revelation of trade and industrial secrets, and trespass to dwelling. Invasion of privacy is an offense in special laws like the Anti-Wiretapping Law, the Secrecy of Bank Deposit Act and the Intellectual Property Code. The Rules of Court on privileged communication likewise recognize the privacy of certain information.

Unlike the dissenters, we prescind from the premise that the right to privacy is a fundamental right guaranteed by the Constitution, hence, it is the burden of government to show that A.O. No. 308 is justified by some compelling state interest and that it is narrowly drawn. A.O. No. 308 is predicated on two considerations: (1) the need to provide our citizens and foreigners with the facility to conveniently transact business with basic service and social security providers and other government instrumentalities and (2) the need to reduce, if not totally eradicate, fraudulent transactions and misrepresentations by persons seeking basic services. It is debatable whether these interests are compelling enough to warrant the issuance of A.O. No. 308. But what is not arguable is the broadness, the vagueness, the overbreadth of A.O. No. 308 which if implemented will put our people's right to privacy in clear and present danger.

In order to bolster the Right to Privacy, the Congress enacted Republic Act 10173 or the Data Privacy Act. Salient features of the law are: It applies to processing of personal information and sensitive personal information; It Creates the National Privacy Commission to monitor the implementation of this law. ; It gives parameters on when and on what premise can data processing of personal information be allowed; Its basic premise is when a data subject has given direct consent; Companies who subcontract processing of personal information to 3rd party shall have full liability and can’t pass the accountability of such responsibility ; Data subject has the right to know if their personal information is being processed. The person can demand information such as the source of info, how their personal information is being used, and copy of their information. One has the right to request removal and destruction of one’s personal data unless there is a legal obligation that required for it to be kept or processed; If the data subject has already passed away or became incapacitated (for one reason or another), their legal assignee or lawful heirs may invoke their data privacy rights; Personal information controllers must ensure security measures are in place to protect the personal information they process and be compliant with the requirements of this law; In case a personal information controller systems or data got compromised, they must notify the affected data subjects and the National Privacy Commission, and finally , heads of government agencies must ensure their system compliance to this law (including security requirements). Personnel can only access sensitive personal information off-site, limited to 1000 records, in government systems with proper authority and in a secured manner.2

Although the issue whether or not the enactment of Republic Act 10173 overturns the ruling of Ople v. Torres is moot and academic for being unripe for adjudication, it is humbly believed that the court will reach the same pronouncements should the Constitutionality of the Data Processing Act be assailed. The Ople Doctrine was premised on the vagueness of the law to the effect that the law on question did not provide how the data to be gathered would be handled. Likewise, it did not provide who may access the data, for what purpose and other circumstances similar to the same. The newly enacted law provides for specific guidelines on how the data would be handled, viz:

Section 11. General Data Privacy Principles. – The processing of personal information shall be allowed, subject to compliance with the requirements of this Act and other laws allowing disclosure of information to the public and adherence to the principles of transparency, legitimate purpose and proportionality.
Personal information must, be:
(a) Collected for specified and legitimate purposes determined and declared before, or as soon as reasonably practicable after collection, and later processed in a way compatible with such declared, specified and legitimate purposes only;
(b) Processed fairly and lawfully;
(c) Accurate, relevant and, where necessary for purposes for which it is to be used the processing of personal information, kept up to date; inaccurate or incomplete data must be rectified, supplemented, destroyed or their further processing restricted;
(d) Adequate and not excessive in relation to the purposes for which they are collected and processed;
(e) Retained only for as long as necessary for the fulfillment of the purposes for which the data was obtained or for the establishment, exercise or defense of legal claims, or for legitimate business purposes, or as provided by law; and
(f) Kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the data were collected and processed: Provided, That personal information collected for other purposes may lie processed for historical, statistical or scientific purposes, and in cases laid down in law may be stored for longer periods: Provided, further, That adequate safeguards are guaranteed by said laws authorizing their processing.
The personal information controller must ensure implementation of personal information processing principles set out herein.

