You are on page 1of 13

Republic of the Philippines The Facts

SUPREME COURT Nenita Julia V. Daluz (Julia) and Julienne Vida


Manila Suzara (Julienne), both minors, were, during the
THIRD DIVISION period material, graduating high school students at St.
G.R. No. 202666 September 29, 2014 Theresa's College (STC), Cebu City. Sometime in
RHONDA AVE S. VIVARES and SPS. January 2012, while changing into their swimsuits for
MARGARITA and DAVID SUZARA, Petitioners, a beach party they were about to attend, Julia and
vs. Julienne, along with several others, took digital
ST. THERESA'S COLLEGE, MYLENE RHEZA pictures of themselves clad only in their
T. ESCUDERO, and JOHN DOES, Respondents. undergarments. These pictures were then uploaded by
DECISION Angela Lindsay Tan (Angela) on her Facebook 3
VELASCO, JR., J.: profile.
Back at the school, Mylene Rheza T. Escudero
(Escudero), a computer teacher at STCs high school
The individual's desire for privacy is never absolute, department, learned from her students that some
since participation in society is an equally powerful seniors at STC posted pictures online, depicting
desire. Thus each individual is continually engaged in themselves from the waist up, dressed only in
a personal adjustment process in which he balances brassieres. Escudero then asked her students if they
the desire for privacy with the desire for disclosure knew who the girls in the photos are. In turn, they
and communication of himself to others, in light of readily identified Julia, Julienne, and Chloe Lourdes
the environmental conditions and social norms set by Taboada (Chloe), among others.
the society in which he lives. Using STCs computers, Escuderos students logged
- Alan Westin, Privacy and Freedom (1967) in to their respective personal Facebook accounts and
The Case showed her photos of the identified students, which
Before Us is a Petition for Review on Certiorari include: (a) Julia and Julienne drinking hard liquor
under Rule 45 of the Rules of Court, in relation to and smoking cigarettes inside a bar; and (b) Julia and
Section 19 of A.M. No. 08-1-16-SC,1 otherwise Julienne along the streets of Cebu wearing articles of
known as the "Rule on the Writ of Habeas Data." clothing that show virtually the entirety of their black
Petitioners herein assail the July 27, 2012 Decision2 brassieres. What is more, Escuderos students
of the Regional Trial Court, Branch 14 in Cebu City claimed that there were times when access to or the
(RTC) in SP. Proc. No. 19251-CEB, which dismissed availability of the identified students photos was not
their habeas data petition. confined to the girls Facebook friends,4 but were, in

1 of 13
fact, viewable by any Facebook user.5 commencement exercises scheduled on March 30,
Upon discovery, Escudero reported the matter and, 2012.
through one of her students Facebook page, showed A week before graduation, or on March 23, 2012,
the photosto Kristine Rose Tigol (Tigol), STCs Angelas mother, Dr. Armenia M. Tan (Tan), filed a
Discipline-in-Charge, for appropriate action. Petition for Injunction and Damages before the RTC
Thereafter, following an investigation, STC found the of Cebu City against STC, et al., docketed as Civil
identified students to have deported themselves in a Case No. CEB-38594.7 In it, Tan prayed that
manner proscribed by the schools Student defendants therein be enjoined from implementing
Handbook, to wit: the sanction that precluded Angela from joining the
1. Possession of alcoholic drinks outside the school commencement exercises.
campus; On March 25, 2012,petitioner Rhonda Ave Vivares
2. Engaging in immoral, indecent, obscene or lewd (Vivares), the mother of Julia, joined the fray as an
acts; intervenor. On March 28, 2012, defendants inCivil
3. Smoking and drinking alcoholicbeverages in Case No. CEB-38594 filed their memorandum,
public places; containing printed copies of the photographs in issue
4. Apparel that exposes the underwear; as annexes. That same day, the RTC issued a
5. Clothing that advocates unhealthy behaviour; temporary restraining order (TRO) allowing the
depicts obscenity; contains sexually suggestive students to attend the graduation ceremony, to which
messages, language or symbols; and 6. Posing and STC filed a motion for reconsideration.
uploading pictures on the Internet that entail ample Despite the issuance of the TRO,STC, nevertheless,
body exposure. barred the sanctioned students from participating in
On March 1, 2012, Julia, Julienne, Angela, and the the graduation rites, arguing that, on the date of the
other students in the pictures in question, reported, as commencement exercises, its adverted motion for
required, to the office of Sr. Celeste Ma. Purisima Pe reconsideration on the issuance ofthe TRO remained
(Sr. Purisima), STCs high school principal and unresolved.
ICM6Directress. They claimed that during the Thereafter, petitioners filed before the RTC a Petition
meeting, they were castigated and verbally abused by for the Issuance of a Writ of Habeas Data, docketed
the STC officials present in the conference, including as SP. Proc. No. 19251-CEB8 on the basis of the
Assistant Principal Mussolini S. Yap (Yap), Roswinda following considerations:
Jumiller, and Tigol. What is more, Sr. Purisima 1. The photos of their children in their undergarments
informed their parents the following day that, as part (e.g., bra) were taken for posterity before they
of their penalty, they are barred from joining the changed into their swimsuits on the occasion of a

