Privacy of Communications and Correspondence Flashcards

1
Q

Sec. 3, Art. III. (1)

The privacy of _______ and ____________ shall be inviolable except upon lawful order of the ______, or when _________________ requires otherwise as prescribed by law.

(2) Any __________ obtained in violation of this or the preceding section shall be _________ for any purpose in any proceeding.

A

communication;
correspondence;
court;
public safety or order;

evidence;
inadmissible;

Sec. 3, Art. III. (1)

The privacy of _______ and ____________ shall be inviolable except upon lawful order of the ______, or when _________________ requires otherwise as prescribed by law.

(2) Any __________ obtained in violation of this or the preceding section shall be _________ for any purpose in any proceeding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three strands of the right to privacy?

A
  1. Decisional privacy
  2. Informational privacy
  3. Situational privacy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is decisional privacy?

A

Liberty in the constitutional sense must mean more than freedom from unlawful governmental restraint; it must include privacy as well, if it is to be a repository of freedom. The right to be let alone is indeed the beginning of all freedom…The concept of liberty would be emasculated if it does not likewise compel respect for his personality as a unique individual whose claim to privacy and interference demands respect

[Morfe v. Mutuc, 22 SCRA 424 (1968)].

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is informational privacy?

A

the right of an individual not to have private information about himself disclosed; and the right of an individual to live freely without surveillanceand intrusion

[Whalen v. Roe, 429 US 589, (1977)].

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is situational privacy?

A

the privacy that is felt in physical space, such as that which may be violated by trespass or unwarranted searches and seizure

[Vivares v. St. Therese College, G.R. No. 202666 (2014)]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are zones of privacy?

A

Zones of privacy are recognized and protected in our laws. Within these zones, any form of intrusion is impermissible unless excused by law and in accordance with customary legal process.

The meticulous regard we accord to these zones arises not only from our conviction that the right to privacy is a “constitutional right” and “the right most valued by civilized men,” but also from our adherence to the Universal Declaration on Human Rights which mandates that, “no one shall be subjected to arbitrary interference with his privacy” and “everyone has the right to the protection of the law against such interference or attacks.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Is the right to privacy have a specific provision in the Constitution?

A

NO.

The Constitution does not have a specific provision protecting the right to privacy. It is a penumbral right formed from the shadows created by several constitutional provisions. That is to say, the right to privacy is located within the zones created by various provisions of the Constitution and various statutes which protect aspects of privacy [Ople v. Torres, G.R. No. 127685].

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the provisions in the Constitution enumerated in Ople v Torres wherein which the right of privacy is enshrined?

A

a. Sec. 3 – Privacy of communication
b. Sec. 1 – Life, liberty, and property
c. Sec. 2 – Unreasonable searches and seizures
d. Sec. 6 – Liberty of abode
e. Sec. 8 – Right to form associations
f. Sec. 17 – Right against self-incrimination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is required for one to have an expectation of privacy in his or her online social network activity (facebook)?

A

Before one can have an expectation of privacy in his or her OSN activity, it is first necessary that said user, manifest the intention to keep certain posts private, through the employment of measures to prevent access thereto or to limit its visibility (This case; OSN Privacy Tools).

Therefore, a Facebook user who opts to make use of a privacy tool to grant or deny access to his or her post or profile detail should not be denied the informational privacy right which necessarily accompanies said choice.

[Vivares v. St. Theresa’s College, G.R. No. 202666 (2014)].

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the Requisites of Existence of Privacy Right (Test of Reasonable Expectation Of Privacy)?

A

a. Subjective: A person has exhibited an actual expectation of privacy; and
b. Objective: The expectation be one that society is prepared to recognize as reasonable

[Pollo v. Constantino-David, G.R. No. 181881 (2011)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When is intrusion on privacy allowed?

A

a. by lawful order of the court
b. when public safety or public order requires otherwise, as may be provided by law

a. By lawful order of the court

Probable cause in Sec. 2, Art. III should be followed for the court to allow intrusion. Particularity of description is needed for written correspondence, but if the intrusion is done through wire-taps and the like, there is no need to describe the content. However, identity of the person or persons whose communication is to be intercepted, and the offense or offenses sought to be prevented, and the period of the authorization given shouldbe specified.

b. When public safety or public order requires otherwise, as may be provided by law.

In Ayer Productions Pty. Ltd. v. Capulong [G.R. No. 82380 (1988)], it was held that the right to be let alone is not an absolute right. A limited intrusion to a person’s privacy has long been regarded as permissible where that person is a public figure and the information sought to be elicited from him or to be published about him constitute matters of public character. The interest sought to be protected by the right to privacy is the right to be free from unwarranted publicity, from the wrongful publicizing of the private affairs and activities of an individual which are outside the realm of legitimate public concern.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Introsion on privacy should be based on what?

A

Intrusion has to be based upon a non-judicial government official’s assessment that public safety and order demands such intrusion, limited to the provisions of law. To hold otherwise would be to opt for a government of men, and not of laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is meant by public order and safety?

A

the security of human lives, liberty and property against the activities of invaders, insurrectionist and rebels.

[1971 Constitutional Convention, Session of November 25, 1972]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the presumption on prior restraint on freedom of speech and expression?

A

Presumption of invalidity

Because of the preferred character of the constitutional rights of the freedom of speech and of expression, a weighty presumption of invalidity vitiates measures of prior restraint upon the exercise of such freedoms

[Ayer v. Capulong, supra].

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is the right of privacy of a public figure broader or narrower thatn that of an ordinary citizen?

A

Right of privacy of a public figure is necessarily narrower than that of an ordinary citizen

[Ayer v. Capulong, supra].

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who is a public figure?

A

a person who, by his accomplishments, fame, or mode of living, or by adopting a profession or calling which gives the public a legitimate interest in his doing, his affairs and his character, has become public personage.

