Joint Department Admin Order No. 2
Joint Department Admin Order No. 2
Whereas, the State recognizes the vital role of information and communications technology
in nation building as well s its own obligation to ensure network security, connectivity and
neutrality of technology for the national benefit;
Whereas, the issuance of clear, transparent, predictable and enforceable rules to clarify and
ensure the legal validity and enforceability of electronic signatures and contracts will
encourage and promote the development of electronic commerce in the Philippines, enhance
its competitiveness in the new economy, protect the consumer, and encourage efficiency and
transparency in commercial transactions;
Whereas, rules and guidelines on electronic signatures and contracts that are technology-
neutral will help ensure continued private sector initiative and innovation and encourage
consumer trust in these new technologies;
Now, therefore, pursuant to the provisions of sections 24 and 29 of Republic Act No. 8792,
otherwise known as the Electronic Commerce Act 2000 (hereinafter referred to as the "Act"),
the following Implementing Rules and Regulations on Electronic Authentication and
promulgated for the compliance of all concerned:
Section 1. General Rule of Validity. – As a general rule, and subject to the provisions of the
Electronic Commerce Act of 2000 and these Rules,
(a) a signature, contract or other record relating to such transaction may not be denied
legal effect, validity or enforceability solely because it is in electronic form; and
(b) A contract relating to such transaction may not be denied legal effect, validity, or
enforceability solely because an electronic signature or electronic document was used
in its formation.
Section 2. Scope of Application. – These Rules apply where electronic signatures and/or
electronic documents are used in the context of any commercial and noncommercial
transaction, activity or dealings, whether public or private, occurring between and among
parties. These include, and are not limited to, the following transactions: the sale, supply,
procurement or exchange of goods or services, including the manufacture, processing,
purchase, sale, supply, distribution or transacting in any manner, of tangible and intangible
property of all kinds such as commodities, goods, merchandise, financial and banking
products, patents, participations, shares of stocks, software, books, works of art and other
intellectual property; distribution agreement; commercial representation or agency; the filing
and payment of taxes; factoring; leasing; construction of works; consulting; engineering;
licensing; investment; financing; banking; insurance; exploitation agreement or concession;
joint venture and other forms of industrial or business cooperation; and carriage of goods and
passengers by air, sea, rail or road.
(i) whether the transformation was created using the private key that
corresponds to the signer’s public key; and
(ii) whether the initial electronic document had been altered after the
transformation was made.
(l) "Key pair" in an asymmetric cryptosystem refers to the private key and its
mathematically related public key such that the latter can verify the digital signature
that the former creates.
(m) "Person" means any natural or juridical person including, but not limited to, an
individual, corporation, partnership, joint venture, unincorporated association, trust or
other juridical entity, or any governmental authority.
(n) "Private Key" refers to the key of a key pair used to create a digital signature.
c. was created and affixed to the date message by the signer or using a means
under the sole control of the signer; and
d. was created and is linked to the data message to which it relates in a manner
such that any change in the data message would be revealed.
For purposes of these Rules, secure electronic signatures include but is not necessarily
limited to digital signatures.
(r) "Signer" means the person who uses, creates and affixes an electronic signature to
an electronic data message.
Section 4. Technology Neutrality. – None of the provisions of these Rules shall be applied so
as to exclude, restrict, or deprive of legal effect any method of electronic signature that
satisfies the requirements referred to in Section 8 of the Act, or in Rule 5 of these Rules
which is as reliable as was appropriate for the purpose for which the data message was
generated or communicated, in the light of all the circumstances, including any relevant
agreement.
(a) A method is used to identify the party sought to be bound and to indicate said
party’s access to the electronic document necessary for his consent or approval
through the electronic signature;
(b) Said method is reliable and appropriate for the purpose for which the electronic
document was generated and communicated, in the light of all circumstances,
including any relevant agreement;
(c) It is necessary for the party sought to be bound, in order to proceed further with
the transaction, to have executed or provided the electronic signature; and
(d) The other party is authorized and enabled to verify the electronic signature, and to
make the decision to proceed with the transaction authenticated by the same.
The parties may agree to adopt supplementary or alternative procedures provided that the
same are not contrary to law or public policy.
Section 6. Authority Signatures. – None of the provisions of these Rules shall be applied so
as to exclude, disallow, or deprive electronic authority signatures, as defined in Section 3
above, or legal effect and validity.
Section 7. Electronic Agents. – A contract or other record relating to a transaction may not
be denied legal effect, validity, or enforceability solely because its formation, creation, or
delivery involved the action or operation of one or more electronic agents so long as such
electronic agent is under the control of, or its action or operation is legally attributable to the
person sought to be bound.
Section 8. Liability for unauthorized use of secure electronic signatures. – Where the use of
a secure electronic signature was unauthorized and the purported signer did not exercise
reasonable care to avoid the unauthorized use of the signature or to prevent the addressee
from replying on such a signature, the signature shall nevertheless be regarded as that of the
purported signer, unless the relying party knew or should have known that the signature was
not that of the purported signer.
