Consent

One does not cultivate land belonging to another, whether for sustenance or benevolence, without the owner’s permission. One does not take from another’s wallet without clear authorization, regardless of intent. Entry into another’s property, even under the guise of goodwill, demands prior consent. 

Likewise, the collection or use of an individual’s private information must be preceded by informed and voluntary agreement. Consent is more pronounced as foundational relational matter under the IPRA law. These are not mere courtesies; they are essential safeguards of autonomy, dignity, and legal order.

A person or entity that deliberately seeks out information protected by law as confidential, and does so without proper legal authority such as a court order, is generally described as engaging in unauthorized access or unlawful surveillance.

Depending on the context and jurisdiction, more specific terms may apply:

1. Data privacy violator – commonly used when laws on personal data protection are breached

2. Illegal interceptor – if communications (calls, messages, emails) are secretly monitored or captured

3. Intruder or trespasser (in a digital sense) – especially in cybersecurity contexts

4. Bad-faith actor – when the intent is clearly improper or abusive

In legal language, courts often avoid labels and instead describe the act itself as a violation of confidentiality, privacy rights, or statutory protections, which may carry civil or criminal liability.

Under Philippine law, there isn’t always a single catch-all label for such a person or entity, but several well-defined legal characterizations apply depending on how the information was obtained:

1. Violation of the Data Privacy Act of 2012 – The person or organization may be considered an unauthorized processor or personal information controller/processor in breach, and can incur liability for unauthorized processing, access due to negligence, or improper disclosure of personal data.

2. Violation of the Anti-Wiretapping Act – If the act involves secretly recording or intercepting private communications, the offender is often referred to as an illegal interceptor or one who engaged in unlawful surveillance.

3. Violation of the Cybercrime Prevention Act of 2012 – In digital contexts, this may constitute illegal access, data interference, or computer-related offenses, making the person a cybercrime offender.

4. Breach of confidentiality laws or privileged information (e.g., banking secrecy, medical confidentiality) – The individual may be described as having committed a breach of confidential information or unauthorized disclosure.

Philippine courts typically focus less on labeling the person and more on the act, describing it as “unauthorized access to confidential information,” “unlawful processing,” or “violation of privacy rights,” all of which may carry civil, criminal, and administrative liability.

Popular posts from this blog

What to do when you're cloned or spoofed in Facebook?

Crising, Dante and Emong: typhoons in the tropics and flooding

12-day war: demands for cessation of hostilities, international dialogues, and global diplomacy