{"id":6254,"date":"2020-05-11T16:08:45","date_gmt":"2020-05-11T08:08:45","guid":{"rendered":"https:\/\/pnl-law.com\/blog\/?p=6254"},"modified":"2020-06-05T18:29:13","modified_gmt":"2020-06-05T10:29:13","slug":"cybercrimes-venue-on-criminal-actions-and-application-for-warrants","status":"publish","type":"post","link":"https:\/\/pnl-law.com\/blog\/cybercrimes-venue-on-criminal-actions-and-application-for-warrants\/","title":{"rendered":"Cybercrimes: Venue on Criminal Actions and Application for Warrants"},"content":{"rendered":"\n<p>The&nbsp;<em><a href=\"https:\/\/pnl-law.com\/blog\/rule-on-cybercrime-warrants-a-m-no-17-11-03-sc-full-text\/\">Rule on Cybercrime Warrants<\/a>&nbsp;<\/em>provides the procedure for the application and grant of warrants and related orders involving the preservation, disclosure, interception, search, seizure, and\/or examination, as well as the custody, and destruction of computer data, as provided under the <a href=\"https:\/\/pnl-law.com\/blog\/cybercrime-prevention-act-of-2012-republic-act-no-10175-full-text\/\">Cybercrime Prevention Act of 2012<\/a> (Republic Act No. 10175).&nbsp;<\/p>\n\n\n\n<!--more-->\n\n\n\n<div class=\"wp-block-image is-style-rounded\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"866\" height=\"649\" src=\"https:\/\/pnl-law.com\/blog\/wp-content\/uploads\/2020\/06\/Venue-of-Application-of-Cybercrime-Warrants-and-Filing-of-Cybercrime-Case.jpg\" alt=\"Venue of Application of Cybercrime Warrants and Filing of Cybercrime Case\" class=\"wp-image-7794\"\/><\/figure><\/div>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Related Summaries\/Discussions<\/strong>:<br \/>*&nbsp;<a href=\"https:\/\/pnl-law.com\/blog\/interception-of-computer-data-wicd-in-connection-with-cybercrime-warrants\/\">Warrant to Intercept Computer Data (WICD)<\/a><br \/>*&nbsp;<a href=\"https:\/\/pnl-law.com\/blog\/warrant-to-examine-computer-data-wecd-in-lawful-warrantless-arrests\/\">Warrant to Examine Computer Data (WECD)<\/a><br \/>*&nbsp;<a href=\"https:\/\/pnl-law.com\/blog\/disclosure-of-computer-data-warrant-to-disclose-computer-data-wdcd-under-the-rule-on-cybercrime-warrants\/\">Warrant to Disclose Computer Data (WDCD)<\/a><br \/>*&nbsp;<a href=\"https:\/\/pnl-law.com\/blog\/search-seizure-and-examination-of-computer-data-in-cybercrime-warrants\/\">Warrant to Search, Seize and Examine Computer Data (WSSECD)<\/a><\/td><td><br \/>*&nbsp;<a href=\"https:\/\/pnl-law.com\/blog\/preservation-of-computer-data-under-the-rule-on-cybercrime-warrants\/\">Preservation of Computer Data<\/a><br \/>* <a href=\"https:\/\/pnl-law.com\/blog\/custody-of-computer-data-in-cybercrime-warrants\/\">Custody of computer data<\/a><br \/>* <a href=\"https:\/\/pnl-law.com\/blog\/destruction-of-computer-data-under-the-rule-on-cybercrime-warrants\/\">Destruction of computer data<\/a><br \/>*&nbsp;<a href=\"https:\/\/pnl-law.com\/blog\/cybercrimes-under-the-cybercrime-prevention-act-of-2012-ra-10175\/\">Cybercrimes in the Philippines<\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>The&nbsp;<em><a href=\"https:\/\/pnl-law.com\/blog\/rule-on-cybercrime-warrants-a-m-no-17-11-03-sc-full-text\/\">Rule on Cybercrime Warrants<\/a><\/em>&nbsp;makes a distinction between cybercrime offenses defined and penalized under the <a href=\"https:\/\/pnl-law.com\/blog\/cybercrime-prevention-act-of-2012-republic-act-no-10175-full-text\/\">Cybercrime Prevention Act of 2012<\/a>, and offenses defined in other laws but committed by, through and with the use of <a href=\"https:\/\/pnl-law.com\/blog\/glossary-data-privacy-internet-technology-and-cybercrimes\/#Information-Communications-System\">information and communications technology<\/a> (ICT).