2 of 13
birthday beach party; be rendered declaring all information, data, and
2. The privacy setting of their childrens Facebook digital images accessed, saved or stored, reproduced,
accounts was set at "Friends Only." They, thus, have a spread and used, to have been illegally obtained
reasonable expectation of privacy which must be inviolation of the childrens right to privacy.
respected. Finding the petition sufficient in form and substance,
3. Respondents, being involved in the field of the RTC, through an Order dated July 5, 2012, issued
education, knew or ought to have known of laws that the writ of habeas data. Through the same Order,
safeguard the right to privacy. Corollarily, herein respondents were directed to file their verified
respondents knew or ought to have known that the written return, together with the supporting affidavits,
girls, whose privacy has been invaded, are the victims within five (5) working days from service of the writ.
in this case, and not the offenders. Worse, after In time, respondents complied with the RTCs
viewing the photos, the minors were called directive and filed their verified written return, laying
"immoral" and were punished outright; down the following grounds for the denial of the
4. The photos accessed belong to the girls and, thus, petition, viz: (a) petitioners are not the proper parties
cannot be used and reproduced without their consent. to file the petition; (b) petitioners are engaging in
Escudero, however, violated their rights by saving forum shopping; (c) the instant case is not one where
digital copies of the photos and by subsequently a writ of habeas data may issue;and (d) there can be
showing them to STCs officials. Thus, the Facebook no violation of their right to privacy as there is no
accounts of petitioners children were intruded upon; reasonable expectation of privacy on Facebook.
5. The intrusion into the Facebook accounts, as well Ruling of the Regional Trial Court
as the copying of information, data, and digital On July 27, 2012, the RTC rendered a Decision
images happened at STCs Computer Laboratory; and dismissing the petition for habeas data. The
6. All the data and digital images that were extracted dispositive portion of the Decision pertinently states:
were boldly broadcasted by respondents through their WHEREFORE, in view of the foregoing premises,
memorandum submitted to the RTC in connection the Petition is hereby DISMISSED.
with Civil Case No. CEB-38594. To petitioners, the The parties and media must observe the aforestated
interplay of the foregoing constitutes an invasion of confidentiality.
their childrens privacy and, thus, prayed that: (a) a xxxx
writ of habeas databe issued; (b) respondents be SO ORDERED.9
ordered to surrender and deposit with the court all To the trial court, petitioners failed to prove the
soft and printed copies of the subjectdata before or at existence of an actual or threatened violation of the
the preliminary hearing; and (c) after trial, judgment minors right to privacy, one of the preconditions for

