Study on ICT, VAW and Sexuality A Policy Advocacy

advertisement
Working Paper: Not for Citation or Reproduction
Study on ICT, VAW and Sexuality: A Policy Advocacy
Women’s Legal and Human Rights Bureau (WLB)1
Introduction
That Information and Communication Technology (ICT) has transformed and
revolutionalized society is an understatement. It has permeated and transcended public
and private spaces and has drastically changed the manner by which states, business
sectors and peoples conduct their operations and interact. ICT has altered both time and
space, making the transfer of information faster. It has created a borderless arena, blurring
borders and distances among states and nations. ICT has made possible the offsite conduct
of transactions and businesses, as well as the rendition of services offshore, without
necessarily establishing physical presence. This nature of ICT has made it an indispensable
aspect of globalization and of the globalized economy2.
ICT has transformed and revolutionalized Filipino society; it has transformed not only
political and economic systems and social interactions, but as well as culture. Through ecommerce, private companies have dominantly benefited from the convergence in
applications, content and interactivity of ICT3. ICT provided means to ensure efficient basic
service delivery and good governance (transparency and accountability), albeit its uneven
application in the bureaucracy4. Social networks have greatly affected the manner by which
Filipinos interact and communicate. In fact, the Philippines is found leading in the Asia
Pacific in terms of Social Networking Sites (SNS) engagement.5
Together, however, with the proliferation and the use of ICT in the country, there have
been documentations of increasing violations and crimes committed and perpetrated
through ICTs. These are realities on the ground, supported by articles and studies.
Alongside these harms, ICT having provided spaces for women’s empowerment and
exercise of their rights to sexuality and self-expression cannot as well be discounted.
In the light then of these, there is more reason to conduct a study and research on ICT,
VAW and Sexuality. There is a need to look into the role of ICT in the perpetration of VAW
1
As funded and supported by the Foundation of Media Alternatives (FMA) and the Alliance of Progressive
Communications Women’s Networking Support Program (APC WNSP). The Research team is composed of Ananeza
Aban, Chang Jordan, Jelen Paclarin, Maria Karla Espinosa, Maureen Pagaduan and Krissi Shaffina Twyla Rubin.
2
Globalization see in http://herkules.oulu.fi/isbn9514272463/html/x464.html
3
Soto page 15
4
Ibid
5
Foundation for Media Alternatives cited a study where the Philippines is found leading in the Asia Pacific in terms
of Social Networking Sites (SNS) engagement covering sites such as Friendster, Facebook and Twitter. The same
study records 10.7 Million are registered users of Friendster as of January 2008 while 15.28 Million, and continually
growing, are registered users of Facebook. The country is likewise listed as the 12 th most number of Twitter users
in the world. (Foundation for Media Alternatives (FMA) , Presentation on VAW and ICTs: Unpacking the Issues,
University Hotel, U. P. Diliman, 27 August 2010 unpublished)
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 1
Working Paper: Not for Citation or Reproduction
as well as in terms of providing spaces for women’s empowerment and exercise of their
rights to sexuality.
Scope and objectives of the study
The Study intends to comprehensively map the terrain of existing Philippine laws and
jurisprudence and analyze the existing policy framework on ICT, VAW and Sexuality. The
study also hopes to provide conceptual clarity of the phenomenon of ICT and VAW and
expose the gaps and limitations of existing laws. The Philippines ranking among the top in
countries with most internet usage in the world suggests a landscape largely undiscovered,
where interactions are complex and realities are compounded.
The research sets out to identify emerging issues on ICT, VAW, and sexuality among
Filipino women; identify the kinds of discrimination experienced by women in relation to
VAW and ICT; review legal perspectives on women’s sexuality, ICT and VAW and their
implications for the protection and promotion of women’s human rights; and identify
advocacy areas to further the protection and promotion of sexual rights and sexual justice
given the current reality or context of VAW and ICT.
The review of related literature covered the emerging forms of ICT-related VAW across the
globe and revealed the different perspectives on the interrelatedness of, interconnection
and interfaces between ICT and VAW, ICT and sexuality and VAW and sexuality. The
mapping of national laws covered eleven major pieces of legislation, two local city
ordinances and a significant number of relevant jurisprudence on ICT-related cases. The
prevailing policy framework of the existing laws in relation to ICT, VAW and sexuality has
been analyzed from a feminist and developmental lens. Key Informant Interviews
(KIIs)with law enforcers, IT experts, counseling agency, VAW lawyer and woman victimsurvivor of ICT-related sexual violence contributed to the documentation of forms of ICTrelated VAW which are happening in the country.
In coming up with a conceptual clarity of the phenomenon of ICT and VAW and the
intersection of ICT, VAW and sexuality, a working framework has been developed in
viewing and analyzing the phenomenon of ICT-related VAW. The working framework
guided the study in sharpening its analysis and enriching the feminist discourse on the
phenomenon of ICT-related VAW.
There remains a dearth of literature on the interconnectedness and interrelatedness of ICT,
VAW and Sexuality. Aware of its inherent limitation, this current study attempts to
contribute to the very limited literatures on the issue of ICT, VAW and Sexuality. More
particularly, it attempts to discuss and situate ICT as part of the global economy, and how
as such it plays a role both in the perpetration of VAW as well, as the possibilities it poses
for the empowerment of women. The study too, discusses and looks into the ICT
phenomenon, as part of globalization, and how these, taken together, have changed the
rules when it comes to the prevention, commission, perpetration and prosecution of
violence against women.
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 2
Working Paper: Not for Citation or Reproduction
The study is presented in the following manner: (1) ICT in the Overarching Contexts:
Globalization, Capitalism, Patriarchy and Empowerment, 2) Women’s Emerging Issues on
ICT, VAW and Sexuality, 3) Situating ICT, VAW and Sexuality, 4) Emerging Forms of ICTrelated VAW, 5) The Phenomenon of ICT-related VAW; 6) The Legal Landscape on ICT,
VAW and Sexuality, 7) A Working Framework : The Continuum of VAW and Empowerment;
and 8) Conclusion and Recommendation: Transforming ICTs, situating and contextualizing
VAW and Sexuality.
ICT in the Overarching Contexts: Globalization, Capitalism, Patriarchy and
Empowerment
Information and Communication Technology (ICTs) comprises “a complex and
heterogeneous set of goods, applications and services used to produce, distribute, process
and transform information. They include the outputs of industries as diverse as
telecommunications, television and radio broadcasting, computer hardware and software,
computer services and electronic media (e.g., the Internet, electronic mail, electronic
commerce and computer games.)6”
Distinctions have been made between new and old ICT, where “Old” technologies include
non-electronic media like print and analogue technologies like radio and new technologies,
refer to digital technologies (information is transmitted all in one go by digits) like
computers, the Internet, electronic mail and multimedia7. This research largely focuses on
new ICTs as these are the technologies which are primarily affecting and altering current
information and communications practices. These new ICTs are significant in that, first,
they bring a major shift in the vastness, depth and the ease of use of the information and
communication processes already being facilitated by the old ICTs. Second, is in that they
allow for processes that were previously not possible, like a seamless interactive
communication on the one hand, and cheaper and more efficient handling of information
through digitisation, on the other. 8
Definitions alone, however, cannot suffice. There is a need to contextualize and situate ICTs.
For although there is a view that such technologies have only technical rather than social
implications9, more and more literature and discussion papers delve on the manner by
which the new information and communications technologies (ICT) such as the internet,
multimedia wireless technologies are transforming economic and social interactions as
well as cultures10. More importantly, ICTs are not divorced from the society and from the
global economy by which it was spawned and continually developed.
6
Marcelle, Gillian (2000) Transforming ICT for Gender Equality
http://www.onlinewomeninpolitics.org/beijing12/mono9-ICT.pdf
7
Gurumurthy, Gender and ICTs page 13
8
Gumurthy, Gender and ICT page 13
9
Gurumurthy. Gender and ICT. p. 1
10
Kinoti, Kathambi. ICTs and Violence Against Women. Originally published by: AWID Ressource
Nethttp://www.wittproject.net/spip.php?article413
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 3
Working Paper: Not for Citation or Reproduction
The digital divide: the uneven diffusion of ICT in the context of globalization and
capitalism
The ICT Sector, otherwise known as the knowledge sector, is the fastest growing
area of the global economy11. It is highly diffused, with its products services consumed and
used for work and leisure by millions of individuals and organizations. Because of this, the
ICT sector, with its large global players and rapid rate of increase in revenues and stock
market valuations, is an important part of the international capitalist structure 12. As part of
this capitalist structure, these new technologies are characterized by the strategic control
by powerful corporations and nations13. Governments, seeing the economic opportunity
brought by ICT transnational corporations, more often than not, yield and cater to their
interests.
In this context of global economy to which it was spawned and as well as the unequal
power relations in said society, the diffusion, use and enjoyment of ICT has never been
equal. The dramatic and positive changes brought about by ICT have not touched all of
humanity, and are in large part, informed and influenced by existing power structures and
relations14. Studies15 have thus pointed out the uneven diffusion and enjoyment of ICT
where much of ICT growth and concentration is seen in the world’s wealthy nations and in
OECD (Organization for Economic Cooperation for Development) countries. Studies have
likewise shown that in terms of gender, access, most certainly, to ICT resources and
opportunities are not the same between men and women.
These uneven diffusion of ICT, as an effect of existing power relations and inequalities has
created divides. We thus have the digital and the gender divide
The Digital Divide pertains to the uneven diffusion of access to ICT and ICT structures as a
consequence of the existing ICT context of capitalistic structures and global economy.
Despite the rapid growth of the global online community and the steady rise of internet
users, it is observed that the same is concentrated in industrialized countries and from
OECD countries. The 2001 UNDP Human Development Report observed that, while 54
percent of those living in the United States are Internet users and 28 percent of the
population in high income OECD countries has access, in the rest of the world the numbers
are drastically lower.16” It was likewise observed that even within countries, this digital
divide exists: wherein it is observed that access is clustered in major urban areas and in
industrial regions and centers.17
11
Marcelle, Gillian. Transforming ICT for Gender Equality
Marcelle, Gillian. Transforming ICT p. 12
13
Gurmurthy page 1
14
Gurumurthy page 1
15
Marcelle, Gillian. Transforming ICT p. 13
16
Huyer, Sophia and Swasti Mitter. ICTs, Globalisation and Poverty Reduction: Gender Dimensions of the
Knowledge Society. http://unpan1.un.org/intradoc/groups/public/documents/unpan/unpan037351.pdf accessed
February 2011 p. 10
17
Huyer and Mitter p. 11
12
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 4
Working Paper: Not for Citation or Reproduction
This uneven diffusion of ICT in rich vs. poor countries and even urban vs. rural areas, is
likewise noted by the 2005 Report on the “Digital Divide: Internet Diffusion Index18” by the
United Nations Conference on Trade and Development. Said report observed that:
There is an immense information and communication technology (ICT) gap, a
“digital divide”, between developed and developing countries. A person in a
high-income country is over 22 times more likely to be an Internet user than
someone in a low-income country. Secure Internet servers, a rough indicator
of electronic commerce, are over 100 times more common in high-income
than in low-income countries. In high-income countries, mobile phones are
29 times more prevalent and mainline penetration is 21 times that of lowincome countries. Relative to income, the cost of Internet access in a lowincome country is 150 times the cost of a comparable service in a highincome country. There are similar divides within individual countries. ICT is
often non-existent in poor and rural areas of developing countries.
With this, it is evident that ICT is far from being confined and limited technological
implications. Gaps/divides exist as seen in the comparison of ICT diffusion between rich
and poor countries. In this context it observable that “from its conception, to its uneven
proliferation, the dominant driving forces of the ICT system and its global infrastructure
and diffusion are capitalism – profits, monopolistic trends and corporate gatekeeping arena
--- and the patriarchal tendencies which go with these – the discrimination against,
devaluing and exclusion of, and violence against women19”.
Gender Divide: Patriarchy and existing structural inequalities in ICT
In addition to and simultaneously existing with the digital divide in the access and
enjoyment of ICT is the gender divide. Here, in addition to the rich vs. poor
countries/nations in terms of ICT access and diffusion, there also a divide pertaining to
gender. ICT accessibility and diffusion is uneven, not only in terms of individuals,
household, businesses, geographic areas and countries with different socio-economic and
development levels, it is likewise uneven in diffusion and accessibility with respect to
gender.
Studies, such as that of Huyer and Mitter, have explained that the digital or knowledge
divide is even more acute with respect to women. In the finding of the Women's Forum at
the Global Knowledge II Conference (Kuala Lumpur, 2000) GKII, it was found that “the
digital divide is not just an issue of the polarization of information rich vs. information poor
– it is also a divide between women and men everywhere. The young, university educated,
affluent, urban-based and English-speaking Internet user is also overwhelmingly male. The
gender divide has implications for every level of the knowledge society, including access,
training, scientific and technical employment, national capacity building, and women’s
18
United Nations. The Digital Divide Report: ICT Diffusion Index 2005
http://www.unctad.org/templates/webflyer.asp?docid=6994&intItemID=2068&lang=1
19
Gurmurthy page 6
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 5
Working Paper: Not for Citation or Reproduction
participation.20” It was further stated that although most governments do not provide a
breakdown by gender in terms of internet use, it is known that women’s access to and use
of ICTs is much lower than men’s around the world and that several recent project reviews
have indicated that women continue to benefit less than men from the implementation of
ICTs21.
