{"id":8058,"date":"2020-06-07T14:44:31","date_gmt":"2020-06-07T06:44:31","guid":{"rendered":"https:\/\/pnl-law.com\/blog\/?p=8058"},"modified":"2020-06-08T01:52:01","modified_gmt":"2020-06-07T17:52:01","slug":"laws-on-identity-theft-in-the-philippines","status":"publish","type":"post","link":"https:\/\/pnl-law.com\/blog\/laws-on-identity-theft-in-the-philippines\/","title":{"rendered":"The Crime of Identity Theft and Fake Accounts in the Philippines"},"content":{"rendered":"\n<p>The advent of technology blurs the line between crimes committed in the physical world and crimes committed in the electronic world. In the United States of America (U.S.), the Federal Trade Commission (<a rel=\"noreferrer noopener\" href=\"https:\/\/www.consumer.ftc.gov\/\" target=\"_blank\">FTC<\/a>) has a dedicated one-stop resource, the&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.identitytheft.gov\/\" target=\"_blank\">IdentityTheft.gov<\/a>,&nbsp;for identity theft victims (we are unaware if the&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.privacy.gov.ph\/\" target=\"_blank\">Philippine National Privacy Commission<\/a>&nbsp;has a similar resource). Identity theft, according to the FTC,&nbsp;happens when someone uses your Social Security number or other&nbsp;<strong>personal information<\/strong>&nbsp;to open new accounts, make purchases, or get a tax refund. The applicable laws on identity theft in the Philippines are discussed below.<\/p>\n\n\n\n<!--more-->\n\n\n\n<div class=\"wp-block-image is-style-rounded\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"838\" height=\"628\" src=\"https:\/\/pnl-law.com\/blog\/wp-content\/uploads\/2020\/06\/Applicable-Laws-on-Identity-Theft-in-the-Philippines.png\" alt=\"Philippine Laws on Identity Theft\" class=\"wp-image-8059\"\/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">I. IDENTIFY THEFT AS A CYBERCRIME<\/h2>\n\n\n\n<p>Under the <a href=\"https:\/\/pnl-law.com\/blog\/cybercrimes-under-the-cybercrime-prevention-act-of-2012-ra-10175\/\">Cybercrime Prevention Act of 2012<\/a> (<a href=\"https:\/\/pnl-law.com\/blog\/cybercrime-prevention-act-of-2012-republic-act-no-10175-full-text\/\">Republic Act No. 10175<\/a>),&nbsp;<strong>computer-related identity theft<\/strong>&nbsp;is defined as \u201cthe intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without right\u201d [Sec. 4(b)(3)]. Note that the identity theft covers <strong>identifying information<\/strong>, which refers&nbsp;to any name or number that may be used alone or in conjunction with any other information to identify any specific individual, including any of the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>1. Name, date of birth, driver\u2019s license number, passport number or tax identification number;<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>2. Unique biometric data, such as fingerprint or other unique physical representation;<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>3. Unique electronic identification number, address or routing code; and<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>4. Telecommunication identifying information or <a href=\"https:\/\/pnl-law.com\/blog\/credit-cards-access-devices-regulation-explained\/\">access device<\/a>.<\/li><\/ul>\n\n\n\n<p>Note also that the crime of identity theft does not only include the\u00a0<strong>acquisition<\/strong>, possession,\u00a0<strong>use<\/strong>\u00a0and\u00a0<strong>misuse<\/strong>\u00a0of identifying information, but also the alteration or\u00a0<strong>deletion<\/strong>\u00a0of such identifying information. These acts must be done\u00a0<strong>without right<\/strong>, which refers to : (i) conduct undertaken without or in excess of authority; or (ii) conduct not covered by established legal defenses, excuses, court orders, justifications, or relevant principles under the law. <\/p>\n\n\n\n<p>This cybercrime covers fake accounts, or accounts using the name or other identifying information of another person, without the authority of that person. The accused may be punished for identity theft even if the victim does not suffer any damage.