(a) act in accordance with the representations it makes with respect to its practices;
(b) exercise due diligence to ensure the accuracy and completeness of all material
representations it makes that are relevant to the life-cycle of its certificates or which
are included in its certificates;
(c) provide reasonably accessible means which enable a relying party to ascertain:
ii. that the person who is identified in the certificate holds, at the relevant time,
the signature device referred to in the certificate;
iii. the method used to identify the signer, provided however, the information
certifier shall not be required to reveal any of its trade or industrial secrets;
iv. any limitations on the purposes or value for which the signature device may
be used; and
v. whether the signature device is valid and has not been compromised;
(d) provide reasonably accessible means for signers to give notice that a signature
device has been compromised and ensure the operation of a timely and secure
revocation service; and
(f) engage trustworthy personnel who possess the expert knowledge, experience and
qualifications necessary for its services, in particular, but not limited to, expertise in
electronic signature technology and familiarity with proper security procedures;
(h) Record, whether electronically or not, for an appropriate period of time all
relevant information concerning issued certificates for, but not limited to, the purpose
of providing evidence of certification in legal proceedings;
(i) for purposes of issuing and maintaining a certificate, collect and utilize personal
data only insofar as it is necessary for the purposes of issuing and maintaining the
certificate. Such data may not be collected, sold, distributed, processed or used for
any other purpose without the express consent of the data subject.
An information certifier shall be liable for damages caused by its failure to satisfy the
requirements provided under this and the following Rules.
Section 10. Certificate Requirements. – At a minimum, certificates shall state:
(b) that the person who is identified in the certificate holds, at the relevant time, the
signature device referred to in the certificate;
(c) that the signature device was effective on the date when the certificate was issued;
(d) an indication of the beginning and end of the period of validity of the certificate;
(e) where applicable, any limitation on the purposes or value for which the certificate
may be used; and
(f) any limitation on the scope or extent of liability that the information certifier
accepts, or alternatively, information on where such limitations on the scope or extent
of liability, if any, may be found.
Section 11. Liability for incorrect or defective certificates. – If damage has been caused as a
result of the certificate being incorrect or defective, the information certifier shall be liable
for damage suffered by either:
(a) the party who has contracted with the information certifier for the provision of a
certificate; or
(b) any person who reasonably relies on a certificate issued by the information
certifier as regards the fact that the certificate complies with all the requirements for a
certificate, and as regards the truth and accuracy, at the time of the issuance of the
certificate, of all information and representations contained in the certificate.
(d) the existence and extent of any limitation on the purpose for which the certificate
may be used;
(e) the existence of any statement limiting the scope or extent of the liability of the
information certifier;
This Rule shall not be applied so as to exclude or prevent the validity of a certificate issued
by a nonaccredited information certifier where such certificate is shown to have otherwise
been issued in accordance with commercially appropriate and international recognized
standards, or where sufficient evidence indicates that the certificate accurately binds the
secure electronic signature to the signer’s identify.
(a) Exercise reasonable care to avoid unauthorized use of his electronic signature
and/or signature creation device;
(b) Notify appropriate persons, including the concerned information certifier, without
undue delay if:
i. The signer knows that the private key or other signature creation device has
been exposed or revealed to unauthorized persons, or that his electronic
signature has been compromised; or
ii. the circumstances known to the signer give rise to a substantial risk that his
electronic signature may have been compromised;
(c) A signer shall be liable for damages caused by failure to satisfy the requirements
provided under this Rule.
(a) A person shall rely on an electronic signature only to the extent that it is
reasonable to do so. If reliance on the electronic signature is not reasonable in the
circumstances having regard to the factors enumerated below,
(b) In determining whether it was reasonable for a person to have relied on the
electronic signature, regard shall be had, if appropriate to:
i. the nature of the underlying transaction that the electronic signature was
intended to support;
ii. whether the relying party, where warranted, has taken appropriate steps to
determine the reliability of the electronic signature;
iii. whether the relying party took steps to ascertain whether the electronic
signature was supported by a certificate;
iv. whether the relying party knew or ought to have known that the electronic
signature device had been compromised or revoked;
v. any agreement or course of dealing which the relying party has with the
signatory or subscriber, or any trade usage or practice which may be
applicable;
(b) Parties to commercial and other transactions may specify that a particular
information certifier or supplier or supplier of certification services, class of suppliers
of certification services or class of certificates must be used in connection with
messages or signatures submitted to them.
(c) Where parties agree, as between themselves, to the use of certain types of
electronic signatures and certificates, that agreement shall be recognized as sufficient
for the purpose of cross-border recognition.
Section 20. Effectivity. – These Rules shall take effect after fifteen (15) days following the
completion of their publication in the Official Gazette or in a newspaper of general
circulation in the Philippines.
Done this 28th day of September 2001 in Metro Manila, Republic of the Philippines.
(Sgd.) MAR ROXAS
Secretary
Department of Trade and Industry
(Sgd.) ESTRELLA F. ALABASTRO
Secretary
Department of Science and Technology