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">I. VENUE FOR APPLICATION\/ISSUANCE OF WARRANTS<\/h2>\n\n\n\n<p>Before issuing a warrant, the judge must personally examine in the form of searching questions and answers, in writing and under oath, the applicant and the witnesses he may produce, on facts personally known to them and attach to the record their sworn statements, together with the judicial affidavits submitted. There are designated <a href=\"https:\/\/pnl-law.com\/blog\/designation-of-cybercrime-courts-in-the-philippines-a-m-no-03-03-03-sc\/\">Cybercrime Courts<\/a> throughout the Philippines.<\/p>\n\n\n\n<p><span style=\"text-decoration: underline;\">A. Offenses under RA 10175<\/span><\/p>\n\n\n\n<p>An application for a warrant under this Rule concerning a violation of Section 4 (Cybercrime Offenses) and\/or Section 5 (Other Offenses) of <a href=\"https:\/\/pnl-law.com\/blog\/cybercrime-prevention-act-of-2012-republic-act-no-10175-full-text\/\">RA 10175<\/a> shall be filed by the law enforcement authorities before any of the\u00a0<em><a href=\"https:\/\/pnl-law.com\/blog\/glossary-data-privacy-internet-technology-and-cybercrimes\/#Cybercrime-Court\">designated cybercrime courts<\/a><\/em>\u00a0in the following jurisdictions:<\/p>\n\n\n\n<p>(i) Warrants enforceable nationwide&nbsp;and outside the Philippines:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>1. Quezon City<\/li><li>2 Manila City<\/li><li>3. Makati City<\/li><li>4. Pasig City<\/li><li>5. Cebu City<\/li><li>6. Iloilo City<\/li><li>7. Davao City<\/li><li>8. Cagayan De Oro City<\/li><\/ul>\n\n\n\n<p>(ii) Warrants enforceable only in a particular judicial region, in the province or the city where the&nbsp;offense&nbsp;or&nbsp;any of its elements:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>1. has been committed, is being committed or is about to be committed, or&nbsp;<\/li><li>2. where any part of the computer system used is situated, or&nbsp;<\/li><li>3. where any of the damage caused to a natural or juridical person took place<\/li><\/ul>\n\n\n\n<p><span style=\"text-decoration: underline;\">B. Offenses under other laws<\/span><\/p>\n\n\n\n<p>An application for a warrant for all crimes defined and penalized by the Revised Penal Code, as amended, and other special laws, if committed by, through, and with the use of ICT, shall be filed by the law enforcement authorities with the&nbsp;<em>regular or other specialized regional trial courts<\/em>, as the case may be, within its territorial jurisdiction in the places above-described.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">II. VENUE OF CRIMINAL ACTIONS<\/h2>\n\n\n\n<p>The &nbsp;<em><a href=\"https:\/\/pnl-law.com\/blog\/rule-on-cybercrime-warrants-a-m-no-17-11-03-sc-full-text\/\">Rule on Cybercrime Warrants<\/a><\/em>&nbsp;&nbsp;supplements the existing Rules of Criminal Procedure,&nbsp;which provisions shall continue to govern the preliminary investigation and all stages of prosecution of criminal actions involving violations of <a href=\"https:\/\/pnl-law.com\/blog\/cybercrime-prevention-act-of-2012-republic-act-no-10175-full-text\/\">RA 10175<\/a>, including all crimes defined and penalized by the Revised Penal Code, as amended, and special laws, committed by, through, and with the use of information and communications technologies.&nbsp;<\/p>\n\n\n\n<p><span style=\"text-decoration: underline;\">A. Offenses under RA 10175<\/span><\/p>\n\n\n\n<p>The criminal actions for violation of Section 4 (Cybercrime offenses) and\/or Section 5 (Other offenses) of <a href=\"https:\/\/pnl-law.com\/blog\/cybercrime-prevention-act-of-2012-republic-act-no-10175-full-text\/\">RA 10175<\/a>, shall be filed before the\u00a0<em><a href=\"https:\/\/pnl-law.com\/blog\/designation-of-cybercrime-courts-in-the-philippines-a-m-no-03-03-03-sc\/\">designated cybercrime court<\/a>\u00a0<\/em>of the province or city:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>1. where the offense or any of its elements is committed, or&nbsp;<\/li><li>where any part of the computer system used is situated, or&nbsp;<\/li><li>where any of the damage caused to a natural or juridical person took place<\/li><\/ul>\n\n\n\n<p>The court where the criminal action is first filed shall acquire jurisdiction to the exclusion of the other courts.