Section 12. Criteria for Lawful Processing of Personal Information. – The processing of personal information shall be permitted only if not otherwise prohibited by law, and when at least one of the following conditions exists:
(a) The data subject has given his or her consent;
(b) The processing of personal information is necessary and is related to the fulfillment of a contract with the data subject or in order to take steps at the request of the data subject prior to entering into a contract;
(c) The processing is necessary for compliance with a legal obligation to which the personal information controller is subject;
(d) The processing is necessary to protect vitally important interests of the data subject, including life and health;
(e) The processing is necessary in order to respond to national emergency, to comply with the requirements of public order and safety, or to fulfill functions of public authority which necessarily includes the processing of personal data for the fulfillment of its mandate; or
(f) The processing is necessary for the purposes of the legitimate interests pursued by the personal information controller or by a third party or parties to whom the data is disclosed, except where such interests are overridden by fundamental rights and freedoms of the data subject which require protection under the Philippine Constitution.

Section 13. Sensitive Personal Information and Privileged Information. – The processing of sensitive personal information and privileged information shall be prohibited, except in the following cases:
(a) The data subject has given his or her consent, specific to the purpose prior to the processing, or in the case of privileged information, all parties to the exchange have given their consent prior to processing;
(b) The processing of the same is provided for by existing laws and regulations: Provided, That such regulatory enactments guarantee the protection of the sensitive personal information and the privileged information: Provided, further, That the consent of the data subjects are not required by law or regulation permitting the processing of the sensitive personal information or the privileged information;
(c) The processing is necessary to protect the life and health of the data subject or another person, and the data subject is not legally or physically able to express his or her consent prior to the processing;
(d) The processing is necessary to achieve the lawful and noncommercial objectives of public organizations and their associations: Provided, That such processing is only confined and related to the bona fidemembers of these organizations or their associations: Provided, further, That the sensitive personal information are not transferred to third parties: Provided, finally, That consent of the data subject was obtained prior to processing;
(e) The processing is necessary for purposes of medical treatment, is carried out by a medical practitioner or a medical treatment institution, and an adequate level of protection of personal information is ensured; or
(f) The processing concerns such personal information as is necessary for the protection of lawful rights and interests of natural or legal persons in court proceedings, or the establishment, exercise or defense of legal claims, or when provided to government or public authority.

On another note, Sec.7 of the Act provides for the Functions of the National Privacy Commission. To wit: administer and implement the provisions of this Act, and to monitor and ensure compliance of the country with international standards set for data protection, there is hereby created an independent body to be known as the National Privacy Commission.

This provision is very interesting because of the use of the word 'independent body. This means that the National Privacy Commission has a broad discretion in implementing the law and that they are not directly under the jurisdiction of the President. Assuming the constitutionality of the provision, here arises issues as to jurisdiction, where to file the case and under what department of the government does the National Privacy Commission belong.

The law even guaranteed for the rights of the data subject, separate chapter on security of personal information and penal provisions should any infarction of the law be committed, whether deliberately or inadvertently. The Court in Ople made it even doctrinal that data gathering is not illegal per se, however, the same must be grounded on a compelling State interest. The promulgation of the law was a reflection of the Congress’ deference with the wisdom of the Supreme Court in adjudicating matters pending before it.

If there is one lesson that every person – whether a member of the Bar or a lay individual – must ponder, it is the pertinence of one’s privacy. Nobody could afford to tolerate the intrusion of others within one’s domestic spheres, so much so if the intruder is the State. The affair of one is certainly not the affair of all. Unless constrained by a very special interest should others be merely allowed to meddle.

1. http://salongacenter.org/2011/07/right-to-privacy/, May 1, 2013.
2. http://digitalfilipino.com/salient-features-of-data-privacy-act-of-2012-republic-act-10173/, April 24, 2013.