17
Q

Does being a public figre automatically destroy in toto a person’s right to privacy?

A

NO.

The press had a privilege, under the constitution, to inform the public about those that have become legitimate matters of public interest. But as held in Lagunzad v. Soto [G.R. No. L-32066 (1979)], being a public figure does not automatically destroy in toto a person’s right to privacy

18
Q

Are personal matters outsie the coverage of people’s right to information?

A

YES.

Kilusang Mayo Uno v. Director-General, NEDA [G.R. No. 167798 (2006)] stated that personal matters are exempt or outside the coverage of the people’s right to information on matters of public concern.

19
Q

Enumerate the two part test to determine the reasonableness of a person’s expectation of privacy

A
  1. Whether by his conduct, the individual has exhibited an expectation of privacy
  2. Whether his expectation is one that society recognizes as reasonable

The factual circumstances of the case determine the reasonableness of the expectation. However, other factors such as customs, physical surroundings and practices of a particular activity, may serve to create or diminish this expectation [Ople v. Torres, supra].

20
Q

When is an encroachment on the right to privace invalid?

A
  1. There is a reasonable expectation of privacy; and

2. if there is no compelling state interest.

21
Q

What is the Effect of invalid intrusions?

A

Sec. 3(2), Art III (the Exclusionary rule)

(2) Any evidence obtained in violation of this or the preceding section shall be inadmissible for any purpose in any proceeding.

22
Q

What is the Exclusionary rule?

A

(2) Any evidence obtained in violation of this or the preceding section shall be inadmissible for any purpose in any proceeding.

23
Q

Does a unified multi-purpose ID system for government violate the right to privacy?

A

NO.

E.O. 424 (s. 2005), adopting a unified multipurpose ID system for government, does not violate the right to privacy because it

(1) narrowly limits the data that can be collected, recorded, and released compared to existing ID systems, and
(2) provides safeguards to protect the confidentiality of the data collected

[KMU v. Director-General, G.R. No. 167798 (2006)].

24
Q

When is an intrusion into the privacy of workplaces valid?

A

An intrusion into the privacy of workplaces is valid if it conforms to the standard of reasonableness. Under this standard, both inception and scope of intrusion must be reasonable.

[Pollo v. Constantino-David, supra].

25
Q

What is under the standard of reasonableness of intrusion (?

A

a. Justified at inception: if there are reasonable grounds for suspecting that it will turn up evidence that the employee is guilty of workrelated misconduct.
b. Scope of intrusion is reasonable: if measures used in the search are reasonable related to the search’s objectives, and it is not highly intrusive

[Pollo v. Constantino-David, supra].

26
Q

Can the right to privacy be invoke on one’s wife?

A

YES.

Right may be invoked against the wife who went to the clinic of her husband and there took documents consisting of private communications between her husband and his alleged paramour

[Zulueta v. CA, G.R. No. 107383 (1996)].

While Zulueta seems to be an exception to the State Action Requirement, Zulueta’s application of the exclusionary rule has only been cited once but to a state action.

27
Q

What does the exclusionary rule apply to?

A

This applies not only to testimonial evidence but also to documentary and object evidence.

Exclusionary Rule • Any evidence obtained in violation of Secs. 2 or 3, Art. III shall be inadmissible for any purpose in any proceeding

28
Q

What is the general rule on on when the Bill of Rights can be invoked?

A

Generally, the provisions in the Bill of Rights are protections against the government.

However, In the case of Zulueta v. CA the Court has recognized an instance where it may also be applied as against a private individual.

29
Q

What is the Writ of Habeas Data?

A

A remedy that is available to any person whose right to life, liberty, and security has been violated or is threatened with violation by an unlawful act or omission of a public official or employee, or of a private individual or entity engaged in the gathering, collecting or storing of data or information regarding the person, family, home and correspondence of the aggrieved party.

30
Q

What is the function of the Writ of Habeas Data?

A

To inquire into all manner of involuntary restraint as distinguished from voluntary and to relieve a person if such restraint is illegal.

31
Q

When is the Writ of Habeas Data available?

A

a. In cases of illegal detention or restraint;

b. In custody cases (even of a corpse)
• Primary requisite for its availability is actual deprivation of right of custody

32
Q

What rule governs Habeas Data?

A

The Rule on the Writ of Habeas Data (A.M. No. 08-1-16SC), which was approved by the SC on 22 January 2008. That Rule shall not diminish, increase or modify substantive rights.

33
Q

When does the Rule on the Writ of Habeas Data take effect?

A

The Rule took effect on 2 February 2008, following its publication in three (3) newspapers of general circulation.

34
Q

Who may file a petition for the issuance of the Writ of Habeas Data?

A

a. The aggrieved party.

b. However, in cases of extralegal killings and enforced disappearances, the petition may be filed by
1. Any member of the immediate family of the aggrieved party, namely: the spouse, children and parents; or
2. Any ascendant, descendant or collateral relative of the aggrieved party within the fourth civil degree of consanguinity or affinity, in default of those mentioned in the preceding paragraph

35
Q

Where can a petitions for the issuance of the Writ of Habeas Data be filed?

A

a. Regional Trial Court
1. Where the petitioner or respondent resides, or
2. That which has jurisdiction over the place where the data or information is gathered, collected or stored, at the option of the petitioner.

b. Supreme Court, Court of Appeals, Sandiganbayan – when the action concerns public data files of government offices

36
Q

Can the petition for the issuance of the Writ of Habeas Data be done in closed chambers instead of a public hearing?

A

YES.

It can be done when the respondent invokes the defense that the release of the data or information in
question shall compromise national security or state secrets, or when the data or information cannot be divulged to the public due to its nature or privileged