Online libel law does NOT apply to sharing, liking

According to the 2011 Southeast Asia Digital Consumer Report, 33% of Filipinos have accessed the internet within a year, translating to about 31 million users. Based on a recent survey, the Philippines ranks 6th in the top 10 most engaged countries for social networking. Social networking sites build social relations among people who, for example, share interests, activities, backgrounds, or real-life connections.

Two of the most popular of these sites are Facebook and Twitter. As of late 2012, 1.2 billion people with shared interests use Facebook to get in touch. Users register at this site, create a personal profile or an open book of who they are, add other users as friends, and exchange messages, including automatic notifications when they update their profile. A user can post a statement, a photo, or a video on Facebook, which can be made visible to anyone, depending on the user’s privacy settings.

If the post is made available to the public, meaning to everyone and not only to his friends, anyone on Facebook can react to the posting, clicking any of several buttons of preferences on the program’s screen such as “Like,” “Comment,” or “Share.” “Like” signifies that the reader likes the posting while “Comment” enables him to post online his feelings or views about the same, such as “This is great!” When a Facebook user “Shares” a posting, the original “posting” will appear on his own Facebook profile, consequently making it visible to his down-line Facebook Friends.

Twitter, on the other hand, is an internet social networking and microblogging service that enables its users to send and read short text-based messages of up to 140 characters. These are known as “Tweets.” Microblogging is the practice of posting small pieces of digital content—which could be in the form of text, pictures, links, short videos, or other media—on the internet. Instead of friends, a Twitter user has “Followers,” those who subscribe to this particular user’s posts, enabling them to read the same, and “Following,” those whom this particular user is subscribed to, enabling him to read their posts. Like Facebook, a Twitter user can make his tweets available only to his Followers, or to the general public. If a post is available to the public, any Twitter user can “Retweet” a given posting. Retweeting is just reposting or republishing another person’s tweet without the need of copying and pasting it.

In the cyberworld, there are many actors: a) the blogger who originates the assailed statement; b) the blog service provider like Yahoo; c) the internet service provider like PLDT, Smart, Globe, or Sun; d) the internet café that may have provided the computer used for posting the blog; e) the person who makes a favorable comment on the blog; and f) the person who posts a link to the blog site.

Now, suppose Maria (a blogger) maintains a blog on (blog service provider). She needs the internet to access her blog so she subscribes to Sun Broadband (Internet Service Provider).One day, Maria posts on her internet account the statement that a certain married public official has an illicit affair with a movie star. Linda, one of Maria’s friends who sees this post, comments online, “Yes, this is so true! They are so immoral.” Maria’s original post is then multiplied by her friends and the latter’s friends, and down the line to friends of friends almost ad infinitum. Nena, who is a stranger to both Maria and Linda, comes across this blog, finds it interesting and so shares the link to this apparently defamatory blog on her Twitter account. Nena’s “Followers” then “Retweet” the link to that blog site.

Pamela, a Twitter user, stumbles upon a random person’s “Retweet” of Nena’s original tweet and posts this on her Facebook account. Immediately, Pamela’s Facebook Friends start Liking and making Comments on the assailed posting. A lot of them even press the Share button, resulting in the further spread of the original posting into tens, hundreds, thousands, and greater postings.

The question is: are online postings such as “Liking” an openly defamatory statement, “Commenting” on it, or “Sharing” it with others, to be regarded as “aiding or abetting?” In libel in the physical world, if Nestor places on the office bulletin board a small poster that says, “Armand is a thief!,” he could certainly be charged with libel. If Roger, seeing the poster, writes on it, “I like this!,” that could not be libel since he did not author the poster. If Arthur, passing by and noticing the poster, writes on it, “Correct!,” would that be libel? No, for he merely expresses agreement with the statement on the poster. He still is not its author. Besides, it is not clear if aiding or abetting libel in the physical world is a crime.

But suppose Nestor posts the blog, “Armand is a thief!” on a social networking site. Would a reader and his Friends or Followers, availing themselves of any of the “Like,” “Comment,” and “Share” reactions, be guilty of aiding or abetting libel? And, in the complex world of cyberspace expressions of thoughts, when will one be liable for aiding or abetting cybercrimes? Where is the venue of the crime?

Except for the original author of the assailed statement, the rest (those who pressed Like, Comment and Share) are essentially knee-jerk sentiments of readers who may think little or haphazardly of their response to the original posting. Will they be liable for aiding or abetting? And, considering the inherent impossibility of joining hundreds or thousands of responding “Friends” or “Followers” in the criminal charge to be filed in court, who will make a choice as to who should go to jail for the outbreak of the challenged posting?

The old parameters for enforcing the traditional form of libel would be a square peg in a round hole when applied to cyberspace libel. Unless the legislature crafts a cyber libel law that takes into account its unique circumstances and culture, such law will tend to create a chilling effect on the millions that use this new medium of communication in violation of their constitutionally-guaranteed right to freedom of expression.

The United States Supreme Court faced the same issue in Reno v. American Civil Liberties Union, a case involving the constitutionality of the Communications Decency Act of 1996. The law prohibited (1) the knowing transmission, by means of a telecommunications device, of “obscene or indecent” communications to any recipient under 18 years of age; and (2) the knowing use of an interactive computer service to send to a specific person or persons under 18 years of age or to display in a manner available to a person under 18 years of age communications that, in context, depict or describe, in terms “patently offensive” as measured by contemporary community standards, sexual or excretory activities or organs.