&nbsp;<\/p>\n\n\n\n<p><span style=\"text-decoration: underline;\">B. Offenses under other laws<\/span><\/p>\n\n\n\n<p>All other crimes defined and penalized by the Revised Penal Code, as amended, and other special laws, committed by, through, and with the use of ICT shall be filed before the&nbsp;<em>regular or other specialized<\/em>&nbsp;regional trial courts,&nbsp;as the case may be.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">III. INCIDENTAL MATTERS<\/h2>\n\n\n\n<p>Once a criminal action is instituted, a motion to quash and other incidents that relate to the warrant shall be heard and resolved by the court that subsequently acquired jurisdiction over the criminal action. The prosecution has the duty to move for the transmittal of the records, as well as the transfer of the items\u2019 custody to the latter court. [See <a href=\"https:\/\/pnl-law.com\/blog\/custody-of-computer-data-in-cybercrime-warrants\/\">Custody of Computer Data<\/a>] &nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">IV. DUTY OF PROSECUTOR&nbsp;<\/h2>\n\n\n\n<p>Once a criminal action is instituted, it shall be the duty of the prosecutor, or his\/her duly authorized representatives, to move for the immediate transmittal of the records as well as the transfer of the intercepted, disclosed, searched, seized and\/or examined computer data and items, including the complete and verified inventory thereof, to the court that subsequently acquired jurisdiction over the criminal action. The motion for the purpose shall be filed before the court that issued the warrant and has custody of the computer data within 10 days from the time the criminal action is instituted and shall be acted upon by the court within a period of 5 days.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The&nbsp;Rule on Cybercrime Warrants&nbsp;provides the procedure for the application and grant of warrants and related orders involving the preservation, disclosure, interception, search, seizure, and\/or examination, as well as the custody, and destruction of computer data, as provided under the Cybercrime Prevention Act of 2012 (Republic Act No. 10175).&nbsp;<\/p>\n","protected":false},"author":7,"featured_media":7794,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,148],"tags":[354,149,1478,151,90,1484,1032,433],"class_list":["post-6254","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-criminal-law","category-internet-law","tag-criminal-case","tag-cybercrime-prevention-act-of-2012","tag-cybercrime-warrants","tag-cybercrimes","tag-philippines","tag-rule-on-cybercrime-warrants","tag-search-and-seizure","tag-search-warrant"],"_links":{"self":[{"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/posts\/6254","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/comments?post=6254"}],"version-history":[{"count":8,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/posts\/6254\/revisions"}],"predecessor-version":[{"id":7961,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/posts\/6254\/revisions\/7961"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/media\/7794"}],"wp:attachment":[{"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/media?parent=6254"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/categories?post=6254"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/tags?post=6254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}