Women’s low rates of access to information and communications technologies are caused
by a number of converging factors, ranging from socio-cultural attitudes and
preconceptions about women’s interaction (or lack of) with technology to a lack of
understanding of the resource and situational obstacles experienced by women. The study
of Mitter and Huyer, for instance, has specifically identified the following as barriers to
women’s access to ICT which are largely informed by patriarchy and existing structural
inequality in society: literacy and education, domestic responsibilities, training, language,
time, costs, and the value to women of the information carried by ICT.
Within this context of digital and gender divide within the ICT arena and in the context of
globalized and capitalized economy, women, according to Gurumurthy, face three core
challenges for gender justice which are central to the existing power relations in the
information society: (a) the structural barriers affecting women’s access to new ICTs; (b)
women’s status as workers in the information economy, (c) and new ICTs and sexual
violence22.
The structural barriers to women’s access to ICT may once again be referred to the digital
divide which refers to the “uneven distribution of benefits of ICTs within and between
countries, regions, sectors, and socio-economic groups23”. This digital divide is actually
several gaps in one:
There is a technological divide – great gaps in infrastructure. There is a
content divide. A lot of web-based information is simply not relevant to the
real needs of people. And nearly 70 per cent of the world’s websites are in
English, at times crowding out local voices and views. There is a
genderdivide, with women and girls enjoying less access to information
technology than men and boys24.
The gender divide can be seen in the lower numbers of women users of ICTs compared to
men. It is also seen in the exclusion of women in the world wide web and where in
developed and developing countries, women are the minority users of the internet 25. As
with the caveat provided by Gurmurthy, there is a need to be wary of statistics, particularly
in developing countries where women make up a high percentage of users. This does not
20
Huyer and Mitter p. 15
Huyer and Mitter p. 15
22
Gurumurthy page 28
23
Gurmurthy 28
24
Gurumurthy page 16-17.
25
Gurumurthy page 22
21
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 6
Working Paper: Not for Citation or Reproduction
automatically conclude that the digital and/or gender divide does not exist, for there is still
the need to look into the total percentage of internet users with respect to the entire
population. The Philippines, in this case may be made an example. As FMA shows, more
women than men are engaged in Social Networking in the Philippines, however, a look into
the number of internet users in the Philippines would reveal that there are only 29. 7
Million internet users in a population of 99.9M. Here, the uneven diffusion of internet use,
as compared with the entire population could easily be seen. We can compare this too with
South Korea and Japan where internet use is more widely diffused in the entire population.
In South Korea, 39.4M are internet users I na population of 48.6M; Japan on the otherhand
shows that there are 99.1Million internet users in a population of 126.8Million
Aside from the challenges in terms of ICT access and structure, there is likewise the
challenge posed by the status of women as workers in the field of ICT. This has been
expounded by Gurumurhty where she expounded on the complex status of women as
workers in the information economy particularly on how, despite the job opportunities
provided by ICT, old inequalities still persist. First, this is seen in how women have little
ownership and control over the ICT sector. She states that “it is clear that women are
underrepresented on the boards and senior management of IT companies, policy and
regulatory organisations, technical standard-setting organisations, industry and
professional organisations and within government bodies working in this area.”
Although the new economy, which rides on the power of ICT, and which consist of, but are
not limited to, job outsourcing such as medical transcription work, call centers, or software
services, have provided new employment opportunities for women, they are not immune
to age old gender issues and problems. She cites UNIFEM’s study which provide that
“women hold 9 per cent of mid- to upper-level IT related jobs in engineering and make up
28.5 per cent of computer programmers and 26.9 per cent of systems analysts. Only among
data entry workers do they form the majority at 85 per cent.”
Gurmurthy observes that patterns of gender power relations, already existent in society
are being reproduced in the information economy. Men hold the majority of high-skilled,
high value-added jobs, whereas women are concentrated in the low-skilled, lower valueadded jobs26. She adds that “while teleworking has certainly created new employment
opportunities for women, the downside is that women can be excluded from better career
possibilities, and instead of finding a balance, family responsibilities are combined with
paid work, so that women end up acquiring new tasks on top of the old.27”
Last, but certainly not the least among the challenges in achieving gender equality within
the Information technology is the issue of new ICT and sexual violence. Here, Gurumurthy
explored how the new ICT, particularly the internet, has made sexual exploitation of and
violence against women and children seem more normal. She mentioned how pornography
flourished with the internet and how criminal syndicates violate laws prohibiting sexual
exploitation and violence by locating their servers in host countries with less restrictive
26
27
Gurumurthy page 25
Gurumurthy page 25
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 7
Working Paper: Not for Citation or Reproduction
laws, to avoid regulation. She adds that with the internet, State interference and regulation
becomes complex and difficult. The new technologies have thus enabled the creation of
online communities free from interference or standards where any and every type of
sexual violence goes and where women-hating is the norm.28
From the discussion on both the digital and the gender divide in ICT, it can be seen that
power relations existent in society, more particularly the different patterns of gender
power relations already existent in society are being reproduced in the information
economy. The digital divide reveals the disparity of socio-economic resources of developed
and developing countries, while the gender divide reveals that despite the ICT being a
relatively new field, and a new platform, old patterns and inequalities still permeate the
same. The same system of patriarchy and structural inequality existent in society which has
excluded women from access to basic services, and various opportunities, are likewise
excluding women from access to ICT structures, ICT related employment and has subjected
women to discrimination and violence being perpetrated through ICT.
ICT: Spaces for Empowerment and Exercise of Fundamental Rights
As discussed in previous sections, the diffusion and enjoyment of ICT and its structures are
far from being equal. There are divides, both digital and gender, brought about by existing
power relations and structures in society: globalisation, capitalism, patriarchy. Despite
these gaps and divides, the empowering nature of ICT must likewise be acknowledged.
Existing, simultaneously with these gaps and divides, and navigating, negotiating within
these limitations and confines, are the spaces for empowerment within ICT for
marginalized groups and sectors. As pointed out by Jac sm Kee of the Association for
Progressive Communications in her introduction for “Erotics,”:
The internet has been a key space to facilitate the exercise of
fundamental rights and freedoms, especially to access critical
information build knowledge, express thoughts and beliefs,
form networks and communities and mobilise for change. For
people who have little access to other kinds of publics due to
multiple forms of discrimination that they face – including
their gender, age, class, or sexuality—the internet can be a
particularly important space to negotiate and claim for the
realization of their rights29.
The other avenues of empowerment provided by ICT for women are the following
(a) e-commerce which grant women direct access to global markets; (b) e-governance
programs which make government services and programmes more accessible to women;
(c) the use of ICT for the dissemination of information and virtual consciousness efforts on
issues affecting women e,g. women’s sexual and reproductive rights, VAW, support services
Gurmurthy citing Berkman Center for Internet and Society, ‘The Internet and the Sex Industry’, see
http://cyber.law.harvard.edu/vaw02/.
29
Jac sm Kee “Erotics: Exploratory Research on Sexuality and the Internet” http://www.apc.org/en/node/11958/
28
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 8
Working Paper: Not for Citation or Reproduction
etc; (d) information/experience sharing and dialogues; collaboration and a convergence of
efforts on a global scale to push the agenda of gender equality; the building of supportive
community/network; (e) platform for political and social activism and refor; (f) increased
knowledge and self esteem (in the use of ICT; ((g) platform for agency, self expression and
self-determination with respect to sexuality and exercise of sexual rights. The list is, of
course, far from being exclusive. ICT, the cyber world, the internet, as dynamic as it is, and
as dynamic and adaptive, as well of women internet-users and women activitsts, the list
changes constantly, growing larger and broader in scope.
Lastly, it might as well be of use to include herein, the current statement of the UN Special
Rapportuer on freedom of opinion and expression, Frank La Rue. In his report dated 16
May 2011, he stressed the importance of internet access and its relation to the enjoyment
of other human rights, he pointed out that:
“Given that the internet has become an indispensable tool for
realizing a range of human rights, combating inequality, and
accelerating development, and human progress, ensuring
universal access to the Internet should be a priority for all
states on the promotion and protection of the right to freedom
of opinion and expression30.”
The Special Rapportuer likewise stressed that the internet is one of the most powerful
instruments of the 21st century in increasing transparency in the conduct of those in
power, on access to information, and for facilitating active citizen participation in building
democratic societies. He cited as examples the role of the Internet in the demonstrations in
countries across the Middle East and North African and how it was used in “mobilizing the
population to call for justice, equality, accountability and better respect for human
rights.31”
The report also expressed concern on how internet access is being curtailed in some
countries. This concern stemmed from accounts of internet clamp down in various
countries and of the manner by which legitimate online expressions are being criminalized,
to quote the report:
The Special Rapporteur remains concerned that legitimate
online expression is being criminalized in contravention of
States' international human rights obligations, whether it is
through the application of existing criminal laws to online
expression, or through the creation of new laws specifically
designed to criminalize expression on the Internet.
30
United Nations Special Rapporteur on the Promotion and protection of the right to freedom of opinion and
expression, Frank La Rue. A/HRC/17/27. http://daccess-ddsny.un.org/doc/UNDOC/GEN/G11/132/01/PDF/G1113201.pdf?OpenElement accessed on March 2011
31
A/HRC/ 17/27.
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 9
Working Paper: Not for Citation or Reproduction
Such laws are often justified as being necessary to protect
individuals' reputation, national security or to counter
terrorism. However, in practice, they are frequently used to
censor content that the Government and other powerful entities
do not like or agree with.
The foregoing discussion thus expands the discussion of ICT beyond the existence digital
and gender divide and the inequalities arising therefrom, into the discussion as well on
how ICT, particularly, the internet, as pointed out by APC, and as exhaustively discussed by
the Special Rapportuer Frank La Rue, can likewise provide for spaces of empowerment and
exercise of fundamental rights.
In moving forward then, in this research on ICT, Sexuality and VAW, two main areas for
discussion would be the following: (a) the role of ICT in the perpetration and/or
proliferation of VAW; and as well as (b) the role of ICT in empowering women, particularly
in the enjoyment/exercise of self-expression and sexual rights. The areas for discussion are
not at all exclusive and well defined, a recognition of the dynamism of ICT, both as a
medium in the context of globalization, capitalism and patriarchy, and possibly, as a world
of its own.
Women’s Emerging Issues on ICT, VAW and Sexuality
An article by Scott, Semmens and Willoughby32 (“Scott, et al.”) examines the general history
of women’s relationship with ICT, particularly with the Internet. The authors write that the
feminist story of “women and the Internet” splits into at least three, semi-competing,
versions: (1) the webbed utopia, (2) flamed out, and (3) locked into locality. These three
versions of the “women and the Internet” narrative differ sharply in the way they perceive
women’s relationship with the Internet. They range from an optimistic celebration of
women’s subversive activity via the electronic networks to tales of exclusion, harassment
and violence.
The “webbed utopia” version argues that the electronic networks offer women new
possibilities for networking and for participative democracy. At its core is the concept of
seizing control of a new communications technology. Scott, et al. note, however, that this
account can be blind to the significant differentials in access to and control of the electronic
networks. They observe that utopian feminists may be failing to challenge the
contemporary use of cybertechnology by industrial giants, global criminal networks,
military strategists, wealthy financiers and international racists, to evade social regulation,
entrench political control and concentrate economic power.33
32
Scott, Anne,Lesley Semmens and Lynette Willoughby. “Women and the Internet: The Natural History of a
Research Project,” Critical Readings: Media and Gender, edited by Cynthia Carter and Linda Steiner (Open
University Press, 2004)
33
Scott, et al. cited Light 1995; Castells 1996, 1998; Loader 1997; Panos 1995; Fischer-Huebner 1998; Lyon 1998;
Capitanchik and Whine 1999.
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 10
Working Paper: Not for Citation or Reproduction
The “flamed out” version revolves around the theme of sexual aggression on the Internet,
whereby new communications technologies are seen to help “immortalize the product of a
distorted view of sexuality within patriarchal societies” and “help predators to find new
victims, creating a reverse civil society, a community of the predatory violent,” where
“rapists or paedophiles can connect with their like-minded friends and… create a virtual
world in which the ‘abnormal’ becomes normal…”34 “Flamed out” highlights the fact that
the use of male violence to victimize women and children, to control women’s behavior, or
to exclude women from public spaces entirely, can be extended into the new public spaces
of the Internet. Scott, et al., however, note that this story is rather one-sided and can be
counter-productive for feminists. The frequent portrayal of women as helpless victims of
violence is misleading (most Net users do have some means to control or avoid
intimidation and violence35) and can be politically paralyzing.
The third version, “locked into locality”, posits that while electronic networks have been
described as a new “public space” or “public sphere”, women are underrepresented in
these spaces. In this version, women are often identified with local identities and the
particularity of place. As these geographies of place and locality are subverted by new
geographies of information flow, women face a double challenge: they must defend their
local spaces against the threat posed by a disembodied globalization, and they must also
create spaces within the new electronic media for their own voices.36 “Locked into locality”
suggests that the obstacles that women must overcome to gain full access to electronic
networks are still substantial. Scott, et al. consider this account highly sensitive to the
material constraints of time, space, money, educational background, cultural expectations
and employment opportunities, which act to limit women’s opportunities and aspirations
in relation to the ICTs. They used this version of “women and the Internet” in their own
study, as its steady focus on material factors places in perspective both the dangers and the
opportunities posed by the Internet.