3 of 13
the issuance of the writ of habeas data. Moreover, the information, and freedom of information of an
court a quoheld that the photos, having been individual, and to provide a forum to enforce ones
uploaded on Facebook without restrictions as to who right to the truth and to informational privacy. It
may view them, lost their privacy in some way. seeks to protect a persons right to control
Besides, the RTC noted, STC gathered the information regarding oneself, particularly in
photographs through legal means and for a legal instances in which such information is being
purpose, that is, the implementation of the schools collected through unlawful means in order to achieve
policies and rules on discipline. unlawful ends.12
Not satisfied with the outcome, petitioners now come In developing the writ of habeas data, the Court
before this Court pursuant to Section 19 of the Rule aimed to protect an individuals right to informational
on Habeas Data.10 privacy, among others. A comparative law scholar
The Issues has, in fact, defined habeas dataas "a procedure
The main issue to be threshed out inthis case is designed to safeguard individual freedom from abuse
whether or not a writ of habeas datashould be issued in the information age."13 The writ, however, will not
given the factual milieu. Crucial in resolving the issue on the basis merely of an alleged unauthorized
controversy, however, is the pivotal point of whether access to information about a person.Availment of the
or not there was indeed an actual or threatened writ requires the existence of a nexus between the
violation of the right to privacy in the life, liberty, or right to privacy on the one hand, and the right to life,
security of the minors involved in this case. liberty or security on the other.14 Thus, the existence
Our Ruling of a persons right to informational privacy and a
We find no merit in the petition. showing, at least by substantial evidence, of an actual
Procedural issues concerning the availability of the or threatened violation of the right to privacy in life,
Writ of Habeas Data liberty or security of the victim are indispensable
The writ of habeas datais a remedy available to any before the privilege of the writ may be extended.15
person whose right to privacy in life, liberty or Without an actionable entitlement in the first place to
security is violated or threatened by an unlawful act the right to informational privacy, a habeas
or omission of a public official or employee, or of a datapetition will not prosper. Viewed from the
private individual or entity engaged in the gathering, perspective of the case at bar,this requisite begs this
collecting or storing of data or information regarding question: given the nature of an online social network
the person, family, home and correspondence of the (OSN)(1) that it facilitates and promotes real-time
aggrieved party.11 It is an independent and summary interaction among millions, if not billions, of users,
remedy designed to protect the image, privacy, honor, sans the spatial barriers,16 bridging the gap created by

4 of 13
physical space; and (2) that any information uploaded variance of habeas data situations, would not have
in OSNs leavesan indelible trace in the providers been made.
databases, which are outside the control of the end- Habeas data, to stress, was designed "to safeguard
usersis there a right to informational privacy in individual freedom from abuse in the information
OSN activities of its users? Before addressing this age."17 As such, it is erroneous to limit its
point, We must first resolve the procedural issues in applicability to extralegal killings and enforced
this case. disappearances only. In fact, the annotations to the
a. The writ of habeas data is not only confined to Rule preparedby the Committee on the Revision of
cases of extralegal killings and enforced the Rules of Court, after explaining that the Writ of
disappearances Habeas Data complements the Writ of Amparo,
Contrary to respondents submission, the Writ of pointed out that:
Habeas Datawas not enacted solely for the purpose of The writ of habeas data, however, can be availed of
complementing the Writ of Amparoin cases of as an independent remedy to enforce ones right to
extralegal killings and enforced disappearances. privacy, more specifically the right to informational
Section 2 of the Rule on the Writ of Habeas Data privacy. The remedies against the violation of such
provides: right can include the updating, rectification,
Sec. 2. Who May File. Any aggrieved party may suppression or destruction of the database or
file a petition for the writ of habeas data. However, in information or files in possession or in control of
cases of extralegal killings and enforced respondents.18 (emphasis Ours) Clearly then, the
disappearances, the petition may be filed by: privilege of the Writ of Habeas Datamay also be
(a) Any member of the immediate family of the availed of in cases outside of extralegal killings and
aggrieved party, namely: the spouse, children and enforced disappearances.
parents; or b. Meaning of "engaged" in the gathering, collecting
(b) Any ascendant, descendant or collateral relative of or storing of data or information
the aggrieved party within the fourth civil degreeof Respondents contention that the habeas data writ
consanguinity or affinity, in default of those may not issue against STC, it not being an entity
mentioned in the preceding paragraph. (emphasis engaged in the gathering, collecting or storing of data
supplied) or information regarding the person, family, home
Had the framers of the Rule intended to narrow the and correspondence of the aggrieved party, while
operation of the writ only to cases of extralegal valid to a point, is, nonetheless, erroneous.
killings or enforced disappearances, the above To be sure, nothing in the Rule would suggest that the
underscored portion of Section 2, reflecting a habeas data protection shall be available only against

