Cybercrimewarrants
Cybercrimewarrants
Cybercrimewarrants
RULE ON
CYBERCRIME
WARRANTS
A.M. NO. 17-11-03-SC
A L ECT UR E B Y
AS S OC . D E AN CH R IS TIAN G .
V IL L AS IS
1
11/20/2019
INTRODUCTION
The detection, investigation, and prosecution of cybercrime offenses
necessitate a rule of procedure therefor, especially for the application,
issuance, and implementation of court warrants technically-suited to the
nature of cybercrime offenses;
2
11/20/2019
INTRODUCTION
Through Memorandum Order No. 11-17 dated February 2, 2017, tasked
the Sub-Committee on Commercial Courts to draft the rules of
procedure "that shall respond to the technical requirements of
cybercrime prosecution and aid the cybercrime courts in the exercise
of their special jurisdiction" through a Technical Working Group created
for the purpose…
3
11/20/2019
• This Rule sets forth the procedure for the application and grant of
warrants and related orders involving the preservation,
disclosure, interception, search, seizure, and/or
examination, as well as the custody, and destruction of
computer data…
4
11/20/2019
5
11/20/2019
DEFINITION OF TERMS
SEC . 1.4
• COMMUNICATION – refers to the transmission of information through information and
communications technology (ICT) media, including voice, video, and other forms of data;
• COMPUTER - refers to an electronic, magnetic, optical, electrochemical, or other data
processing or communications device, or grouping of such devices, capable of perfonning
logical arithmetic, routing, or storage functions and which includes any storage facility or
equipment or communications facility or equipment directly related to or operating m
conjunction with such device;
• COMPUTER DATA - refers to any representation of facts, information, or concepts in a form
suitable for processing in a computer system, including a program suitable to cause a computer
system to perform a function, and includes electronic documents and/or electronic data
messages whether stored in local computer systems or online
6
11/20/2019
DEFINITION OF TERMS
SEC . 1.4
7
11/20/2019
DEFINITION OF TERMS
SEC . 1.4
8
11/20/2019
• The criminal actions for violation of Section 4 (Cybercrime offenses) and/or Section 5
(Other offenses), Chapter II of RA 10175, shall be filed before the designated
cybercrime court of the province or city where the offense or any of its elements is
committed, or where any part of the computer system used is situated, or where any
of the damage caused to a natural or juridical person took place;
• All other crimes defined and penalized by the Revised Penal Code, as amended, and
other special laws, committed by, through, and with the use of ICT, as provided under
Section 6, Chapter II of RA 10175, shall be filed before the regular or other
specialized regional trial courts,24 as the case may be.
9
11/20/2019
• An application for a warrant under this Rule concerning a violation of Section 4 (Cybercrime
Offenses) and/or Section 5 (Other Offenses), Chapter II of RA 10175 shall be filed by the law
enforcement authorities before any of the designated cybercrime courts of the province or the
city where the offense or any of its elements has been committed, is being committed,
or is about to be committed, or where any part of the computer system used is situated,
or where any of the damage caused to a natural or juridical person took place…
10
11/20/2019
• Any warrant issued under this Rule shall only be effective for the length of time as determined
by the court, which shall not exceed a period of ten (10) days from its issuance.
• The court issuing the warrant may, upon motion, extend its effectivity based only on justifiable
reasons for a period not exceeding ten (10) days from the expiration of the original period.
• Failure to timely file the returns for any of the issued warrants under this Rule … shall subject
the responsible law enforcement authorities to an action for contempt. (Sec. 2.6)
11
11/20/2019
12
11/20/2019
• Within forty-eight ( 48) hours from implementation or after the expiration of the
effectivity of the WICD, whichever comes first, the authorized law enforcement
officers shall submit a return on the WICD to the court that issued it and
simultaneously turn-over the custody of the intercepted communication or computer
data thereto… (SEC. 5.5)
13
11/20/2019
14
11/20/2019
• Final Return - Within forty-eight (48) hours after the expiration of the period
to examine s shall submit a final return on the WSSECD to the court that
issued it, and simultaneously turn-over the custody of the seized computer
data, as well as all other items seized and/or the communications or computer
data intercepted… (SEC. 6.8)
15
11/20/2019
• Upon the filing of the return for a WDCD or WICD, or the final return for a
WSSECD or WECD, all computer data subject thereof shall be simultaneously
deposited in a sealed package with the same court that issued the warrant. It
shall be accompanied by a complete and verified inventory of all the other
items seized in relation thereto, and by the affidavit of the duly authorized law
enforcement officer…
16
11/20/2019
• Upon the filing of the return for a WDCD or WICD, or the final return for a
WSSECD or WECD, all computer data subject thereof shall be simultaneously
deposited in a sealed package with the same court that issued the warrant. It
shall be accompanied by a complete and verified inventory of all the other
items seized in relation thereto, and by the affidavit of the duly authorized law
enforcement office…
17
11/20/2019
• Upon the filing of the return for a WDCD or WICD, or the final return for a
WSSECD or WECD, all computer data subject thereof shall be simultaneously
deposited in a sealed package with the same court that issued the warrant. It
shall be accompanied by a complete and verified inventory of all the other
items seized in relation thereto, and by the affidavit of the duly authorized law
enforcement office…
18
11/20/2019
19
11/20/2019
20
11/20/2019
• Likewise, the court may, motu proprio, and upon written notice to
all the parties concerned, order the complete or partial
destruction, or return to its lawful owner or possessor, of the
computer data or any of the related items turned over to its
custody if no preliminary investigation or case…
21