Scott, et al. conclude by saying that it may be necessary to begin formulating a more
reflexive and variegated origin story in relation to women and ICT. This new tale should
address two key questions: (1) How are the new social geographies of ICT access being
gendered? and (2) How can women intervene to direct the shaping of new techno-social
relations in more democratic, inclusive and neutrally gendered ways? Further, a women
and technology story that is adequate to its task should analyze the changing shape of the
material geographies of time, space, and economic resources in the information age.
Situating ICT, VAW and Sexuality
The definition of what constitutes violence against women, inclusive of sexual violence, is
fairly established. The Convention on the Elimination of All Forms of Discrimination,
prohibits all forms of discrimination against women. General Recommendation 19 provides
34
Scott, et al. cited Inayatullah and Milojevic 1999.
Scott, et al. cited Hamilton 1999 and Newey 1999.
36
Scott, et al. cited Castells 1997, Enloe 1989, and Escobar 1999.
35
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 11
Working Paper: Not for Citation or Reproduction
that the definition of discrimination includes gender based violence, that is, violence that is
directed against a woman because she is a woman or that affects women
disproportionately. It includes acts that inflict physical, mental or sexual harm or suffering,
threats of such acts, coercion and other deprivations of liberty.
The Declaration on the Elimination of Violence Against Women (DICT-RELATED VAW),
provides a more comprehensive definition of VAW in terms of definition, scope, obligations
of the State, and the role of the United Nations. It defines VAW to mean “any act of genderbased violence that results in, or is likely to result in, physical, sexual or psychological harm
or suffering to women, including threats of such acts, coercion or arbitrary deprivation of
liberty, whether occurring in public or private life.” DICT-RELATED VAW further outlines
the scope of private and public to include violence in the family, violence in the community,
and violence perpetrated or condoned by the State, wherever it occurs.
In the reports of the Special Rapporteurs37, the different forms of violence have been
elaborated as follows:
Violence in the family—such as domestic violence; battering; marital rape;
incest; forced prostitution by the family; violence against domestic workers
and the girl-child (non-spousal violence, violence related to exploitation);
sex-selective abortion and infanticide; traditional practices such as female
genital mutilation; dowry-related violence; and religious/customary laws
Violence in the community—such as rape/sexual assault; sexual harassment;
violence within institutions; trafficking and forced prostitution; violence
against women migrant workers; and pornography
Violence perpetrated or condoned by the State—such as gender-based
violence during armed conflict; custodial violence; violence against refugees
and internally displaced persons (IDPs); and violence against women from
indigenous and minority groups.38”
In addition to that listed above, Yakin Ertuk, Special Rapporter until 2009, suggested the
inclusion of violence against women in the “transnational arena” – a recognition of
globalization and the increase of transnational process within which women encounter
new and emerging forms of vulnerabilities.
37
The critical review of the UN Special Raporteur on VAW entitled “15 years of the UN Special Rapporteur on VAW,
its cause and consequences”, provides for further substantiation of the term violence against women, as well as
the emerging issues and concerns on VAW were discussed. Spanning the years from 1994, the establishment of the
Special Rapporteur on VAW to 2009, the critical review covers the term of two special Rapporteurs and their
communications and country reports. The review thus summarizes the manner by which VAW has been
substantiated and further framed, taking off from CEDAW, General Recommendation 19 and DICT-RELATED VAW.
It likewise provides for the conceptual shifts in the VAW mandate of the Special Rapporteur since its inception.
38
The UN SRVAW Page 4-5
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 12
Working Paper: Not for Citation or Reproduction
Margaret Gallager’s article “Beijing’s Legacy for Gender and Media” (2003) challenges the
assumption that media and other information systems exist beyond the realm and beyond
the influence of gender relations. It thus support what has been maintained by feminist
scholarships, that is, the deeply embedded nature of gender-based judgements and
assumptions which permeate, not just the media , whether in their old or new forms, but all
economic, social and political institutions39. This echoes the view of Marcelle (2000) when
she stressed that technology and society are inextricably bound and that “power,
contestation, inequality and hierarchy inscribe new technologies and that although ICTs
can indeed be constitutive of new dynamics, they can also be derivative of older
conditions.”
Seen in this manner, the structural inequality and the deeply embedded gender inequality
prevalent in society and socio-cultural practices necessarily permeate and inform the field
of ICT. The root causes of VAW, as identified by the UN SRVAW report, and as also stated
in “Violence Against Women: harmful traditional and cultural practices in the Asia Pacific”.
In “Violence Against Women: harmful traditional and cultural practices in the Asia Pacific”
the chief causes of violence against women were identified as historically unequal power
relations between women and men in public and private life, patriarchy and men’s control
over women. The study, like that of the UN SRVAW, also recognizes that violence occurs
within the family, the community and in armed conflict, and may also be perpetuated or
condoned by the State. Stress was likewise made on the continuum of violence which
women may experience throughout their lifetimes, in the form of physical, sexual, and
psychological violence40. Unlike the UN SRVAW review, the study in its identification of
emerging forms of VAW, made mention of violence perpetrated through computers and
cell phones.
That violence against women is being perpetrated and committed through the ICT arena,
particularly the internet has already been the subject of several studies and articles.
Although a definition of such violence has yet to be developed, several studies have made a
listing of what has been considered as violence against women committed through ICTs, or,
what has been referred to by the Foundation for Media Alternatives as ICT-related VAW.
One of these articles is that by Gumurthy (2004) which, in the discussion of ICT and
Gender, made mention of how violence against women are being perpetrated through the
new ICTs, particularly the internet. She stated that “over the past ten years, the internet has
emerged as the premier forum of the international sex trade and has facilitated,
accelerated, and normalised the sexual exploitation of women and girls. New ICTs have
combined with racism, sexism and capitalism to escalate sexual exploitation worldwide 41.”
To further quote on the discussion on VAW:
39
Margaret Gallager, Beijing’s Legacy for gender and Media, page 2
“Violence Against Women: harmful traditional and cultural practices in the Asia Pacific”. ESCAP. (2007) page 1112
41
http://cyber.law.harvard.edu/vaw02/module2.html cited in Guumurthy page 27
40
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 13
Working Paper: Not for Citation or Reproduction
The global entertainment industry, poised on the power of new ICTs, is a
force beyond the grasp of law and regulation. The sex industry markets
precisely the violence and oppression that feminists seek to eliminate from
the streets, workplaces, and bedrooms (Jeffreys 1997). Pornography has
assumed mammoth proportions with the Internet (see Box 8). The Internet
has made sexual exploitation of and violence against women and children
seem more normal, and this is a matter of deep concern. Criminal syndicates
violate laws prohibiting sexual exploitation and violence by locating their
servers in host countries with less restrictive laws, to avoid regulation. The
new technologies have thus enabled the creation of online communities free
from interference or standards where any and every type of sexual violence
goes and where women-hating is the norm.42
The above views were likewise echoed by other articles. Kathambi Kinoti (2007), for one,
wrote “ITCs and VAW43”, where she stated that ICTs are used in various ways to perpetrate
violence against women. She explained that ICTs play an important role in the
commoditisation and objectification of women’s bodies and sexualities. She mentions the
difficulty of prosecuting ‘virtual trafficking’ and the problem posed by anonymity in the
internet in pursuing redress in cases of VAW committed through or facilitated by the
internet.
Jenn Jones’ “Internet Sexual Harassment” on the other hand stressed that although the
internet provides for a space for women’s empowerment, computer technology remains to
be a subject that not many women study. She states that on the whole, the internet is a
man’s domain. She adds that “essentially, the internet is a microcosm of society, where
oppression of women is replicated and perpetuated.” Internet pornography, she claims, has
to be most obvious expression of this, together with the gender harassment, both passive
and active, which are being perpetrated through the internet.
Emerging Forms of VAW: ICT-related VAW
Violence against women, instead of being viewed as social aberrations or law and order
problems, are seen as outcomes of unequal power relations existent in society and are
outcomes of gender discrimination that shape social economic, cultural and political
structures. In the reports of the Special Rapporteurs, the areas where violence occurs were
identified as within the family, the community, and those perpetrated or condoned by the
State. Special Rapporteur Yakin Ertuk recommended the ‘transnational arena”, which due
to globalization, has shown to be an area where women face new vulnerabilities. Not
mentioned however, in the UN SRVAW review are the vulnerabilities to VAW which women
face in the arena of ICT.
42
Berkman Center for Internet and Society, ‘The Internet and the Sex Industry’, see
http://cyber.law.harvard.edu/vaw02/.
43
ICTs and Violence Against Women, (2007). Kathambi Kinoti.
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 14
Working Paper: Not for Citation or Reproduction
During the review of related literature of this research, several forms of ICT-related VAW
have been identified. The forms are grouped together as supported by the literatures
identifying and associating the said forms as such. For instance, an article defines
monitoring and surveillance as a form of harassment. The research therefore considered it
as one. The major forms identified in the research are: (1) cyberharassment, (2)
cyberpornography and (3)cybertrafficking.
a. Cyberharassment
Cyberharassment serves as broad definition for acts which primary purpose is to use
cyberspace to harass a target. It covers cyberstalking, blackmail or threats, trolling
and flaming; and monitoring and surveillance. It is also interchangeably referred to as
“harassment by computer” by other articles.
1. Cyberstalking
Cyberstalking has secured a legal definition in Canada and is considered as a
criminal offense. Cyberstalking refers to the use of cyberspace to control or
terrorize a target to the point that he or she fears harm or death, either to oneself
or to others close to her or him. In Canada and elsewhere, cyberharassers can
expect to deal with legal civil suits, whereas cyberstalkers can expect to deal with
legal criminal suits.44
Cyberstalking may include false accusations, monitoring, making threats, identity
theft, damage to data or equipment, the solicitation of minors for sex, or gathering
information in order to harass. The definition of "harassment" must meet the
criterion that a reasonable person, in possession of the same information, would
regard it as sufficient to cause another reasonable person distress.45
2. Harassment by computer
Harassment by computer is a crime in several U.S. states (see computer crime). It
is distinct from stalking in that stalking typically requires two or more contacts,
whereas harassment by computer may be a single incident. It is also different from
regular harassment, because the offense typically encompasses a range of crimes
that would not be considered harassment if conducted in person.
….
Harassment by computer statutes are typically distinct from
cyberbullying laws, in that the former usually relate to a person's "use a
computer or computer network to communicate obscene, vulgar,
profane, lewd, lascivious, or indecent language, or make any suggestion
or proposal of an obscene nature, or threaten any illegal or immoral
44 http://computer.yourdictionary.com/cyberharassment
45
http://en.wikipedia.org/wiki/Cyberstalking citing Bocij, Paul, Cyberstalking: Harassment in the Internet Age and
How to Protect Your Family (Praeger, 2004)
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 15
Working Paper: Not for Citation or Reproduction
act," while the latter need not involve anything of a sexual nature.46
3. Cyber gender harassment
Taking a gendered perspective, cyber gender harassment is defined by Citron (2009) as
the online harassment of women, which includes rape threats, doctored photographs
portraying women being strangled, postings of women’s home addresses alongside
suggestions that they are interested in anonymous sex, and technological attacks that
shut down blogs and websites.
Citron observes that cyber gender harassment exemplifies behavior that profoundly
harms women yet too often remains overlooked and even trivialized. The harms
it causes impede women’s full participation in online life, often driving them
offline, and undermine their autonomy, identity, dignity, and well-being
(emphasis supplied).
4. Electronic mail
The use of electronic mail (email) as a tool for online harassment is also another form of
cyberharassment. Forty eight point two percent of cases investigated by the Computer
Investigation & Technology Unit (CITU) of the New York City Police Department (NYPD)
between January 1996 and August 2000 involved “aggravated harassment by means of
a computer or the Internet”. Email was used to harass the victims in approximately
79% of those cases.47 A typical example of harassment by email involves the
communication or sending out of inconspicuous emails containing sexually graphic
messages and/or illustrations to unsuspecting victims.
Perpetrators of this type of e-VAW can also use emails to forward unwanted proposals
for sexual conversation, much in the same way obscene phone calls or proposals for
phone sex have been conducted in the past. Refusal by the recipient to take part could
sometimes give rise to abusive language, or more of sexually harassing memos or socalled mail bombs.48
5. Trolling and flaming
Another prevalent form of Internet harassment comes in the guise of “trolling” and
“flaming” activities. By and large, these practices have the perpetrators - referred to as
“trolls” and “flamers”, respectively - registering with certain websites purely to harass
46
http://en.wikipedia.org/wiki/Cyber_harassmentt
Bortel, Angela, Esq. Technology and Violence Against Women.
http://stopvaw.org/Expert_s_Corner.html#Technology+and+Violence+against+Women
48
Aleyamma Vijayan. Workshop on Misuse of Communication Technology and New Forms of Violence Against
Women: A Gendered Understanding. 27 and 28 March 2009. Hotel Geeth.
