{"id":6271,"date":"2020-01-11T18:11:00","date_gmt":"2020-01-11T10:11:00","guid":{"rendered":"https:\/\/pnl-law.com\/blog\/?p=6271"},"modified":"2020-06-14T15:09:08","modified_gmt":"2020-06-14T07:09:08","slug":"preservation-of-computer-data-under-the-rule-on-cybercrime-warrants","status":"publish","type":"post","link":"https:\/\/pnl-law.com\/blog\/preservation-of-computer-data-under-the-rule-on-cybercrime-warrants\/","title":{"rendered":"Preservation of Computer Data under the Rule on Cybercrime Warrants"},"content":{"rendered":"\n<p>The integrity of traffic data and subscriber&#8217;s information shall be kept, retained, and preserved by a service provider for a minimum period of six (6) months from the date of the transaction. On the other hand, content data shall be preserved for six (6) months from the date of receipt of the order from law enforcement authorities requiring its preservation. These are provided in Section 13 of Republic Act No. 10175, also known as the <a href=\"https:\/\/pnl-law.com\/blog\/cybercrime-prevention-act-of-2012-republic-act-no-10175-full-text\/\">Cybercrime Prevention Act of 2012<\/a>.<\/p>\n\n\n\n<!--more-->\n\n\n\n<div class=\"wp-block-image is-style-rounded\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"869\" height=\"651\" src=\"https:\/\/pnl-law.com\/blog\/wp-content\/uploads\/2020\/06\/Preservation-of-Computer-Data-in-Cybercrime-Warrants.png\" alt=\"Preservation of Computer Data in Cybercrime Warrants\" class=\"wp-image-7790\"\/><\/figure><\/div>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Related Summaries\/Discussions<\/strong>:<br \/>*&nbsp;<a href=\"https:\/\/pnl-law.com\/blog\/interception-of-computer-data-wicd-in-connection-with-cybercrime-warrants\/\">Warrant to Intercept Computer Data (WICD)<\/a><br \/>*&nbsp;<a href=\"https:\/\/pnl-law.com\/blog\/warrant-to-examine-computer-data-wecd-in-lawful-warrantless-arrests\/\">Warrant to Examine Computer Data (WECD)<\/a><br \/>*&nbsp;<a href=\"https:\/\/pnl-law.com\/blog\/disclosure-of-computer-data-warrant-to-disclose-computer-data-wdcd-under-the-rule-on-cybercrime-warrants\/\">Warrant to Disclose Computer Data (WDCD)<\/a><br \/>*&nbsp;<a href=\"https:\/\/pnl-law.com\/blog\/search-seizure-and-examination-of-computer-data-in-cybercrime-warrants\/\">Warrant to Search, Seize and Examine Computer Data (WSSECD)<\/a><\/td><td><br \/>*&nbsp;<a href=\"https:\/\/pnl-law.com\/blog\/cybercrimes-venue-on-criminal-actions-and-application-for-warrants\/\">Venue on Criminal Actions and Application for Warrants<\/a><br \/>* <a href=\"https:\/\/pnl-law.com\/blog\/custody-of-computer-data-in-cybercrime-warrants\/\">Custody of computer data<\/a><br \/>* <a href=\"https:\/\/pnl-law.com\/blog\/destruction-of-computer-data-under-the-rule-on-cybercrime-warrants\/\">Destruction of computer data<\/a><br \/>*&nbsp;<a href=\"https:\/\/pnl-law.com\/blog\/cybercrimes-under-the-cybercrime-prevention-act-of-2012-ra-10175\/\">Cybercrimes in the Philippines<\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>The order to preserve the computer data may go beyond the 6-month period in the following instances:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>(a) Law enforcement authorities may&nbsp;<strong>order<\/strong>&nbsp;a&nbsp;<em>one-time extension<\/em>&nbsp;for another six (6) months.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Once computer data that is preserved, transmitted or stored by a service provider is used as evidence in a case, the receipt by the service provider of a copy of the transmittal document to the Office of the Prosecutor shall be deemed a notification to preserve the computer data&nbsp;<em>until the final termination of the case and\/or as ordered by the court<\/em>, as the case maybe.&nbsp;<\/li><\/ul>\n\n\n\n<p>The service provider ordered to preserve computer data shall keep the order and its compliance therewith&nbsp;<strong>confidential<\/strong>.&nbsp;<\/p>\n\n\n\n<p>The obligation to preserve traffic data, subscriber\u2019s information, and content data does not equate to an obligation to disclose the data. A warrant must be secured to authorize the disclosure of the computer data. This is called a <a href=\"https:\/\/pnl-law.com\/blog\/disclosure-of-computer-data-warrant-to-disclose-computer-data-wdcd-under-the-rule-on-cybercrime-warrants\/\">Warrant to Disclose Computer Data (WDCD)<\/a>.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The integrity of traffic data and subscriber&#8217;s information shall be kept, retained, and preserved by a service provider for a minimum period of six (6) months from the date of the transaction. On the other hand, content data shall be preserved for six (6) months from the date of receipt of the order from law [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":7790,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,148],"tags":[149,151,1484,1032,433,1485],"class_list":["post-6271","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-criminal-law","category-internet-law","tag-cybercrime-prevention-act-of-2012","tag-cybercrimes","tag-rule-on-cybercrime-warrants","tag-search-and-seizure","tag-search-warrant","tag-warrants"],"_links":{"self":[{"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/posts\/6271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/comments?post=6271"}],"version-history":[{"count":4,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/posts\/6271\/revisions"}],"predecessor-version":[{"id":8628,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/posts\/6271\/revisions\/8628"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/media\/7790"}],"wp:attachment":[{"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/media?parent=6271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/categories?post=6271"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/tags?post=6271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}