LAW ECOMMERCE
LAW ECOMMERCE
This law applies to all electronic data and documents, whether used for business or personal matters,
including contracts, messages, or stored info. It covers both local and international use.
4. Aims to train people so they can use computers and other tech tools effectively.
5. Is responsible for ensuring safe and secure networks, and promoting equal access to technology.
📘 Example: If Ana sends a job offer to Juan via email, Juan is the addressee. But the email server that forwarded
the message is not.
6. Plans to develop the country’s information infrastructure (like internet networks), and link it with global
networks using proper laws and systems. b) Computer
📘 💬 Any device that processes and handles data — like desktops, smartphones, tablets, etc.
Real-Life Legal Example:
Imagine the government runs a program to train farmers in rural areas on how to use mobile apps for selling their
📘 Example: Sending an invoice from your laptop or mobile counts as using a "computer."
crops. This falls under their obligation to create a tech-friendly population and infrastructure, as stated in this c) Electronic Data Message
policy.
💬 Any kind of information sent, received, or stored digitally — like an email or WhatsApp message.
✅ Key Points Summary: 📘 Example: A customer service reply via email confirming an order is a valid electronic data message.
The state values ICT for nation-building.
d) Information and Communication System
It promotes access, training, private investment, and national infrastructure.
💬 Any system (like a server or database) used to handle electronic documents or messages.
It commits to ensuring tech is secure, affordable, and widely used. 📘 Example: An online banking system is an information system managing digital transactions.
e) Electronic Signature
PART II — ELECTRONIC COMMERCE IN GENERAL: 💬 Any digital sign, mark, or process that shows someone approves a document.
📘 Example: Clicking “I accept” on a digital loan contract or typing your name with consent qualifies.
CHAPTER I f) Electronic Document
SECTION 3: OBJECTIVE 💬 Any info stored or shared digitally that proves a right, obligation, or fact.
The goal of this law is to make electronic transactions (like emails, online contracts, digital signatures)
📘 Example: A scanned will stored online is considered an electronic document.
legally valid. g) Electronic Key
It supports doing business and keeping records electronically, both locally and internationally, and encourages 💬 A secret digital code used to keep data secure.
the public and government to go digital.
📘 Example: When lawyers encrypt confidential case files before sending, they use electronic keys.
📘 Real-Life Legal Example: h) Intermediary
A local business owner emails a signed contract to a supplier overseas. That contract is legally valid under this
💬 A person or system that sends or receives data on someone else’s behalf.
📘 Example: A cloud storage service that holds your tax documents for you is an intermediary.
law, just like a printed, signed version would be.
SECTION 6: Legal Recognition of Electronic Data Messages 1. It’s presumed to belong to the person who used it.
Just because a message is in digital form (like an email or online form), doesn’t mean it has less legal value. It 2. It’s assumed the person meant to sign or approve the document.
cannot be rejected in court or in official dealings just because it's not on paper. This stands unless someone can prove otherwise or if it’s unreasonable to trust the signature due to
If a company confirms a customer’s payment via email, that email is legally valid proof of the transaction. The
customer can use it in court if there's a dispute about the payment.
📘 Real-Life Legal Example:
A digital contract signed with a secure ID by a client will be presumed valid in court, unless the other party proves
Electronic data messages have the same legal effect as paper-based information. ✅ Key Points Summary:
Courts and institutions must recognize them as valid. Courts presume electronic signatures are valid.
⚠️ However, this law doesn’t override other laws that require strict formalities, like 📘 Real-Life Legal Example:
notarized real estate deeds. An insurance company that stores signed policies digitally doesn't need paper copies, as long as those records
A digital lease agreement signed and emailed between a landlord and tenant is valid as long as it’s stored securely
✅ Key Points Summary:
and hasn’t been tampered with. Electronic documents can fulfill legal requirements for "original" documents.
✅ Key Points Summary: Must remain unaltered and be accessible for later use.
How clearly the sender can be identified. They're connected to one side of the case.
If they meet these standards (like those in Sections 6 & 7), they’re accepted as the best form of evidence. Their credibility or neutrality is in question.
📘 Real-Life Legal Example: This ensures fairness and gives both sides the chance to challenge the evidence.