47
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 16
Working Paper: Not for Citation or Reproduction
other users.49 One TIME Magazine article defines a troll as “a person who posts
incendiary comments with the express purpose of provoking an argument”.50
Trolling itself is referred to by PCMAG.COM as the “posting of derogatory messages
about sensitive subjects on newsgroups and chat rooms to bait users into
responding”.51 It is sometimes considered as a variation of stalking.52 Flaming, on the
other hand, is defined by one online source as “the often deliberate act of posting or
writing messages (flames) on Internet bulletin boards and message groups that have
the intent of insulting or creating dissent within a group”.53 Flames are often composed
of coarse language and personal insults. They are meant to hurt people’s feelings, get
them fired up, and not to further intelligent and sound conversation. At least one article
considers the recognition these types of violence receive as contributing to the creation
of a mindset of acceptability as regards harassment being a natural part of the World
Wide Web.54
6. Production and Dissemination of Morphed images
The production and intentional dissemination of morphed images comes as another
unique manifestation of cyberharassment. The backbone of this online harassment lies
in the images that have specifically been subjected to the process referred to as
“morphing”. Morphing refers to a “special-effects process used in film or video
production in which persons or objects seem to change shape, form, etc. in a smoothly
continuous series of images created in a digital computer”.55 As a form of abuse,
however, it is often used to refer to the process of producing an obscene or lewd image
of the intended victim usually done by attaching her face to an existing pornographic
photo. The resulting image is then uploaded on the Internet or passed around through
mobile phones.56
In one report from India, the Delhi police noted that of all cybercrime cases reported,
almost half were filed by women who discovered their faces morphed onto
pornographic images, posted online, and usually accompanied by a personal phone
number and an invitation for strangers to call.57 According to one study, this practice
has several implications for the participation of women in cyberspace, since the
49
Jones, Jen. Internet Sexual Harassment. http://musemagazine.org.nz/61/
Making Mischief on the Web. Ana Marie Cox. 16 December 2006.
http://www.time.com/time/magazine/article/0,9171,1570701,00.html
51
http://www.pcmag.com/encyclopedia_term/0,2542,t=trolling&i=53181,00.asp#
52
http://www.bullyonline.org/related/stalking.htm
53
http://www.wisegeek.com/what-is-flaming.htm
54
Jones, Jen. (supra)
55
http://www.yourdictionary.com/morphing
56
Ebrahim, Zofee. For Women Cyber Crimes Are All Too Real. http://ipsnews.net/news.asp?idnews=53669
57
Association for Progressive Communications. How Technology is Being Used to Perpetrate Violence Against
Women – And to Fight It. http://tinyurl.com/3faud2y
50
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 17
Working Paper: Not for Citation or Reproduction
violence committed is just contained within digital spaces, but actually extends to “a
loss of the freedoms that the Internet offers to women” (emphasis supplied).58
7. Blackmail
ICT-related blackmail now also plagues the virtual world. Today, it primarily consists of
the capturing of intimate photos or videos by abusers (with or without the consent of
the victim), followed usually by extortion against the victim and her family, under the
constant threat of public exposure. According to Jovita Montes, director of Health and
Services Department of GABRIELA, a Philippines-based organization advocating for
women’s rights, video recording by men of their sexual exploits is one emerging form of
VAW. Real-life cases attest to such types of videos being used against women trying to
break up with their partners, and/or utilized as means to extort money from the
woman and her family.59 In Malaysia, one report cites an increase in calls made by
women trapped in violent relationships because of intimate video clips or images in the
possession of their partners.60
8. Publication of personal information
The publication of an individual’s personal information in various online fora is also
widely recognized as one form of online harassment, which can sometimes to lead to
tragic outcomes on the part of the victims. In one case, a woman recounted how her
personal details were provided to open dating sites and bulletin boards found in
obscene websites. This led to her being paged or phoned by complete strangers for
several months. Other victims are not as “lucky” as when the assailant resorts to posting
messages making it appear as though the sender (the woman victim) is in need of, and
prepared to pay for, sexual service.61 False postings of this nature have sometimes led
to violent attacks. One US woman was raped by a stranger answering an ad saying she
was looking for a man to fulfill her violent rape fantasy. It was later discovered that the
fake ad was put up by her ex-boyfriend.62 Another case featuring a spurned boyfriend,
this time in the Philippines, had the man going to the extent of posting nude photos and
videos of his ex-girlfriend in one popular social networking site through an account he
created under her name. Not contented with this, the man also mailed a copy of the
video to the girl’s Muslim parents.63
9. Monitoring and surveillance
58
Anita Gurumurthy, Niveditha Menon. Violence Against Women Via Cyberspace. Economic & Political Weekly
(EPW). 3 October 2009. Vol. XLIV No. 40.
59
Ellao, Janess Ann J. Violence Against Women on the Rise, Use of Technology to Abuse Women Alarming –
Gabriela. 25 April 2009. http://www.bulatlat.com
60
Association for Progressive Communications (supra)
61
Aleyamma Vijayan (supra)
62
Association for Progressive Communications (supra)
63
Santos, Kara. Women Fight Assault Over Internet. http://ipsnews.net/news.asp?idnews=54030
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 18
Working Paper: Not for Citation or Reproduction
Of all the emergent forms of ICT-based VAW, perhaps the most common and easiest to
perpetrate has been the constant monitoring by abusers of both the physical and virtual
activities of their victims through the use of newly-developed technologies that are now
readily available to the public at large such as the computer, the mobile phone and the
Internet. Aside from encroaching on the private lives of their victims, perpetrators of
this type of violence are able to keep track of their victims and thwart – or at the very
least, impede – any attempt by their victims to escape further abuse.
i.
Monitoring by computer
In this age of computers, abusers can easily purchase and install commercially
available spy software to record and gain access to all keystrokes made on the
computer used by their victims. This enables them to supervise – and even control their victim’s email correspondence, web surfing and other modes of Internet
communication. In Michigan, USA, a man was charged with felony counts for using a
computer to spy and intrude on his estranged wife’s privacy. He was found to have
installed a spy program on her computer without her knowledge, which sent him
regular emails regarding her computer activity, including all emails sent and
received; all instant messages sent and received; and all Internet sites visited.64
Even without so-called spy software, however, existing programs found in
practically every computer today already provide abusers with ample opportunity
to intrude into their victims’ private computer activities. For instance, Internet
browsers by default often create a record of recent sites visited by the user on the
Internet. The same is true in the case of instant messaging facilities which can also
keep a log and sometimes even a copy of their users’ conversations.65 Finally, web
cams and other hidden surveillance cameras can be used, in conjunction with
computers and the Internet, to monitor other people’s activities. These small devices
are relatively cheap and can be installed almost anywhere. Their digital output can
be transmitted through the Internet and enable abusers to keep track of their
victims’ activities even while away.66
ii.
Monitoring and surveillance by mobile phones
In the case of mobile phones, there are also quite a number of ways through which
abusers can tap their capabilities in order to perpetuate VAW, specifically in the
area of monitoring or surveillance, although the extent and nature of such activity
may vary from case to case. The simplest case would involve an abuser barraging his
victim with calls, text messages and voicemails in order to keep track of the latter’s
whereabouts. On top of this, he may also use the data generated by the phone to
track his victim’s call or text messaging (SMS) history. One abuser in Rhode Island,
USA assaulted his wife after finding a shelter telephone number in her phone’s call
64
Bortel, Angela, Esq. (supra.). See also: Aleyamma Vijayan (supra).
Aleyamma Vijayan (supra)
66
Aleyamma Vijayan (supra)
65
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 19
Working Paper: Not for Citation or Reproduction
history. As a result, she did not attempt to leave her husband for another year. 67 In
Uganda, some time in December 2008, there were two reports of men murdering
their wives after they accused the latter of receiving “love SMSs”.68 A more
complicated form of monitoring requires the use of Global Positioning System (GPS)
technology which is now commercially available for public use. GPS can be installed
in a mobile phone and can log the location of the user/owner at all times.69 Domestic
violence perpetrators can then use this tool to track and control their partners’
movements by following their telephone communications.70
b. Cyberpornography
Cyberpornography is the act of using cyberspace to create, display, distribute, import,
or publish pornography or obscene materials, especially materials depicting children
engaged in sexual acts with adults. In some states, cyberpornography is a criminal
offense, classified as causing harm to persons.71
1. Internet pornography
Internet pornography according to Roman (1997) is the obscene or indecent material
made, transmitted, or displayed by means of telecommunications device or interactive
computer service. Internet pornography is defined and penalized under a US federal
statute which primarily intends to shield minors from pornography in the Internet.
2. Cyber-obscenity
Citing Wall’s (2002, 2005) behavioural typology of cybercrime, which posits that
cybercrime is a broad term encompassing crimes that span from economic crime to
interpersonal violence, Williams (2009)72 identified “content-related offenses” which
bifurcates into two forms of content offenses: cyber-obscenity and cyber-violence.
Cyber-obscenity involves the trade of sexually expressive materials online.
Cyberviolence or harm involves the violent impact of actions within cyberspace
including cyberstalking, hate speech, and virtual rape (citing Dibbell 1994). Williams
mentions that Wall (2002) notes, “although such activities do not require a direct
physical expression, the victim nevertheless will feel the violence of the act and
may bear long-term psychological scars as a consequence” There is also
recognition that often “the virtual leaches through the porous boundaries of
67
Bortel, Angela, Esq (supra)
Association for Progressive Communications (supra)
69
Aleyamma Vijayan (supra)
70
Kinoti, Kathambi. ICT and Violence against Women. 10 January 2007.
http://www.wittproject.net/spip.php?article413. See also: Bortel, Angela, Esq. (supra)
71 http://computer.yourdictionary.com/cyberpornography
72 Williams, Rachel. Gender, Bodies and Cyberstalking: Embodying Theory, Developing Methodology (2009). Thesis
submitted to the School of Social and Cultural Studies, Victoria University of Wellington in fulfillment of the
requirements for the degree of Master of Arts in Criminology.
68
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 20
Working Paper: Not for Citation or Reproduction
cyberspace” (citing Wykes 2007) and cybercrime often has serious offline parallels
(emphasis supplied).
3. Cyberprostitution
Soto (2010) writes that cyber prostitution is a new phenomenon where criminal groups
are quick to exploit the open nature of ICTs. In the context of the Philippines, while
prostitution of any kind is illegal, it continues to be a lucrative industry and is thriving
in the Internet. From “cybersex” via the Internet to small-time individual “negotiated
sex”, ICT is being used to sell and buy sex. Women may be lured to try cyber
prostitution especially if it’s perceived to be “less dangerous” compared to physical and
real time prostitution. 73
There are at least 1,329 Filipinos daily going into cybersex spaces at Yahoo! and
approximately 200,000 Filipinos are members of cybersex groups in Yahoo!. This was
cited by Annie Ruth Sabangan, a senior reporter for Manila Times in her report
published in August 2007. According to Sabangan, “there is a thin line separating
pornography and prostitution…. in many Pinoy groups at Yahoo!, pornography and
prostitution are intertwined -- pornography is the appetizer and prostitution is the
main course... to get to pornography groups and prostitution sites is very easy,
everything is linked together to deliver one virtual flesh factory”.
4. Sex video scandals
Soto observes that in recent years or earlier, when mobile phones with cameras
penetrated the Philippine market, the country became flooded with “sex-video
scandals” taken using mobile phones. These so-called sex-video scandals involve young
university and professional women, even celebrities and politicians. The sex videos are
often uploaded to the Internet, including in the popular video website YouTube where
they become quickly accessible to the public. Soto cites as an example the controversial
sex video of Dr. Hayden Kho and actress Katrina Halili, which brought about a Senate
hearing in aid of legislation aired publicly in May 2009.
c. Cybertrafficking
Chawki and Wahab (2004) begins to study the use of ICTs in trafficking in human beings by
discussing the very concept of trafficking in human beings, thus:
In general terms, “trafficking” implies an illicit trade in goods, such as drugs,
arms or stolen goods such as works of art. Besides illegality, trade, profit and
crime, coercion, deception, violence and exploitation are all associated with the
concept of trafficking in humans. The main victims of trafficking are women and
73
The writer of this review excluded Soto’s discussion of deprivation of sexual and reproductive health rights for
women and girls as ICT-related VAW, because the ICT connection involved in this matter is in terms of using ICT to
promote these rights.
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 21
Working Paper: Not for Citation or Reproduction
children. Therefore, the phrase “especially women and children” is frequently
added, in order to underline the links between trafficking and sexual
exploitation, pornography and paedophilia. “Trafficking in persons” was at first
defined with reference to prostitution. The international conventions of the first
part of the twentieth century already provided specific definitions of “white
slave traffic” “traffic in women and children”, “slavery” and “forced labour”.
… Amongst the most influential definitions, is the one offered by the United
Nations protocol to prevent, suppress, and punish trafficking in persons
especially women and children supplementing the United Nations convention
against transnational organised crime takes the term trafficking in human beings
to mean:
“The recruitment, transportation, transfer, harbouring or receipt of
persons, by means of the threat or use of force or other forms of
coercion, of abduction, of fraud, of deception, of the abuse of power or
of a position of vulnerability or of the giving or receiving of payments
or benefits to achieve the consent of a person having control over
another person, for the purpose of exploitation. Exploitation shall
include, at a minimum, the exploitation of the prostitution of others or
other forms of sexual exploitation, forced labour or services, slavery
or practices similar to slavery, servitude or the removal of organs”.74
Chawki and Wahab then briefly describes or profiles the persons involved in trafficking: (1)
the traffickers; (2) the victims (saying that the victims include men, women and children,
although most agree that women and children are more often victims of trafficking); and
(3) the users in ICT-supported trafficking, which includes collectors of pornographic
materials, stalkers, and buyers (of women and children for the purpose of sexual
exploitation).