Those who challenged the Act claim that the law violated the First Amendment’s guarantee of freedom of speech for being overbroad. The U.S. Supreme Court agreed and ruled:
The vagueness of the Communications Decency Act of 1996 (CDA), 47 U.S.C.S. §223, is a matter of special concern for two reasons. First, the CDA is a content-based regulation of speech. The vagueness of such a regulation raises special U.S. Const. amend. I concerns because of its obvious chilling effect on free speech. Second, the CDA is a criminal statute. In addition to the opprobrium and stigma of a criminal conviction, the CDA threatens violators with penalties including up to two years in prison for each act of violation. The severity of criminal sanctions may well cause speakers to remain silent rather than communicate even arguably unlawful words, ideas, and images. As a practical matter, this increased deterrent effect, coupled with the risk of discriminatory enforcement of vague regulations, poses greater U.S. Const. amend. I concerns than those implicated by certain civil regulations.

x x x x

The Communications Decency Act of 1996 (CDA), 47 U.S.C.S. § 223, presents a great threat of censoring speech that, in fact, falls outside the statute’s scope. Given the vague contours of the coverage of the statute, it unquestionably silences some speakers whose messages would be entitled to constitutional protection. That danger provides further reason for insisting that the statute not be overly broad. The CDA’s burden on protected speech cannot be justified if it could be avoided by a more carefully drafted statute. (Emphasis ours)
Libel in the cyberspace can of course stain a person’s image with just one click of the mouse. Scurrilous statements can spread and travel fast across the globe like bad news. Moreover, cyberlibel often goes hand in hand with cyberbullying that oppresses the victim, his relatives, and friends, evoking from mild to disastrous reactions. Still, a governmental purpose, which seeks to regulate the use of this cyberspace communication technology to protect a person’s reputation and peace of mind, cannot adopt means that will unnecessarily and broadly sweep, invading the area of protected freedoms.

If such means are adopted, self-inhibition borne of fear of what sinister predicaments await internet users will suppress otherwise robust discussion of public issues. Democracy will be threatened and with it, all liberties. Penal laws should provide reasonably clear guidelines for law enforcement officials and triers of facts to prevent arbitrary and discriminatory enforcement. The terms “aiding or abetting” constitute broad sweep that generates chilling effect on those who express themselves through cyberspace posts, comments, and other messages. Hence, Section 5 of the cybercrime law that punishes “aiding or abetting” libel on the cyberspace is a nullity.

When a penal statute encroaches upon the freedom of speech, a facial challenge grounded on the void-for-vagueness doctrine is acceptable. The inapplicability of the doctrine must be carefully delineated. As Justice Antonio T. Carpio explained in his dissent in Romualdez v. Commission on Elections, “we must view these statements of the Court on the inapplicability of the overbreadth and vagueness doctrines to penal statutes as appropriate only insofar as these doctrines are used to mount ‘facial’ challenges to penal statutes not involving free speech.”

In an “as applied” challenge, the petitioner who claims a violation of his constitutional right can raise any constitutional ground – absence of due process, lack of fair notice, lack of ascertainable standards, overbreadth, or vagueness. Here, one can challenge the constitutionality of a statute only if he asserts a violation of his own rights. It prohibits one from assailing the constitutionality of the statute based solely on the violation of the rights of third persons not before the court. This rule is also known as the prohibition against third-party standing.

But this rule admits of exceptions. A petitioner may for instance mount a “facial” challenge to the constitutionality of a statute even if he claims no violation of his own rights under the assailed statute where it involves free speech on grounds of overbreadth or vagueness of the statute. The rationale for this exception is to counter the “chilling effect” on protected speech that comes from statutes violating free speech. A person who does not know whether his speech constitutes a crime under an overbroad or vague law may simply restrain himself from speaking in order to avoid being charged of a crime. The overbroad or vague law thus chills him into silence.

As already stated, the cyberspace is an incomparable, pervasive medium of communication. It is inevitable that any government threat of punishment regarding certain uses of the medium creates a chilling effect on the constitutionally-protected freedom of expression of the great masses that use it. In this case, the particularly complex web of interaction on social media websites would give law enforcers such latitude that they could arbitrarily or selectively enforce the law.

Who is to decide when to prosecute persons who boost the visibility of a posting on the internet by liking it? Netizens are not given “fair notice” or warning as to what is criminal conduct and what is lawful conduct. When a case is filed, how will the court ascertain whether or not one netizen’s comment aided and abetted a cybercrime while another comment did not?

Of course, if the “Comment” does not merely react to the original posting but creates an altogether new defamatory story against Armand like “He beats his wife and children,” then that should be considered an original posting published on the internet. Both the penal code and the cybercrime law clearly punish authors of defamatory publications. Make no mistake, libel destroys reputations that society values. Allowed to cascade in the internet, it will destroy relationships and, under certain circumstances, will generate enmity and tension between social or economic groups, races, or religions, exacerbating existing tension in their relationships.

In regard to the crime that targets child pornography, when “Google procures, stores, and indexes child pornography and facilitates the completion of transactions involving the dissemination of child pornography,” does this make Google and its users aiders and abettors in the commission of child pornography crimes? Byars highlights a feature in the American law on child pornography that the Cybercrimes law lacks—the exemption of a provider or notably a plain user of interactive computer service from civil liability for child pornography as follows:
No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider and cannot be held civilly liable for any action voluntarily taken in good faith to restrict access to or availability of material that the provider or user considers to be obscene...whether or not such material is constitutionally protected.
When a person replies to a Tweet containing child pornography, he effectively republishes it whether wittingly or unwittingly. Does this make him a willing accomplice to the distribution of child pornography? When a user downloads the Facebook mobile application, the user may give consent to Facebook to access his contact details. In this way, certain information is forwarded to third parties and unsolicited commercial communication could be disseminated on the basis of this information. As the source of this information, is the user aiding the distribution of this communication? The legislature needs to address this clearly to relieve users of annoying fear of possible criminal prosecution. (G.R. No. 203335, February 18, 2014)

Popular Posts