5 of 13
abuses of a person or entity engaged in the businessof immaterial and such will not prevent the writ from
gathering, storing, and collecting of data. As provided getting to said person or entity.
under Section 1 of the Rule: To agree with respondents above argument, would
Section 1. Habeas Data. The writ of habeas datais a mean unduly limiting the reach of the writ to a very
remedy available to any person whose right to small group, i.e., private persons and entities whose
privacy in life, liberty or security is violated or business is data gathering and storage, and in the
threatened by an unlawful act or omission of a public process decreasing the effectiveness of the writ asan
official or employee, or of a private individual or instrument designed to protect a right which is easily
entity engaged in the gathering, collecting or storing violated in view of rapid advancements in the
of data or information regarding the person, family, information and communications technologya right
home and correspondence of the aggrieved party. which a great majority of the users of technology
(emphasis Ours) themselves are not capable of protecting.
The provision, when taken in its proper context, as a Having resolved the procedural aspect of the case,
whole, irresistibly conveys the idea that habeas data We now proceed to the core of the controversy.
is a protection against unlawful acts or omissions of The right to informational privacy on Facebook
public officials and of private individuals or entities a. The Right to Informational Privacy
engaged in gathering, collecting, or storing data about The concept of privacyhas, through time, greatly
the aggrieved party and his or her correspondences, evolved, with technological advancements having an
or about his or her family. Such individual or entity influential part therein. This evolution was briefly
need not be in the business of collecting or storing recounted in former Chief Justice Reynato S. Punos
data. speech, The Common Right to Privacy, 20 where he
To "engage" in something is different from explained the three strands of the right to privacy, viz:
undertaking a business endeavour. To "engage" (1) locational or situational privacy;21 (2)
means "to do or take part in something." 19 It does not informational privacy; and (3) decisional privacy.22
necessarily mean that the activity must be done in Of the three, what is relevant to the case at bar is the
pursuit of a business. What matters is that the person right to informational privacyusually defined as the
or entity must be gathering, collecting or storing said right of individuals to control information about
data or information about the aggrieved party or his themselves.23
or her family. Whether such undertaking carries the With the availability of numerous avenues for
element of regularity, as when one pursues a information gathering and data sharing nowadays, not
business, and is in the nature of a personal endeavour, to mention each systems inherent vulnerability to
for any other reason or even for no reason at all, is attacks and intrusions, there is more reason that every