The authors then proceed to outlining the kinds of technology that can be used for the
purpose of sexual exploitation - either by individuals for their own private use or by
persons or groups using the Internet as a commercial tool, to promote and sell images or
services. The main techniques that are identified involve: (a) Mainstream Communications;
(b) Scanners and Video Digitizers; (c) Digital Video Disk (DVD); and (d) Internet
Applications and Services, which include web sites, peer-to-peer networks, file swapping
programs, file transfer protocol, search engines, chat rooms, and pornographic spam.
In examining not only the number of human beings trafficked with the use of ICT each year,
but also their characteristics, what makes them vulnerable to being manipulated, where
they are coming from, and what conditions they suffer once in this situation, Chawki and
Wahab (2004) observes that the main reasons for trafficking in human beings are
economic. Most of the victims of trafficking are poor and not well educated. Women are
mainly trafficked from South to North, from South to South and from East to West. The
74 Article 3, U.N. Protocol Against Trafficking in Persons Especially Women and Children
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 22
Working Paper: Not for Citation or Reproduction
flows are from poorer countries to countries where the standard of living for an average
person is relatively higher. The authors then conclude that the fact that lesser developed
countries, populations are used for trafficking supports the recognition of a right to
development as a human right.
Sex trafficking
Sex trafficking has also sunk to new lows with traffickers using technology to sustain and
even improve their illegal trade. Fake online “marriage agencies” and websites advertising
nonexistent work or study opportunities abound and continue to deceive trusting and
poverty-stricken women. In Mexico alone, one police report indicated that hundreds of
children were recruited over the Internet by child-traffickers in 2009. The
commercialization of private home videos obtained and sold by image traffickers without
the knowledge of the people filmed has also paved new avenues for sex traffickers to
conduct business.75 Unfortunately, in most cases, national and international anti-trafficking
laws do not usually adequately address the issue of ’virtual’ trafficking of women’s images
but typically confine their coverage to the trafficking of women’s physical person.76
The 2011 Trafficking in Persons Report77 released by the Department of State of the United
States of America indirectly recognized the involvement of ICT in trafficking in a couple of
cases that it cited. One is when the Dutch national police, in November 2010, seized the
websites of two escort businesses due to possible involvement in trafficking, and sent this
text message to approximately 1,300 mobile phone users who had contacted the websites.
The other is the case of a 16-year-old woman in Dallas who was pimped by her boyfriend
who was an older man. Among the things the man did was to post prostitution
advertisements with her picture on an Internet site. He then rented hotel rooms around
Dallas and forced her to have sex with men who responded to the ads. The man later pled
guilty to trafficking.
The Phenomenon of ICT-related VAW
What makes an offense ICT-related VAW is when ICT is used as the medium, mode, place of
commission (commonly tagged as “cyberspace”) and a system or a world unto itself in the
perpetration of VAW or simultaneously or separately, expression of sexuality. Below is the
study’s working illustration of the continuum of VAW in the phenomenon of ICT-related
VAW:
75
Association for Progressive Communications (supra)
Kinoti, Kathambi. ICT and Violence against Women. 10 January 2007.
http://www.wittproject.net/spip.php?article413
77
http://www.state.gov/documents/organization/164452.pdf accessed 28 June 2011. See pages 13 and 35.
76
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 23
Working Paper: Not for Citation or Reproduction
No Cause or Effect
Intractable, Borderless
Different Forms of VAW:
Privacy
CONTINUUM
Self-Expression
Agency
INDIVIDUAL
Relationships/ Interactions
SYNDICATED
Cyberharassment
 cyberstalking
 blackmail, threats
 trolling, flaming
 monitoring and
surveillance
Cyberpornography/
Cyberprostitution
 cybersex dens
 sex video scandals
Cybertrafficking
Multiple Personhood/ Identities
Figure 1. The Phenomenon of ICT-related VAW
a. ICT related VAW: same root, different mode/medium of commission
Cyber-harassment, cyber stalking, trafficking, cyber pornography, video scandals,
electronic blackmail, trolling and flaming are few of the forms which this research
considers as ICT-related VAW. What then is ICT-related VAW? Is this a new form of VAW? A
derivative thereof?
We hold that ICT- related is no different from VAW in terms of origin and root cause: the
historically unequal power relations between women and men in public and private life,
patriarchy and men’s desire to control women’s sexuality. Like how VAW is defined under
ICT-RELATED VAW and as further explained in the reports of the Special Rapportuer, these
are forms of gender based violence rooted on the structural inequity between men and
women and in the system of patriarchy prevalent in society. As further explained by the
Special Rapporteur on VAW “violence is not an isolated incident targeting vulnerable
women but a systemically used tool of patriarchal control to ensure that ‘women stay in
their place’.
What however, makes ICT-related VAW distinct is the medium and the mode by which the
violence is committed: through virtual and digital spaces, through cyberspace, through ICT.
It is this particular characteristic of ICT-related VAW that sets it apart from common VAW.
Though ICT-related VAW springs from the same structural inequality and system of
patriarchy in society, though it is the same in essence with offline VAW, still, the manner of
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 24
Working Paper: Not for Citation or Reproduction
its commission – through virtual and digital spaces --- has made ICT-related VAW a distinct
phenomenon.
b. Difficulties in the ICT-related VAW: Borderlessness, Intractability, fluidity of
digital personhood
The borderlessness brought upon by ICT, the nature of virtual and digital spaces, and the
anonymity offered by digital personhood, has totally changed not only the manner by
which VAW is being committed and perpetrated, but also of its effects and consequences
and of its consequent prosecution or non-prosecution.
In the ICT arena, the rules on the territorial jurisdictions of states are difficult to delineate.
In VAW being perpetrated on line, the abuser/s may be in one country’s jurisdiction, while
the abused woman or women may be in another country’s jurisdiction. This has given rise
to trans- border crimes, which are often syndicated and profit oriented, of pornography,
white slavery, child abuse, trafficking and sexual exploitation. This likewise affects issues
of territoriality and jurisdiction in the prosecution of the offenses –-- in online offenses,
where exactly is the offense committed? Who has jurisdiction over the same? These are
valid questions and these are questions that has made the prosecution of on- line offenses,
not necessarily limited to VAW, difficult to pursue. Here, it is pertinent to cite Gurmurthy’s
(2004) study where she observed that “over the past ten years, the internet has emerged as
the premier forum of the international sex trade and has facilitated, accelerated, and
normalised the sexual exploitation of women and girls. New ICTs have combined with
racism, sexism and capitalism to escalate sexual exploitation worldwide78.” To further
quote Gurmurthy:
The global entertainment industry, poised on the power of new ICTs, is a
force beyond the grasp of law and regulation. The sex industry markets
precisely the violence and oppression that feminists seek to eliminate from
the streets, workplaces, and bedrooms (Jeffreys 1997). Pornography has
assumed mammoth proportions with the Internet. The Internet has made
sexual exploitation of and violence against women and children seem more
normal, and this is a matter of deep concern. Criminal syndicates violate laws
prohibiting sexual exploitation and violence by locating their servers in host
countries with less restrictive laws, to avoid regulation. The new
technologies have thus enabled the creation of online communities free from
interference or standards where any and every type of sexual violence goes
and where women-hating is the norm.79
The manner too, that ICT transcends both time and space, has accelerated the effects of
ICT-related VAW and has made the same more vicious. As ICT allows the fast dissemination
of information and content, and since it provides for multiple platforms for posting and
78
http://cyber.law.harvard.edu/vaw02/module2.html cited in Guumurthy page 27
Berkman Center for Internet and Society, ‘The Internet and the Sex Industry’, see
http://cyber.law.harvard.edu/vaw02/.
79
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 25
Working Paper: Not for Citation or Reproduction
reposting, and involve vast number of networked computers, it becomes very difficult for
states, and even ICT companies to contain and regulate. A simple example on this would be
the manner by which an uploaded YouTube video circulates in the worldwide web or when
a nude picture of a woman gets to be uploaded in a social network account created by a
disgruntled boyfriend or even a stranger. Since the companies which run and control sites
such as Facebook and You Tube are located outside of the country, it gets difficult, even if
possible, to request that content be removed from these sites. In this sense, the violence,
perpetrated online, remains visible for others to see, a constant reminder of the violence
committed against her and exacerbating the effects of the abuse. In certain cases, one may
not even know that one’s picture/image is already morphed or used to create fictitious
accounts --- this, once again has been made possible by the nature of ICT and of digital and
virtual spaces --- it’s broadness, and the immensity of its content.
The anonymity offered by digital and virtual spaces has made ICT-related VAW intractable,
it has effectively exacerbated the effects of VAW and increased the difficulty of prosecuting
the same. Identity has become very difficult to establish in online spaces. Digital
personhood, the identity taken on by a person as he/she goes on line, which may include
his/her age or his/her gender, may be totally different from his/her real identity. This
anonymity afforded by the virtual, digital spaces and by the internet environment plays a
key factor in making ICT-related VAW distinct from offline VAW. Where in offline VAW, the
perpetrator, through his physical presence/appearance is readily seen, in the virtual and
digital spaces, this is not so. There exists an intractability of identity in digital spaces, such
that a woman, may become a victim of cyber pornography, cyberstalking or of blackmail
without necessarily seeing or knowing who the perpetrator is. This makes the prosecution
of ICT-related VAW more difficult.
As described by Boler80 there is a fluidity of online identity(ies), where online spaces
including both text-based and visual spaces, allows users to construct ‘virtual ‘fictional’
identities that allow them to move beyond the usual social markers of ethnicity, class,
gender, age and ability” One manifestation of fluidity is gender-switching whereby users
can select avatars, personas or user names of the opposite sex or choose to be gender
neutral.
In a study of cybercrimes, the above questions on the effects of digital/virtual spaces and of
the internet in the commission of cyber-obscenity, cyber violence and cyber stalking were
thoroughly discussed. Said study expressed:
Cyber crimes are distinctive in several ways. Firstly, they have no definable
boundaries and are unrestrained by concepts of time, space and location. As
Yar (2006:11) argues, “cyberspace variously ‘transcends’, ‘explodes’,
‘compresses’, or ‘collapses’ the constraints of space and time that limit
interactions in the ‘real world’”. This also means they are inter-jurisdictional,
which has consequences for prosecution. They also lack a “core set of values”
80
Cited in Williams, Rachel. Gender, Bodies and Cyber Stalking: Embodying Theory, Developing Methodology. p 94
http://researcharchive.vuw.ac.nz/bitstream/handle/10063/1171/thesis.pdf
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 26
Working Paper: Not for Citation or Reproduction
(Wall, 1999:109) and there does not exist a consensus, legal or otherwise, as
to what constitutes a cyber crime.
Though the above mentioned study acknowledges that cybercrimes, by virtue of the mode
or medium of their commission are distinct, still it propounded that cyberstalking is a
gendered offense. The study thus rejects the notion of disembodiment (or the absence or
irrelevance of the body) when engaging with on line spaces, and maintains that the
cyberstalking experienced by women online are directed against them, precisely because
they are targeted as women. Said study speaks of the continuum of online victimisation of
women and in addition to cyber stalking, it thus includes cyber obscenity, cyber violence,
and flaming, sexual harassment and hate speech. In explaining how sexual harassment is
committed on line, the study explained that even in the absence of the body, it is language
that constitutes the body in online spaces and by language too – through flaming, hate
speech, harassmenet -- such virtual body is or may be diminished. To quote, the study
explains:
If ‘being’ can be constituted through language then online abuse and
harassment via language contributes to an individual’s ontological
precariousness. The ways in which speech can harm in a face-to-face
situation are equally plausible in an online environment to the extent where
the environment itself may contribute to the increased severity of a verbal
attack that is not tempered by the restrictions of embodiment or physical
presence.
The study then cites Spender (cited in Hawthorne and Klein,1999:8) that “for every
feminist issue in the real world the same issues apply in the cyberworld”; including the
victimisation of women.
The above discussion is closely related to the concept of continuum of violence in ICTrelated VAW. In many instances, offline VAW continues to the online spaces. Thus, the
underlying root of VAW, that of structural inequality between men and women in society,
are the same root causes that inform the VAW committed on line. This continuum of
violence directed against women is likewise seen in cases where offline violence literally
cross into online realms. This is often seen in cases of previous acquaintances or between
men and women who are in previous or current relationships. Accounts have been made of
women being threatened and harassed online by estranged husbands, boyfriends or
disgruntled suitors. These portray that the violence directed online, has its roots and are
but continuum of violence began offline. As estimated by the UN, 95 % of aggressive
behaviour, harassment, abusive language and denigrading images in on line spaces are
aimed at women and come from partners or former male partners81.
81
How technology is being used to perpetrate VAW- and to fight it citing United nations
daccessods.un.org/TMP/7121883.html
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 27
Working Paper: Not for Citation or Reproduction
Above matters said, this research proposes of seeing and distinguishing ICT-related VAW
which is being committed on individual level as compared to ICT-related VAW committed
in a syndicated manner and for profit. The distinction is made in order to focus on the
nuances of ICT-related VAW committed on individual level, which may be between
previous acquaintances or complete strangers, with
ICT-related VAW which is
compounded and committed in a syndicated manner and for purposes of profit.
c. Subjectivities and Contextualization: ICT related VAW in the individual level
In the first categorization of ICT-related VAW, that committed in the individual level, this
research proposes a contextualized and subjective consideration of each case. This
contextualized and subjective consideration would include looking into whether or not the
perpetrator and the woman victim of ICT-related VAW are previous acquaintances or not;
it would likewise look into the woman’s agency or participation; and likewise on whether
or not the case is purely ICT-related VAW or that which has originated in offline VAW
crossing into online spaces.