<\/p>\n\n\n\n<p>Any person found guilty of any of computer-related identity theft is punished with imprisonment of&nbsp;<em><a href=\"https:\/\/pnl-law.com\/blog\/duration-and-effects-of-penalties-criminal-cases-in-the-philippines\/\">prision mayor<\/a><\/em>,&nbsp;or a fine of at least P200,000, up to a maximum amount commensurate to the damage incurred, or both.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">II. ESTAFA UNDER THE REVISED PENAL CODE<\/h2>\n\n\n\n<p>In the Philippines, the crime specifically labelled as \u201cidentity theft\u201d relates to cybercrimes. There is no such specific designation in \u201ctraditional\u201d crimes, but identity theft is considered in relation to the crime of estafa under the Revised Penal Code (RPC) of the Philippines.&nbsp;<\/p>\n\n\n\n<p>Under Article 315 (2) (a) of the RPC, a person is guilty of estafa by using fictitious name, or falsely pretending to possess power, influence, qualifications, property, credit, agency, business or imaginary transactions, or by means of other similar deceits, executed prior to or simultaneously with the commission of the fraud.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>AMOUNT INVOLVED<\/strong><\/td><td><strong>PENALTY<\/strong><\/td><\/tr><tr><td><\/td><td class=\"has-text-align-left\" data-align=\"left\">Not exceeding P200<\/td><td><a href=\"https:\/\/pnl-law.com\/blog\/duration-and-effects-of-penalties-criminal-cases-in-the-philippines\/\">Arresto mayor<\/a> in its maximum period.<\/td><\/tr><tr><td><\/td><td class=\"has-text-align-left\" data-align=\"left\">Over P200 but not exceeding P6,000&nbsp;<\/td><td><a href=\"https:\/\/pnl-law.com\/blog\/duration-and-effects-of-penalties-criminal-cases-in-the-philippines\/\">Arresto mayor<\/a> in its maximum period to <a href=\"https:\/\/pnl-law.com\/blog\/duration-and-effects-of-penalties-criminal-cases-in-the-philippines\/\">prision correccional<\/a> in its minimum period.<\/td><\/tr><tr><td><\/td><td class=\"has-text-align-left\" data-align=\"left\">Over 6,000 pesos but not exceeding P12,000<\/td><td><a href=\"https:\/\/pnl-law.com\/blog\/duration-and-effects-of-penalties-criminal-cases-in-the-philippines\/\">Prision correccional<\/a> in its minimum and medium periods.<\/td><\/tr><tr><td><\/td><td class=\"has-text-align-left\" data-align=\"left\">Over P12,000 but not exceeding P22,000<\/td><td><a href=\"https:\/\/pnl-law.com\/blog\/duration-and-effects-of-penalties-criminal-cases-in-the-philippines\/\">Prision correccional<\/a>, in its maximum period, to prision mayor, in its minimum period.&nbsp;<br \/><br \/>One year of imprisonment is added for each additional P10,000 above P22,000; but the total penalty which may be imposed shall not exceed 20 years.<\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>The advent of technology blurs the line between crimes committed in the physical world and crimes committed in the electronic world. In the United States of America (U.S.), the Federal Trade Commission (FTC) has a dedicated one-stop resource, the&nbsp;IdentityTheft.gov,&nbsp;for identity theft victims (we are unaware if the&nbsp;Philippine National Privacy Commission&nbsp;has a similar resource). Identity theft, [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":8059,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[148],"tags":[1714,1704,149,151,1716,1715,1713],"class_list":["post-8058","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-law","tag-computer-related-identity-theft","tag-cybercrime-courts","tag-cybercrime-prevention-act-of-2012","tag-cybercrimes","tag-fake-accounts","tag-identifying-information","tag-identity-theft"],"_links":{"self":[{"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/posts\/8058","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/comments?post=8058"}],"version-history":[{"count":7,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/posts\/8058\/revisions"}],"predecessor-version":[{"id":8117,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/posts\/8058\/revisions\/8117"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/media\/8059"}],"wp:attachment":[{"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/media?parent=8058"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/categories?post=8058"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/tags?post=8058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}