6 of 13
individuals right to control said flow of information At the same time, the very purpose of OSNs is
should be protected and that each individual should socializingsharing a myriad of information, 27 some
have at least a reasonable expectation of privacy in of which would have otherwise remained personal.
cyberspace. Several commentators regarding privacy b. Facebooks Privacy Tools: a response to the clamor
and social networking sites, however, all agree that for privacy in OSN activities
given the millions of OSN users, "[i]n this [Social Briefly, the purpose of an OSN is precisely to give
Networking] environment, privacy is no longer users the ability to interact and to stay connected to
grounded in reasonable expectations, but rather in other members of the same or different social media
some theoretical protocol better known as wishful platform through the sharing of statuses, photos,
thinking."24 videos, among others, depending on the services
It is due to this notion that the Court saw the pressing provided by the site. It is akin to having a room filled
need to provide for judicial remedies that would with millions of personal bulletin boards or "walls,"
allow a summary hearing of the unlawful use of data the contents of which are under the control of each
or information and to remedy possible violations of and every user. In his or her bulletin board, a
the right to privacy.25 In the same vein, the South user/owner can post anythingfrom text, to pictures,
African High Court, in its Decision in the landmark to music and videosaccess to which would depend
case, H v. W,26promulgated on January30, 2013, on whether he or she allows one, some or all of the
recognized that "[t]he law has to take into account the other users to see his or her posts. Since gaining
changing realities not only technologically but also popularity, the OSN phenomenon has paved the way
socially or else it will lose credibility in the eyes of to the creation of various social networking sites,
the people. x x x It is imperative that the courts includingthe one involved in the case at bar,
respond appropriately to changing times, acting www.facebook.com (Facebook), which, according to
cautiously and with wisdom." Consistent with this, its developers, people use "to stay connected with
the Court, by developing what may be viewed as the friends and family, to discover whats going on in the
Philippine model of the writ of habeas data, in effect, world, and to share and express what matters to
recognized that, generally speaking, having an them."28
expectation of informational privacy is not Facebook connections are established through the
necessarily incompatible with engaging in cyberspace process of "friending" another user. By sending a
activities, including those that occur in OSNs. "friend request," the user invites another to connect
The question now though is up to whatextent is the their accounts so that they can view any and all
right to privacy protected in OSNs? Bear in mind that "Public" and "Friends Only" posts of the other.Once
informational privacy involves personal information. the request is accepted, the link is established and

7 of 13
both users are permitted to view the other users (d) Only Me - the digital image can be viewed only
"Public" or "Friends Only" posts, among others. by the user.
"Friending," therefore, allows the user to form or The foregoing are privacy tools, available to
maintain one-to-one relationships with other users, Facebook users, designed to set up barriers to
whereby the user gives his or her "Facebook friend" broaden or limit the visibility of his or her specific
access to his or her profile and shares certain profile content, statuses, and photos, among others,
information to the latter.29 from another users point of view. In other words,
To address concerns about privacy,30 but without Facebook extends its users an avenue to make the
defeating its purpose, Facebook was armed with availability of their Facebook activities reflect their
different privacy tools designed to regulate the choice as to "when and to what extent to disclose
accessibility of a users profile31 as well as facts about [themselves] and to put others in the
information uploaded by the user. In H v. W, 32 the position of receiving such confidences."34 Ideally, the
South Gauteng High Court recognized this ability of selected setting will be based on ones desire to
the users to "customize their privacy settings," but did interact with others, coupled with the opposing need
so with this caveat: "Facebook states in its policies to withhold certain information as well as to regulate
that, although it makes every effort to protect a users the spreading of his or her personal information.
information, these privacy settings are not Needless to say, as the privacy setting becomes more
foolproof."33 limiting, fewer Facebook users can view that users
For instance, a Facebook user canregulate the particular post.
visibility and accessibility of digital images(photos), STC did not violate petitioners daughters right to
posted on his or her personal bulletin or "wall," privacy
except for the usersprofile picture and ID, by Without these privacy settings, respondents
selecting his or her desired privacy setting: contention that there is no reasonable expectation of
(a) Public - the default setting; every Facebook user privacy in Facebook would, in context, be correct.
can view the photo; However, such is not the case. It is through the
(b) Friends of Friends - only the users Facebook availability of said privacy tools that many OSN
friends and their friends can view the photo; users are said to have a subjective expectation that
(b) Friends - only the users Facebook friends can only those to whomthey grant access to their profile
view the photo; will view the information they post or upload
(c) Custom - the photo is made visible only to thereto.35
particular friends and/or networks of the Facebook This, however, does not mean thatany Facebook user
user; and automatically has a protected expectation of privacy