As propounded on the research on cyber stalking, it doesn’t as much matter whether the
VAW is committed offline or online, the harm that it inflicts on women by virtue of being
online is not diminished. The trivialization of ICT-related VAW as mere online offenses,
have greatly impacted women who are victims of thesame. This misconception has affected
the reporting of ICT-related VAW as well as the availability and accessibility of remedies in
such cases.
In the case of ICT-related VAW where the parties are previous acquaintances, and where
the violence started offline crossing to on line spaces, the continuum of violence is more
evident and in Philippine laws where the Anti-VAWC act is applicable to persons with
whom the woman has had previous dating relationship, recourse under the law may be
had. However, even that recourse could prove to be problematic as with the case of VAWC
filed by Katrina Halili against Hayden Kho. Said case was dismissed by the lower courts on
the basis that, even if Kho and Halili were in previous dating relationship, Kho was found
not to be guilty of the Anti-VAWC law as he was not the one who uploaded the sex videos
which caused Halili’s psychological distress. Like the Kho and Halili case, other common
cases of ICT-related VAW involving previous acquaintances mostly involve the use of
information, photos, images, videos taken previously while the parties were still in a
relationship and the use of the same to harass, threaten, or blackmail the woman. Thus we
have cases of cyber gender harassment, cyberstalking, cyberpornography , the use of
electronic mail and social network sites for blackmail committed by estranged husbands,
boyfriends, or disgruntled suitors.
In the above discussed case of ICT-related VAW committed by previous acquaintances, the
identification of the perpetrator is often much easier as the same is known to the woman.
This, however, is not true in cases of ICT-related VAW committed by complete strangers on
line. In these cases women find difficulty not only in identifying the perpetrators but also in
reporting and seeking redress. All the elements that make cybercrimes difficult are present
here, there’s the borderlessness of the ICT world, the anonymity granted to users which
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 28
Working Paper: Not for Citation or Reproduction
has made the identification of offenders much difficult, and the problem of territoriality
and jurisdiction. And since the offense is committed purely on line, there is often the
trivialization of the abuse/violence and the difficulty of the local police force to respond/
act on the same.
The proposal of a subjective and contextualized treatment of ICT-related VAW committed
on individual level finds support in the study of online sex offenders. In said study82, it
was shown that not all online offenders commit offenses off-line. It showed that a
substantial number of online offenders do not cross the virtual spaces to commit the same
offenses off-line. This considered, it seems then that while there is a continuum of violence:
seen in the VAW committed by known perpetrators and which cross online spaces; or in
the ICT-related VAW which are committed as against women online, and which are
continuum of the violence directed against women as a consequence of the structural
inequalities in society --- there also exists, simultaneously discontinuities ---- as with the
case of online offenders who remain online offenders. This does not however, discount the
root of the online violence or the ICT-related VAW committed by these purely online
offenders, this does not trivialize the acts of violence by (Howitt 2007) virtue of them being
committed online. This is but a recognition that a pure and sweeping generalization cannot
be made, thus, the contextualized, subjective and case to case approach in these forms of
ICT-related VAW in the individual level.
The need for subjective and contextualized approach will further be explored in the
discussion of ICT and sexuality, where possible questions of consent, of agency, and the
exercise of self-expression and sexual rights come into issue.
d. Institutionalized Victimization: Syndicated ICT-related VAW
In the second categorization, the research wishes to focus the vicious and compounded
nature of ICT-related VAW when the same is conducted in a syndicated manner and for
purposes solely of profit. Here the institutionalized victimization of women for profit is
highlighted. According to a report in 2000, there are more than 40,000 sex-related sites on
the Internet and pornographic sites bring in the most revenues with "Adult materials
accounting for 69% of the $1.4 billion pay-to-view online-content market, far outpacing
video games (4%) and sports (2%)" ( Koerner, US News and World Report)83.
In fact the growth of the Internet has been attributed by some analysts to the immense sex
consumption taking place on the Internet, especially in pornography, sex tourism, and mailorder bride Web sites. Due to the fact that governments, traffickers, and Web sites are
profiting handsomely from these atrocious online activities, there is currently little
regulation and little interest in regulating these activities84. The victimization of women in
82
Sheldon, Kerry and Howit, Dennis, “Sex Offenders and the Internet”, 2007
Cited in Women and Children: Online Hot Ticket Items?
The Sexual Commodification of Women and Children on the Internet
http://www.ed.uiuc.edu/wp/netfiles.uiuc.edu/hadowns/www/sexcommodification.htm
84
supra
83
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 29
Working Paper: Not for Citation or Reproduction
these syndicated forms of ICT-related VAW is then institutionalized and carried out in a
much larger scale with many stakeholders. The continuation of internet pornography and
the trafficking that goes with it, then becomes a question, not only of abuse but of profit and
of economics.
In many countries in Asia, many reports have already been made of child pornography,
cyber dens and cyber sex rings. Child pornography is prevalent, with Japan, Cambodia and
Thailand as the most mentioned countries in reports as producing and facilitating child
pornography85. In Japan, the child porn industry is largely run by organized crime
syndicates. In cases of cyber dens and cyber sex rings, several crackdowns have been
reported in the Philippines. In 2004, for example, the Philippine Police arrested foreigners
and Filipino's and rescued 15 females of a child pornography and cybersex ring in Angeles
City. Another raid in 2005 of a cyber trafficking den in Metro Manila showed that the cyber
sex shop raided by the CIDG had to be earning from P4 million to P10 million a month as it
was a high-end cyber sex shop with clients mostly from the US and Germany86. Just this
2011, raids and arrests in cyber dens all over the coutry were conducted: in Bataan where
38 were detained on January 201187; in Taguig with nine women arrested in April 201188 ;
in Cebu where a Dutch National was arrested in April 201189; and the most recent, the
arrest of 28 persons, including a 17 year old girl in a raid in Cavite last June 27, 2011 90.
These are but few of the recent raids of cyber dens, a statistic directly from the PNP and the
NBI would surely produce a higher number.
It is obvious then that in terms of effect and of gravity, ICT-related VAW committed by
syndicates and for profit are of much graver scale due to the fact that it has
institutionalized the victimization of women. It has reduced the victimization into issues of
profit and income, in terms of economic benefit. It is graver too, because it crosses national
boundaries and is committed in a grander scale, with a number of women and children
exploited and trafficked with impunity. It is this form of ICT-related VAW that absolutely
needs the government’s intervention and immediate action. In this institutionalized
victimization, questions of consent by the women victims of cyber sex dens, as these are
forms of human trafficking under Philippine law, becomes questionable, even unacceptable
under the law --- considering the context and circumstances availing in cyber sex dens: its
organized nature, the number of victims, the economic and sometimes political power of
the perpetrator – which, taken together negate proper consent and valid bargaining or
negotiating power.
85
Sparrow, William. Pedophiles get tech-savvy
http://www.atimes.com/atimes/Southeast_Asia/JG26Ae01.html
86
Internet Porn: untouchable Crime http://www.newsbreak.com.ph/humantrafficking/story-iporn.htm
87
http://newsinfo.inquirer.net/inquirerheadlines/regions/view/20110110-313720/Suspected-cybersex-denraided-38-held
88
http://www.philstar.com/Article.aspx?publicationSubCategoryId=65&articleId=675702
89
http://newsinfo.inquirer.net/breakingnews/regions/view/20110409-330147/Cebu-cybersex-den-raided-Dutchnational-4-Filipinas-charged
90
http://www.philstar.com/nation/article.aspx?publicationSubCategoryId=67&articleId=700138
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 30
Working Paper: Not for Citation or Reproduction
e. VAW or ICT related VAW: Gender based violence all the same
It is once again worth stressing that despite the many forms of ICT-related VAW, the root of
the violence remain the same and could be traced to the previously identified root causes of
violence against women: the historically unequal power relations between women and
men in public and private life, patriarchy, and men’s control over women’s sexuality. Again,
ICT-related VAW, or violence perpetrated through ICTs, are not new in the sense that they
form part of the continuum of violence experienced by women as a consequence of these
unequal power relations and structural inequalities prevalent in society. These forms of
violence fall within the definition provided by DICT-RELATED VAW as “any act of genderbased violence that results in, or is likely to result in, physical, sexual or psychological harm
or suffering to women, including threats of such acts, coercion or arbitrary deprivation of
liberty, whether occurring in public or private life.”
However, as earlier pointed out, it is also to be conceded that by virtue of the use of ICT in
the perpetration of ICT-related VAW, the nature and characteristics of ICT, its borderless
nature and its offer of anonymity make the prosecution of acts of ICT-related VAW largely
problematic. Challenges exist in terms of identifying and defining ICT-related VAW within
national legislations, in clarifying issues of jurisdiction and in terms of affording/providing
protection for women against these forms violence. This is especially so in cases of ICTrelated VAW committed by syndicates and for profit which are more often than not
operating across national borders.
Gurumurhty (2009) attributes the difficulties in pursuing these forms of violence to the
inherent terrain of ICTs where the absence of a global governance framework in relation to
ICT often work to the disadvantage of women and where newer technologies are
themselves used, not only to perpetrate and create more violent forms of pornographic
material, but also to actively circumvent the law91. She also adds that the lack of territorial
jurisdiction over the Internet makes it difficult for countries in the developing world to
identify abusers and prosecute the guilty, she then cites as example the lack of cooperation
from foreign-based websites which hinder the resolution of cyber crime cases.
The Legal Landscape on ICT, VAW and Sexuality
The prevailing policy framework of the existing laws in relation to ICT, VAW and sexuality
are herein presented and has been analyzed from a feminist and developmental lens.
International legal remedies are discussed to depict the legal responses of other states to
ICT-related VAW.
International Legal Responses to ICT-VAW
There are legal remedies available under US law to prosecute cyber harassment of women.
A combination of tort remedies, criminal prosecutions, and civil rights claims to prevent,
91
Gurumurthy (2009)
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 31
Working Paper: Not for Citation or Reproduction
remedy, and punish cyber gender harassment are available under American law and
jurisprudence. The International Convention on Cybercrime is one of Europe’s existing
legal instruments and regional strategies that can aid in combating ICT-facilitated
trafficking in human beings. The Convention seeks to set international standards for the
policing of electronic networks.
Remedies for Cyber Harassment under US Law
According to Citron (2009), under existing tort remedies in the US, targeted individuals
can sue harassers for defamation, intentional infliction of emotional distress, and privacy
intrusions. Cyber attackers can be prosecuted for online threats and harassment.
Moreover, Citron notes that many states criminalize cyber harassment. Some states even
punish posting messages with the intent to urge or incite others to harass a victim. At the
federal level, criminal penalties attach to any use of a telecommunications device without
disclosing one’s identity and with the intent to “abuse, threaten, or harass any person . . .
who receives the communications.”
Still, Citron acknowledges that while traditional criminal and tort remedies play an
important role in combating cyber gender harassment, they cannot reach all of the harm
experienced by individuals, groups, and society when defendants interfere with
individuals’ right to equal treatment. For instance, they do not address the stigma and
economic injuries that individuals experience when they are targeted because of their
gender. Thus, she proposes the use of existing civil rights laws, to compensate for these
shortcomings. She says that targeted individuals can sue attackers under Title VII of the
Civil Rights Act of 1964 for preventing them from making a living because of their sex.
Citron also recognizes that many will oppose a cyber civil rights agenda on the grounds
that it interferes with free speech. However, contrary to this view, she argues that a cyber
civil rights agenda comports with First Amendment doctrine and free-speech values, saying
that all speaking is not protected despite the First Amendment’s guarantee that “Congress
shall make no law . . . abridging freedom of speech.” Torts such as defamation and
intentional infliction of emotional distress, for instance, fall outside the First Amendment’s
protection. Threats similarly do not enjoy First Amendment immunity.
On the other hand, Citron posits that a cyber civil rights agenda comports with prominent
free-speech theories that emphasize the importance of autonomy and the promotion of
truth. Some view free speech as crucial to individual autonomy because it allows people to
author their own narratives. Defeating cyber gender harassment is essential to defending
the expressive autonomy of targeted individuals. Although cyber harassers express
themselves through their assaults, their actions directly implicate their targets’ selfdetermination and ability to participate in political and social discourse. She then asserts
that self-expression should receive little protection if its sole purpose is to extinguish the
self-expression of another.
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 32
Working Paper: Not for Citation or Reproduction
Relevant Legal Instruments in Europe
The move towards creating a convention to address cybertrafficking was was fuelled by the
G8 and by the Council of Europe’s concerns of tackling “cyber crime”. It is considered the
first binding international treaty on cyber crime. It deals, in particular, with offenses
related to copyright violations, computer related fraud, child pornography, and offences
connected with network security. The Convention does not deal explicitly with the
trafficking of human beings for the purposes of sexual exploitation or with pornographic
images of women. However, it does focus on the sexual exploitation of children on the
Internet. Article 9 makes it a criminal offense to not only produce child pornography for
distribution through a computer system but also to offer this kind of pornography, to make
it available, to distribute or transmit it, to procure it or to possess it in a computer system.