An online store defends itself using email correspondence and payment logs to prove a customer agreed to the 📘 Real-Life Legal Example:
terms. The court evaluates these as valid evidence. In a legal battle over a digital land sale agreement, the buyer challenges the affidavit of the seller’s IT staff about
✅ Key Points Summary: how the document was signed and stored. The buyer's lawyer cross-examines the staff in court.
Electronic data and documents are admissible in court. ✅ Key Points Summary:
Their reliability and secure handling affect their evidentiary value. Affiants (those who sign affidavits) can be cross-examined in court.
✅DOCUMENTS
SECTION 13: Retention of Electronic Documents
Even if the law says certain documents must be kept in original form, storing them electronically is okay if: OVERALL SUMMARY OF CHAPTER II: LEGAL RECOGNITION OF E-
1. They can be opened or viewed later.
2. They are kept in the original format or an accurate copy. Topic Layman Summary
3. You can identify who sent/received it and when. Electronic Data Messages (Sec Messages in digital form cannot be rejected just
6) because they’re not printed.
You can even let a third-party service (like Google Drive or a document management system) store it for you,
These are legally valid if unchanged, reliable, and
as long as these conditions are met. Electronic Documents (Sec 7)
accessible.
Proof by Affidavit (Sec 14) Affidavits can be used to introduce digital evidence.
2. Bank transactions done electronically are binding. If money is transferred electronically between banks or
Real-Life Example:
platforms, it is as valid as handing over physical cash. Once it goes through, neither party can back out just
because it was done digitally. A seller sends you an invoice and says they’ll ship only after confirmation. If you don’t reply, they can cancel
the order.
Real-Life Example:
You buy a product from an online store and click "I agree" to their terms. That’s a valid contract. Section 21. Time of Dispatch
You transfer funds via an e-wallet app. Once the transfer is confirmed, both the sender and recipient must A message is considered “sent” when it leaves your system and enters someone else’s — like hitting "send"
honor it — even if no paper document was exchanged. on your email.
Real-Life Example:
Section 17. Recognition by Parties of Electronic Data Message or Electronic
Document If you send a return request by email at 11:59 p.m., it counts as sent on that date even if the seller opens it the
next morning.
Digital communications, like emails or online forms, are legally valid between the sender and receiver. You
can’t deny their legality just because they weren’t printed on paper.
Section 22. Time of Receipt
Real-Life Example: This defines when a message is “received,” depending on where it’s sent:
An online seller sends a return policy through email. You can’t say it’s invalid because it wasn’t mailed on
a. If it goes to the designated system (e.g., seller’s support email), it’s received when it gets there.
paper.
b. If it goes to the wrong system (e.g., a general mailbox), it counts only when they read it.
c. If there’s no designated system, it counts when it reaches any of their systems.
Section 18. Attribution of Electronic Data Message
This section explains when an electronic message is legally considered to come from the sender. Real-Life Example:
1. If the sender typed and sent the message themselves, it’s theirs. If a buyer sends a complaint to the designated customer service email, it's valid upon arrival — not when
someone opens it.
2. If someone else (authorized) sends it on their behalf, or a system sends it automatically (e.g., auto-generated
receipts), it still counts as coming from the sender.
3. If the recipient used a method (like login credentials or verification codes) agreed upon with the sender to Section 23. Place of Dispatch and Receipt
check the authenticity, the message is valid. The location of the sender and receiver matters — not the device used.
4. But, if the recipient is notified or should have known the message was fake (e.g., phishing), then they can’t a. If you have multiple business locations, the one most involved in the transaction counts.
claim it was valid.
b. No business address? Use the usual place of residence.
5. The recipient can assume what they received is exactly what the sender intended — unless there’s evidence c. For companies, the place of registration is used.
of error.
This also helps determine where the taxes apply.
6. Each message is considered separate unless it's clearly a duplicate.
Real-Life Example:
Real-Life Example:
A seller in Cebu uses a mobile phone in Manila to send a receipt. It’s still considered sent from Cebu for legal
A customer gets a purchase confirmation email. Even if it’s auto-generated, it's legally valid. and tax purposes.
If a hacker sends a fake invoice, but the recipient knows it looks suspicious and ignores warning signs, they
can't later claim they believed it was real.