8 of 13
inall of his or her Facebook activities. other words, did the minors limit the disclosure of the
Before one can have an expectation of privacy in his photos such that the images were kept within their
or her OSN activity, it is first necessary that said user, zones of privacy? This determination is necessary in
in this case the children of petitioners,manifest the resolving the issue of whether the minors carved out
intention to keepcertain posts private, through the a zone of privacy when the photos were uploaded to
employment of measures to prevent access thereto or Facebook so that the images will be protected against
to limit its visibility.36 And this intention can unauthorized access and disclosure.
materialize in cyberspace through the utilization of Petitioners, in support of their thesis about their
the OSNs privacy tools. In other words, utilization of childrens privacy right being violated, insist that
these privacy tools is the manifestation,in cyber Escudero intruded upon their childrens Facebook
world, of the users invocation of his or her right to accounts, downloaded copies ofthe pictures and
informational privacy.37 showed said photos to Tigol. To them, this was a
Therefore, a Facebook user who opts to make use of breach of the minors privacy since their Facebook
a privacy tool to grant or deny access to his or her accounts, allegedly, were under "very private" or
post orprofile detail should not be denied the "Only Friends" setting safeguarded with a
informational privacy right which necessarily password.39 Ultimately, they posit that their childrens
accompanies said choice.38Otherwise, using these disclosure was only limited since their profiles were
privacy tools would be a feckless exercise, such that not open to public viewing. Therefore, according to
if, for instance, a user uploads a photo or any them, people who are not their Facebook friends,
personal information to his or her Facebook page and including respondents, are barred from accessing said
sets its privacy level at "Only Me" or a custom list so post without their knowledge and consent.
that only the user or a chosen few can view it, said Aspetitioners children testified, it was Angelawho
photo would still be deemed public by the courts as if uploaded the subjectphotos which were only
the user never chose to limit the photos visibility and viewable by the five of them,40 although who these
accessibility. Such position, if adopted, will not only five are do not appear on the records.
strip these privacy tools of their function but it would Escudero, on the other hand, stated in her affidavit41
also disregard the very intention of the user to keep that "my students showed me some pictures of girls
said photo or information within the confines of his cladin brassieres. This student [sic] of mine informed
or her private space. me that these are senior high school [students] of
We must now determine the extent that the images in STC, who are their friends in [F]acebook. x x x They
question were visible to other Facebook users and then said [that] there are still many other photos
whether the disclosure was confidential in nature. In posted on the Facebook accounts of these girls. At the