The authors consider this Convention as the first step in the development of tools to
combat, control and punish those engaged in the trafficking in human beings.92
Mapping of Relevant Philippine Laws
In the Philippines, there is a general dearth of local references and materials as regards the
question of legal remedies for cases of ICT-related VAW. In general, the law, the
government, has always been reactionary. Prior to the Katrina Halili and Hayden Kho
incident on the sex video, attention has not been directed to the proliferation of cyber
crimes or cyber pornography. It was only in the height of the scandal that Congress has
drummed up the need to pass laws on the matter. And even then, such measures remain
pending and have yet to be passed into law. So what do we really have in combating ICTrelated VAW?
The Magna Carta of Women of 2009 provides the broadest definition of VAW to date.
According to this law, VAW or “violence against women” refers to
any act of gender-based violence that results in, or is likely to result in,
physical, sexual, or psychological harm or suffering to women, including
threats of such acts, coercion, or arbitrary deprivation of liberty, whether
occurring in public or in private life. It shall be understood to encompass,
but not limited to, the following:
(1) Physical, sexual, psychological, and economic violence occurring in
the family, including battering, sexual abuse of female children in the
household, dowry-related violence, marital rape, and other traditional
practices harmful to women, non-spousal violence, and violence
related to exploitation
(2) Physical, sexual, and psychological violence occurring within the
general community, including rape, sexual abuse, sexual harassment,
92
Chawki and Wahab
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 33
Working Paper: Not for Citation or Reproduction
and intimidation at work, in educational institutions and elsewhere,
trafficking in women, and prostitution; and
(3) Physical, sexual, and psychological violence perpetrated or condoned
by the State, wherever it occurs.
It also includes acts of violence against women as defined in Republic Acts
No. (sic) 9208 and 9262.93
On the other hand, the term “information and communication technology (ICT)” has not
been categorically defined in Philippine statutes, but it appears in the Electronic Commerce
Act of 2000 where the State recognizes its vital role in nation building. 94 The Act, for its
own purposes, seems to refer to ICT thus:
“Information and Communication System” refers to a system intended for
and capable of generating, sending, receiving, storing or otherwise
processing electronic data messages or electronic documents and
includes the computer system or other similar device by or in which data
is recorded or stored and any procedures related to the recording or
storage of electronic data message or electronic document.95
“Computer” refers to any device or apparatus which, by electronic,
electromechanical or magnetic impulse, or by other means, is capable of
receiving, recording, transmitting, storing, processing, retrieving, or
producing information, data, figures, symbols or other modes of written
expression according to mathematical and logical rules or of performing
any one or more of those functions.96
93
Section 4(k), Republic Act No. 9710 (The Magna Carta of Women, 2009)
Section 2, Republic Act No. 8792 (Electronic Commerce Act of 2000)
95
Ibid., Section 5.d. Underscoring supplied.
A similar definition is adopted in Section 1(l), Rule 2 of A.M. No. 01-7-01-SC Re: Rules on Electronic Evidence
(August 1, 2001):
94
“Information and Communication System” refers to a system for generating, sending, receiving, storing or
otherwise processing electronic data messages or electronic documents and includes the computer
system or other similar devices by or in which data are recorded or stored and any procedure related to
the recording or storage of electronic data message or electronic document.
96
Ibid., Section 5.c. Underscoring supplied.
A similar definition is adopted in Section 1(d), Rule 2, A.M. No. 01-7-01-SC:
“Computer” refers to any single or interconnected device or apparatus, which, by electronic,
electro-mechanical or magnetic impulse, or by other means with the same function, can receive,
record, transmit, store, process, correlate, analyze, project, retrieve and/or produce
information, data, text, graphics, figures, voice, video, symbols or other modes of expression or
perform any one or more of these functions.
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 34
Working Paper: Not for Citation or Reproduction
The Arroyo government also provided a legal definition of ICT with the issuance of
Executive Order No. 269 creating the Commission on Information and Communications
Technology, which decree mentions the following:
“Information and Communications Technology” (ICT) is defined as the
totality of electronic means to collect, store, process and present
information to end-users in support of their activities. It consists, among
others, of computer systems and consumer electronics, as well as
networked information infrastructure, the components of which include
the telephone system, the Internet, fax machines and computers.97
Given the above definitions, ICT should also include hardware such as cellular phones,
magnetic media98, optical media99, as well as software applications.
In addition, available foreign studies on the subject of ICT in relation to VAW are
instructive. Chawki and Wahab (2004) enumerates various kinds of technology known to
be used for the purpose of sexual exploitation: mainstream communications (cable TV);
scanners and video digitizers (including digital cameras and recorders); the digital video
disk (DVD); Internet applications and services such as Web sites, Peer-to-Peer networks,
file swapping programs, file transfer protocols, search engines, chat rooms (including email and instant messaging).100
Proceeding from the definitions of VAW and ICT above, their apparent or potential nexus or
intersection in Philippine law, is now examined.
Computer crimes or “cybercrimes”, in general, is a 21st century phenomenon, the scope and
boundaries of which are still undefined, especially in the Philippines. While the National
Bureau of Investigation (NBI) already has a Computer Crime Unit (formerly the Anti-Fraud
and Computer Crime Division), criminal prosecution of this type of offenses is sorely
deficient. Whether for lack of policy or lack of capacity, ICT-related crimes, VAW included,
for the most part, remain unpunished.
It has been suggested, however, that existing substantive laws may be flexible enough to be
applied to these modern-day crimes, and that legislative efforts need only be directed
towards adapting procedural and investigative tools to the specificities of new technology.
Indeed, a number of VAW offenses are already defined in or dealt with by present laws,
penal and otherwise. However, the applicability of these laws to ICT-related forms of VAW,
especially the emerging ones, has not been significantly tested. This survey only aims to
97
Section 2(a), Executive Order No. 269 (January 12, 2004)
Section 3(d), Republic Act No. 9239 (Optical Media Act of 2003)
99
Ibid., Section 3(i)
100 Chawki, Judge Mohamed and Dr. Mohamed Wahab, Technology is a Double-Edged Sword: Illegal Human
Trafficking in the Information Age (2004) available at www.DROIT-TIC.fr accessed [date]
98
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 35
Working Paper: Not for Citation or Reproduction
enumerate them, isolate relevant provisions, and surface assess the theoretical potential of
using or invoking them in the prosecution of ICT-related VAW. Specifically, it examines the
following laws:
A. The 1987 Constitution
B. The Magna Carta of Women of 2008 (RA 9710)
C. The Revised Penal Code (Act No. 3815 [1930])
D. Anti-Photo and Video Voyeurism Act of 2009 (RA 9995)
E. Anti-Child Pornography Act of 2009 (RA 9775)
F. Anti-Violence Against Women and Their Children Act of 2004 (RA 9262)
G. Anti-Trafficking in Persons Act of 2003 (RA 9208)
H. Anti-Mail Order Bride Act of 1990 (RA 6955)
I. Anti-Sexual Harassment Act of 1995 (RA 7877)
J. Special Protection of Children Against Child Abuse, Exploitation and
Discrimination Act of 2003 (RA 7610)
K. Electronic Commerce Act of 2000 (RA 8792)
A. The 1987 Constitution
The 1987 Constitution states that the Philippine government “recognizes the role of
women in nation-building, and shall ensure the fundamental equality before the law of
women and men.”101 The State also “values the dignity of every human person and
guarantees full respect for human rights.”102 Consequently, several laws are now in place to
declare and uphold women’s rights; to penalize violations of women’s rights, including
forms of VAW; and to aid the prosecution of these offenses.
On the other hand, the Constitution does not appear to have contemplated ICT per se when
it was drafted. However, it does treat the matters of “communication and information” and
“science and technology,” albeit separately. The State “recognizes the vital role of
communication and information in nation-building,”103 and declares that “science and
technology are essential for national development and progress.”104 Further, the
Constitution says that “the State shall regulate the transfer and promote the adaptation of
technology for the national benefit”105 and “shall give priority to… science and technology,
… to foster patriotism and nationalism, accelerate social progress, and promote total
human liberation and development.”106 These charter provisions may have had some
bearing on the declaration of policy of the Electronic Commerce Act of 2000 where “the
101
Section 14, Article II
Section 11, Article II
103
Section 24, Article II
104
Section 10, Article XIV
105
Section 12, Article XIV
106
Section 17, Article XIV
102
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 36
Working Paper: Not for Citation or Reproduction
State recognizes the vital role of information and communications technology (ICT) in
nation-building.”107
B. The Magna Carta of Women of 2008 (RA 9710)
While it is not a penal law that can be used to prosecute VAW, the Magna Carta of Women
provides a broad definition of VAW (quoted earlier) that may be invoked as a legal basis for
the interpretation of laws on VAW and for the adoption of its definition of VAW in future
legislation penalizing other forms of VAW. The definition is the most extensive one yet, as it
includes only as a subset the acts of VAW defined in the Anti-Trafficking in Persons Act of
2003 and the Anti-VAWC Act of 2004.
Its value as far as ICT-related VAW is concerned lies in the inclusion of alternative forms of
violence, such as psychological violence, whether occurring in the family or in the general
community, in its definition of VAW. With this definition as the standard, any injury,
whether physical or sexual or not, whether committed within the context of a domestic
relationship or not, inflicted on women through or in the Internet or other ICT, may be
accorded legal recognition as actual harm or damage constituting VAW.
Moreover, the addition of “physical, sexual, and psychological violence perpetrated or
condoned by the State, wherever it occurs,” though yet untested, casts a wide net and may
cover other forms of VAW yet unregulated by government, such as ICT-related VAW.
C. The Revised Penal Code (Act No. 3815 [1930])
The Revised Penal Code defines some traditional forms of VAW thus:
Rape is committed when (1) a man has carnal knowledge of a woman (12 years or
over and not demented) under any of the following circumstances: (a) through
force, threat or intimidation; (b) when the offended party is deprived of reason or is
otherwise unconscious; (c) by means of fraudulent machination or grave abuse of
authority; OR (2) when any person, under the same circumstances, commit sexual
assault by inserting penis into another person’s mouth or anal orifice, or any
instrument or object, into the genital or anal orifice of another person108
Acts of lasciviousness are committed upon other persons of either sex under any of
the following circumstances: (1) by using force or intimidation, (2) when the person
is deprived of reason or unconscious, or (3) when the person is under 12 years of
age or is demented.109
107
Id. at FN 2
Article 266-A to 266-D (Article 335, as amended by RA 8353 or the Anti-Rape Law of 1997)
109
Article 336
In jurisprudence (People vs. Bon, G.R. No. 149199, 28 January 2003; People vs. Jalosjos, G.R. Nos. 132876-79, 16
November 2001), the Supreme Court has adopted the definition of “lascivious conduct” in Section 32, Article XIII of
the Implementing Rules and Regulations of RA 7160 in deciding cases of acts of lasciviousness (at least involving
minors), which section reads as follows:
108
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 37
Working Paper: Not for Citation or Reproduction
Corruption of minors refers to promoting or facilitating the prostitution or
corruption of persons under age to satisfy the lust of another.110
White slavery (or white slave trade) means, in any manner or under any pretext,
engaging in the business of or profiting by prostitution or enlisting the services of
any other person for the purpose of prostitution.111
Abduction refers to the taking of a woman, with lewd designs, whether forcible
(against her will)112 or consented (if victim is a virgin over 12 but under 18
years)113.
Seduction is committed against a woman who is single or a widow of good
reputation, over 12 but under 18 years of age, by means of deceit.114
Slavery refers to the purchasing, selling, (kidnapping) or detaining of a human being
for the purpose of enslaving him/her or for the purpose of assigning him/her to
some immoral traffic.115
Prostitution refers to the case where a woman habitually indulges in sexual
intercourse or lascivious conduct for money or profit.116 *However, the Revised
Penal Code actually punishes the victim instead of the perpetrator of this form of
VAW.
Pornography is penalized as “Obscene Publications & Exhibitions and Indecent
Shows,” and is committed by those who, in theaters, fairs, cinematographs, or any
other place, exhibit indecent or immoral plays, acts or shows, it being understood
that the obscene literature or indecent or immoral plays, scenes, acts or shows,
whether live or in film, which are proscribed by virtue hereof, shall include those
which: (1) glorify criminals or condone crimes; (2) serve no other purpose but to
(T)he intentional touching, either directly or through clothing, of the genitalia, anus, groin,
breast, inner thigh or buttocks; or the introduction of any object into the genitalia, anus or
mouth of any person, whether of the same or opposite sex, with an intent to abuse, humiliate,
harass, degrade, or arouse or gratify the sexual desire of any person; bestiality, masturbation,
lascivious exhibition of the genitals or pubic area of a person.
Ret. J. Florenz D. Regalado, in his book Criminal Law Conspectus (2003 ed.) observes that this expanded definition
does not limit the offender’s motivation to lewdness or eroticism but also considers as lascivious conduct the acts
mentioned therein even if the intent was to abuse, humiliate, harass or degrade the victim as long as he or she is
an exploited or sexually abused child below 12 years of age. (p. 644)
110
Article 340
Article 341
112
Article 342
113
Article 343
114
Article 338
115
Article 272
116
Article 202
111
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 38
Working Paper: Not for Citation or Reproduction
satisfy the market for violence, lust or pornography; (3) offend any race or religion;
(4) tend to abet traffic in and use of prohibited drugs; and (5) are contrary to law,
public order, morals, good customs, established policies, lawful orders, decrees and
edicts.117
These traditional forms of VAW may and have certainly come in contact with ICT, some
more than the others. As previously conveyed, technology has made available alternative,
more efficient ways to access information about and communicate with people, thereby
facilitating a wide range of human interactions, including the perpetration of crimes.