Section 24. Choice of Security Methods
Businesses are free to choose how secure their messages and documents are — like using encryption, digital
Section 19. Error in Electronic Data Message or Document signatures, or verification codes — as long as it complies with applicable laws.
If the message received is not what was intended due to a system or input error, the recipient shouldn’t rely on
it — especially if they could have detected the mistake with reasonable care. Real-Life Example:
An online store can use a simple email confirmation or a more complex two-factor authentication. It’s up to
Real-Life Example: them.
(ii) Declaring value/nature — Example: Online store provides product value electronically to insure goods You can switch from digital back to paper, but you must
Switching Formats
during transport. clearly state the change.
(i) Claiming delivery — Example: Customer shows an email as proof when picking up goods. Section (Unnamed, Appears After Chapter I)
(ii) Authorizing release — Example: A store emails the warehouse to release goods to a customer. Government agencies can legally:
(iii) Reporting damage/loss — Example: Buyer sends digital notice of broken item upon receipt. 1. Accept digital documents for creation, filing, or storage.
(d) Giving other relevant notices — Like delay alerts via app notification. For example, an online business can submit SEC forms or DTI registrations electronically.
(e) Committing to deliver to someone — Example: Seller agrees in writing (email) to ship only to the buyer or 2. Issue digital permits, licenses, or approvals.
someone they authorize.
You might receive your business permit or FDA approval as a PDF with a QR code instead of a printed
(f) Transferring rights in goods — Example: Ownership of goods is digitally transferred using blockchain records.
copy.
(g) Transferring obligations under the contract — Like changing delivery responsibilities to another party through
3. Accept payments and issue digital receipts.
a signed online form.
This includes processing applications, sending notifications, or even issuing e-notarized documents. Section 30. Extent of Liability of a Service Provider
Agencies are authorized to publish rules and standards for: A service provider (like an ISP, cloud storage, e-commerce platform, etc.) is not automatically liable for
unlawful or harmful content/data just because they host or transmit it — unless they:
How documents are formatted and submitted online.
1. Know it’s illegal or infringing but do nothing about it.
How digital signatures should be used.
2. Profit directly from that illegal activity.
What level of encryption or security should be applied.
3. Directly commit, help, or encourage the illegal act.
Real-Life E-Commerce Example: However, service providers are still responsible for:
You run a small online business. Instead of visiting DTI or the City Hall, you: Contracts they enter into directly.
Register your business via an online portal. Their duties under licensing or regulation (like an ISP under NTC).
Upload digital IDs. Obeying any court order (e.g., blocking access to illegal content).
DTI leads and coordinates the promotion and development of e-commerce in the Philippines, alongside They refused to remove it after being warned.
relevant government agencies.
Install and maintain online systems to monitor product prices and quality in e-commerce platforms.
Example:
Collaborate with agencies like Bangko Sentral ng Pilipinas (BSP) and the Department of Budget and
A tax agent can’t read a seller’s encrypted sales reports without permission or a court order.
Management (DBM).
It issues a certification to an online seller as a “DTI Accredited Online Business” for meeting quality and
customer service standards. Real-Life Example:
Digital versions of permits, licenses, and receipts are 1. Hacking/Cracking (unauthorized access or destruction of data):
Legal Documents
valid.
Fine: ₱100,000+
Agencies can collect payments through electronic
Payments Jail: 6 months to 3 years
means.
The DTI leads efforts to regulate, promote, and protect 2. Piracy (unauthorized copying/distribution of copyrighted digital content):
DTI Authority
digital commerce in the country.
Fine: ₱100,000+
The DTI can monitor product quality/prices and
Consumer Protection Jail: 6 months to 3 years
enforce standards online.
3. Consumer Law Violations (under R.A. 7394 or other laws using e-commerce):
Jail: Up to 6 years
Real-Life Examples:
A fraudster hacks into a payment gateway to steal credit card info → 3 years in jail.
Example:
A buyer and seller agree that disputes will be resolved by video call arbitration instead of formal court —
allowed under this clause.
Service Provider Hosts (like Lazada or Globe) aren’t liable unless they’re
Liability complicit in illegal acts.
Interpretation The law should align with global digital trade principles.
Party Flexibility Parties can customize how they comply with this law.