9 of 13
computer lab, these students then logged into their the protection attached to the right to informational
Facebook account [sic], and accessed from there the privacy. The ensuing pronouncement in US v. Gines-
various photographs x x x. They even told me that Perez44 is most instructive:
there had been times when these photos were public [A] person who places a photograph on the Internet
i.e., not confined to their friends in Facebook." precisely intends to forsake and renounce all privacy
In this regard, We cannot give muchweight to the rights to such imagery, particularly under
minors testimonies for one key reason: failure to circumstances suchas here, where the Defendant did
question the students act of showing the photos to not employ protective measures or devices that would
Tigol disproves their allegation that the photos were have controlled access to the Web page or the
viewable only by the five of them. Without any photograph itself.45
evidence to corroborate their statement that the Also, United States v. Maxwell46 held that "[t]he
images were visible only to the five of them, and more open the method of transmission is, the less
without their challenging Escuderos claim that the privacy one can reasonably expect. Messages sent to
other students were able to view the photos, their the public at large inthe chat room or e-mail that is
statements are, at best, self-serving, thus deserving forwarded from correspondent to correspondent loses
scant consideration.42 any semblance of privacy."
It is well to note that not one of petitioners disputed That the photos are viewable by "friends only" does
Escuderos sworn account that her students, who are not necessarily bolster the petitioners contention. In
the minors Facebook "friends," showed her the this regard, the cyber community is agreed that the
photos using their own Facebook accounts. This only digital images under this setting still remain to be
goes to show that no special means to be able to outside the confines of the zones of privacy in view
viewthe allegedly private posts were ever resorted to of the following:
by Escuderos students,43 and that it is reasonable to (1) Facebook "allows the world to be more open and
assume, therefore, that the photos were, in reality, connected by giving its users the tools to interact and
viewable either by (1) their Facebook friends, or (2) share in any conceivable way;"47
by the public at large. (2) A good number of Facebook users "befriend"
Considering that the default setting for Facebook other users who are total strangers;48
posts is"Public," it can be surmised that the (3) The sheer number of "Friends" one user has,
photographs in question were viewable to everyone usually by the hundreds; and
on Facebook, absent any proof that petitioners (4) A users Facebook friend can "share" 49 the
children positively limited the disclosure of the formers post, or "tag"50 others who are not Facebook
photograph. If suchwere the case, they cannot invoke friends with the former, despite its being visible only

10 of 13
tohis or her own Facebook friends. automatically, be said to be "very private," contrary
It is well to emphasize at this point that setting a to petitioners argument.
posts or profile details privacy to "Friends" is no As applied, even assuming that the photos in issue are
assurance that it can no longer be viewed by another visible only to the sanctioned students Facebook
user who is not Facebook friends with the source of friends, respondent STC can hardly be taken to task
the content. The users own Facebook friend can for the perceived privacy invasion since it was the
share said content or tag his or her own Facebook minors Facebook friends who showed the pictures to
friend thereto, regardless of whether the user tagged Tigol. Respondents were mere recipients of what
by the latter is Facebook friends or not with the were posted. They did not resort to any unlawful
former. Also, when the post is shared or when a means of gathering the information as it was
person is tagged, the respective Facebook friends of voluntarily given to them by persons who had
the person who shared the post or who was tagged legitimate access to the said posts. Clearly, the fault,
can view the post, the privacy setting of which was if any, lies with the friends of the minors. Curiously
set at "Friends." enough, however, neither the minors nor their parents
To illustrate, suppose A has 100 Facebook friends and imputed any violation of privacy against the students
B has 200. A and B are not Facebook friends. If C, who showed the images to Escudero.
As Facebook friend, tags B in As post, which is set Furthermore, petitioners failed to prove their
at "Friends," the initial audience of 100 (As own contention that respondents reproduced and
Facebook friends) is dramatically increased to 300 broadcasted the photographs. In fact, what petitioners
(As 100 friends plus Bs 200 friends or the public, attributed to respondents as an act of offensive
depending upon Bs privacy setting). As a result, the disclosure was no more than the actuality that
audience who can view the post is effectively respondents appended said photographs in their
expandedand to a very large extent. memorandum submitted to the trial court in
This, along with its other features and uses, is connection with Civil Case No. CEB-38594.52 These
confirmation of Facebooks proclivity towards user are not tantamount to a violation of the minors
interaction and socialization rather than seclusion or informational privacy rights, contrary to petitioners
privacy, as it encourages broadcasting of individual assertion.
user posts. In fact, it has been said that OSNs have In sum, there can be no quibbling that the images in
facilitated their users self-tribute, thereby resulting question, or to be more precise, the photos of minor
into the "democratization of fame."51 Thus, it is students scantily clad, are personal in nature, likely to
suggested, that a profile, or even a post, with affect, if indiscriminately circulated, the reputation of
visibility set at "Friends Only" cannot easily, more so the minors enrolled in a conservative institution.

11 of 13
However, the records are bereft of any evidence, generally lack the people skills or general wisdom to
other than bare assertions that they utilized conduct themselves sensibly in a public forum.57
Facebooks privacy settings to make the photos Respondent STC is clearly aware of this and
visible only to them or to a select few. Without proof incorporating lessons on good cyber citizenship in its
that they placed the photographs subject of this case curriculum to educate its students on proper online
within the ambit of their protected zone of privacy, conduct may be mosttimely. Too, it is not only STC
they cannot now insist that they have an expectation but a number of schools and organizations have
of privacy with respect to the photographs in already deemed it important to include digital literacy
question. and good cyber citizenshipin their respective
Had it been proved that the access tothe pictures programs and curricula in view of the risks that the
posted were limited to the original uploader, through children are exposed to every time they participate in
the "Me Only" privacy setting, or that the users online activities.58 Furthermore, considering the
contact list has been screened to limit access to a complexity of the cyber world and its
select few, through the "Custom" setting, the result pervasiveness,as well as the dangers that these
may have been different, for in such instances, the children are wittingly or unwittingly exposed to in
intention to limit access to the particular post, instead view of their unsupervised activities in cyberspace,
of being broadcasted to the public at large or all the the participation of the parents in disciplining and
users friends en masse, becomes more manifest and educating their children about being a good digital
palpable. citizen is encouraged by these institutions and
On Cyber Responsibility organizations. In fact, it is believed that "to limit such
It has been said that "the best filter is the one between risks, theres no substitute for parental involvement
your childrens ears."53 This means that self- and supervision."59
regulation on the part of OSN users and internet As such, STC cannot be faulted for being steadfast in
consumers ingeneral is the best means of avoiding its duty of teaching its students to beresponsible in
privacy rights violations.54As a cyberspace their dealings and activities in cyberspace,
communitymember, one has to be proactive in particularly in OSNs, whenit enforced the
protecting his or her own privacy.55 It is in this regard disciplinary actions specified in the Student
that many OSN users, especially minors, Handbook, absenta showing that, in the process, it
fail.Responsible social networking or observance of violated the students rights.
the "netiquettes"56 on the part of teenagers has been OSN users should be aware of the risks that they
the concern of many due to the widespreadnotion that expose themselves to whenever they engage
teenagers can sometimes go too far since they incyberspace activities.1wphi1 Accordingly, they

12 of 13
should be cautious enough to control their privacy In light of the foregoing, the Court need not belabor
and to exercise sound discretion regarding how much the other assigned errors.
information about themselves they are willing to give WHEREFORE, premises considered, the petition is
up. Internet consumers ought to be aware that, by hereby DENIED. The Decision dated July 27, 2012
entering or uploading any kind of data or information of the Regional Trial Court, Branch 14 in Cebu City
online, they are automatically and inevitably making in SP. Proc. No. 19251-CEB is hereby AFFIRMED.
it permanently available online, the perpetuation of No pronouncement as to costs.
which is outside the ambit of their control. SO ORDERED.
Furthermore, and more importantly, information,
otherwise private, voluntarily surrendered by them
can be opened, read, or copied by third parties who
may or may not be allowed access to such.
It is, thus, incumbent upon internet users to exercise
due diligence in their online dealings and activities
and must not be negligent in protecting their rights.
Equity serves the vigilant. Demanding relief from the
courts, as here, requires that claimants themselves
take utmost care in safeguarding a right which they
allege to have been violated. These are indispensable.
We cannot afford protection to persons if they
themselves did nothing to place the matter within the
confines of their private zone. OSN users must be
mindful enough to learn the use of privacy tools, to
use them if they desire to keep the information
private, and to keep track of changes in the available
privacy settings, such as those of Facebook,
especially because Facebook is notorious for
changing these settings and the site's layout often.
In finding that respondent STC and its officials did
not violate the minors' privacy rights, We find no
cogent reason to disturb the findings and case
disposition of the court a quo.

13 of 13

You might also like