The general intersection is when ICT is used as an indispensable means or mode of
committing these crimes, as when some (or all, in the case of pornography) of the elements
of each offense are produced or brought about with the use of ICT.
The parts underlined in the definitions above point to elements of the offenses that may be
realized or accomplished by using ICT.
Conceivably, rape and acts of lasciviousness can now result from threat or intimidation or
deceit effected through mobile communication or the Internet. Transactions, commercial
and otherwise, legal and otherwise, such as sale and purchase of goods and services, can
now be entered into online. Lewd design and lasciviousness can be expressed
electronically.
It can be said, therefore, that in the sense and to the extent stated above, the Revised Penal
Code may still apply in the prosecution of ICT-related VAW within the framework of its
existing definitions of offenses constituting VAW.
The question of procedure and evidence, however, is addressed by other laws and rules.
D. Anti-Photo and Video Voyeurism Act of 2009 (RA 9995)
The Anti-Photo and Video Voyeurism Act expressly recognizes ICT such as VCD/DVD,
Internet, cellular phones and similar means or devices, as integral to the commission of the
crime of photo and video voyeurism. This crime is committed by (1) taking photo or video
coverage of a person or persons performing sexual acts or similar activities or capturing
the image of the (naked or undergarment-clad) private area of the person/s; (2) selling,
copying, reproducing, broadcasting, sharing, showing, or exhibiting such coverage or
recording.
The application of the law is limited to cases (1) where the woman did not consent to the
photo or video coverage and she had a reasonable expectation of privacy during the
recording, and (2) where she consented to the recording but did not consent in writing to
the selling, copying, etc. of the same.
117
Article 201.2(b)
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 39
Working Paper: Not for Citation or Reproduction
The law does not apply to cases where the woman did not consent to the recording but the
recording occurred under circumstances which can be deemed as situations where she
could not have had reasonable expectation of privacy. Such circumstances is defined as
those where the woman would “believe that (he/)she could disrobe in privacy without
being concerned that an image or a private area of the person was being captured,” or
where “a reasonable person would believe that a private area of the person would not be
visible to the public, regardless of whether that person is in a public or private place.”
E. Anti-Child Pornography Act of 2009 (RA 9775)
The Anti-Child Pornography Act extensively recognizes the role of ICT in the production,
advertising and promotion, sale and distribution, purchase and access (even for personal
use) of pornographic materials, albeit only where the pornography involves children, and
punishes those responsible for these acts.
For one, the law considers as a child a “computer-generated, digitally or manually crafted
images or graphics of a person who is represented or who is made to appear to be a child”
[Section 3(a)(2)]. The age of the person is immaterial, so long as he/she is presented,
depicted or believed to be a child as defined by the law [Section 3(a)(1)].
The law penalizes as child pornography “any public or private representation, by whatever
means, of a child engaged in real or simulated explicit sexual activities or any representation
of the sexual parts of a child for primarily sexual purposes [Section 3(b)]. Child
pornography materials may be in the form of visual depiction, audio representation
(including real-time internet communications), or written text [Section 3(c)].
It also penalizes the act of luring and grooming a child. Luring refers to communicating, by
means of a computer system, with a child or someone who the offender believes to be a
child for the purpose of facilitating the commission of a sexual activity or production of
child pornography [Section 3(i)]. Grooming refers to preparing a child or someone who the
offender believes to be a child for a sexual activity or sexual relationship by communicating
child pornography, including online enticement or enticement through any other means
[Section 3(j)].
As far as VAW is concerned, the law amply protects female minors or girl children and
adult women who are “unable to fully take care of themselves or protect themselves from
abuse, neglect, cruelty, exploitation or discrimination because of a physical or mental
disability or condition,” who are included in its definition of “children” [Section 3(a)].
F. Anti-Violence Against Women and Their Children Act of 2004 (RA 9262)
The Anti-VAWC Act succeeds in providing, in a penal law, a broad definition of VAW
[Section 3(a)] which includes alternative forms of violence such as psychological violence
(“acts causing or likely to cause mental or emotional suffering of the victim”) and other
forms of sexual violence like “treating a woman or her child as a sex object” and “making
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 40
Working Paper: Not for Citation or Reproduction
demeaning and sexually suggestive remarks”. In doing so, the law may cover the kind of
violence that can be perpetrated in cyberspace, which is generally non-physical.
However, despite this broad definition, RA 9262 seems to abandon the same by
pronouncing that the crime of VAWC is committed through any of nine (9) listed acts
[Section 5] stated without using the terms it earlier defines such as sexual violence,
psychological violence, and economic abuse, and without completely reproducing the
definitions of these terms in the list of prohibited acts. Nevertheless, the acts as stated still
include forms of VAW that are non-physical and that may be committed with the use of ICT.
Still, the use of RA 9262 is limited to VAW committed by any person against “a woman who
is his wife, former wife, or against a woman with whom the person has or had a sexual or
dating relationship, or with whom he has a common child”. This requirement discounts the
law’s applicability to cases where the VAW is committed by/against strangers or even
by/against family members with whom there is no dating or sexual relationship.
R.A. 9262 has, in fact, already been invoked to prosecute cases of VAW perpetrated through
the use of ICT.
One of these cases is the “sex video scandal” or controversial sex video of Dr. Hayden Kho
and actress Katrina Halili mentioned earlier in this review as being cited in Soto (2010).
Upon the complaint of Halili, the Department of Justice filed a case of VAW under Section
5(h) of R.A. 9262 against Kho before the Pasig Regional Trial Court in December 2009, after
the sex video circulated on the Internet. Halili alleged that Kho committed VAW against her
by recording the sex video without her knowledge and consent, which conduct alarmed or
caused her substantial emotional or psychological distress.
A year after, in December 2010, the trial court dismissed the case on the ground of
insufficiency of evidence. In his decision, the judge pointed out that Halili’s admission
during the Senate hearing that she consented to the taking by the accused of three prior
video recordings showing her and the accused together performing salacious acts (not
sexual intercourse) “clearly indicates that she agreed to the taking, or at the very least
knew, of the subject sex video recording.” The judge also noted that, based on an ocular
inspection of the hotel room where the act was committed, the camera used in video
recording must have been placed in an open and unconcealed place such that the recording
could not have been done without Halili knowing it. Further, the judge said that Kho’s mere
taking of the sex video even without Halili’s knowledge and consent is not yet a violation of
R.A. 9262. He said that it becomes so when the said act “alarms or causes substantial
emotional or psychological distress to the woman”. Having found that Halili knew and
consented to the video recording, the decision said that what caused the emotional and
psychological distress of Halili was the uploading and circulation of the sex video. However,
to date, the National Bureau of Investigation has not yet established who uploaded the sex
video.118
118
Information about the dismissal of the case was taken from an online news article at
http://www.philstar.com/Article.aspx?articleId=639344&publicationSubCategoryId accessed on 31 March 2011.
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 41
Working Paper: Not for Citation or Reproduction
As previously mentioned, this case brought about a Senate hearing in aid of legislation
aired publicly in May 2009, which later spawned the Anti-Photo and Video Voyeurism Act
of 2009 (R.A. 9995) also discussed earlier in this review.
In an earlier albeit less controversial case of ICT-related VAW119, the Supreme Court
affirmed the conviction of a man found guilty by the Regional Trial Court of Baler, Aurora of
committing VAW under the same Section 5(h) of R.A. 9262. The criminal act consisted of
the man sending his former girlfriend, through the use of multimedia message service
(MMS), a morphed image wherein her head was attached to a pornographic photo of a
naked woman. The man also sent text messages threatening to spread the obscene photo in
the Internet and to manufacture more of the same. The man was arrested through an
entrapment operation, so he was forced to admit ownership of the cellular phone number
and to sending the malicious messages; although he reasoned out that he just received the
messages from an unidentified person who was harassing his ex-girlfriend and he merely
forwarded the same to her. Fortunately, the trial court found the woman’s testimony
credible; hence the conviction.
In this case, the Supreme Court, in affirming the conviction, confirmed that the act of the
accused caused the woman substantial psychological and emotional distress, thereby
recognizing, in effect, the harm caused by an ICT-facilitated act of VAW. The Court said:
Secondly, the Court cannot measure the trauma that Irish
experienced based on Rustan’s low regard for the alleged moral
sensibilities of today’s youth. What is obscene and injurious to an
offended woman can of course only be determined based on the
circumstances of each case. Here, the naked woman on the picture, her
legs spread open and bearing Irish’s head and face, was clearly an
obscene picture and, to Irish a revolting and offensive one. Surely, any
woman like Irish, who is not in the pornography trade, would be
scandalized and pained if she sees herself in such a picture. What makes
it further terrifying is that, as Irish testified, Rustan sent the picture with a
threat to post it in the internet for all to see. That must have given her a
nightmare.120
However, the decision confirmed the lack of evidentiary rules specifically for criminal cases
involving electronic evidence, when the Court noted that the Rules on Electronic Evidence
(A.M. 01-7-01-SC) does not apply to criminal actions such as the Ang case.
Still, the Ang decision is favorable to the woman and is a positive albeit limited precedent.
Unfortunately, the circumstances in the Halili case were different: The sex video had been
circulated; the person who caused such circulation remained unknown; and the trial court
did not believe Halili’s testimony that she did not consent to the video recording done by
119
120
Rustan Ang vs. Court of Appeals and Irish Sagud, G.R. No. 182835 (April 20, 2010)
Ibid.
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 42
Working Paper: Not for Citation or Reproduction
Kho. The Halili case was not elevated to the higher courts after the dismissal.
G. Anti-Trafficking in Persons Act of 2003 (RA 9208)
The Anti-Trafficking in Persons Act may be the most promising tool for prosecuting ICTrelated cases of VAW, as it penalizes syndicated, profit-driven trafficking in women for
sexual exploitation (which includes prostitution and production of pornographic
materials), which is arguably the most prevalent or notorious ICT-related VAW at present.
Barring procedural difficulties, it can be argued that what has come to be known as cybertrafficking or the operation of cybersex dens is covered by this law.
At the onset, it is worthwhile to note that RA 9208 seems to have modified and cured the
defective definition of prostitution in the Revised Penal Code where women engaged in
prostitution are punished instead of protected. Under RA 9208, the prostitute as trafficked
person is recognized as a victim of trafficking and is not penalized regardless of whether or
not he/she consented to the exploitation [Section 17]. Thus, prostituted women should no
longer be charged and prosecuted against beginning in 2003.
Of special note, too, is the inclusion of “taking advantage of the vulnerability of the person”
as one of the means by which trafficking is committed. This addition may be relevant in
dealing with reasons other than force, coercion, etc. that drive women into prostitution or
pornography. These other reasons may go into the deeper socio-economic conditions that
compel women to “consent” to these activities.121
RA 9208 defines trafficking in persons as “the recruitment, transportation, transfer or
harboring, or receipt of persons with or without the victim’s consent or knowledge, within
or across national borders by means of threat or use of force, or other forms of coercion,
abduction, fraud, deception, abuse of power or of position, taking advantage of the
vulnerability of the person, or, the giving or receiving of payments or benefits to achieve
the consent of a person having control over another person for the purpose of exploitation
which includes at a minimum, the exploitation or the prostitution of others or other forms
of sexual exploitation, forced labor or services, slavery, servitude or the removal or sale of
organs” [Section 3(a). Underscoring supplied.].
Sexual exploitation includes prostitution and the production of pornographic materials
[Section 3(f)]. Prostitution is “any act, transaction, scheme or design involving the use of a
person by another, for sexual intercourse or lascivious conduct in exchange for money,
profit or any other consideration” [Section 3(c). Underscoring supplied]. Pornography
refers to “any representation, through publication, exhibition, cinematography, indecent
shows, information technology, or by whatever means, of a person engaged in real or
simulated explicit sexual activities or any representation of the sexual parts of a person for
primarily sexual purposes [Section 3(h). Underscoring supplied.].
121
Chawki & Wahab counts economic, educational, and social conditions as among the major reasons that
facilitate trafficking. It notes that source countries are mainly low-income, developing and underdeveloped States,
rendering human trafficking a manifestation of a larger development divide.
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 43
Working Paper: Not for Citation or Reproduction
Elements of the crime of trafficking can be and are done with the use of ICT, particularly
through the Internet. With the way its definition is worded, even if only recruitment or
harboring is done (presumably online or in cybersex dens), without transportation or
transfer of persons, trafficking is already committed. This interpretation is based on the use
of “or “ instead of “and” in the statute, indicating that the crime is consummated even if
only one of the series of acts is committed.
The law also expressly recognizes the use of information technology and the Internet in
some of the other acts it penalizes, such as pornography [Section 3(h)] and advertising to
promote trafficking in persons [Section5(c)]. Furthermore, one of the functions of the InterAgency Council Against Trafficking established under the law is to coordinate with the
Department of Transportation and Communications (DOTC), Department of Trade and
Industry (DTI), and other NGOs in monitoring the promotion of advertisement of
trafficking in the Internet.
H. Anti-Mail Order Bride Act of 1990 (RA 6955)
The Anti-Mail Order Bride Act mainly penalizes the acts of establishing or carrying on a
business the purpose of which is the matching of Filipino women for marriage to foreign
nationals either on a mail-order basis or through personal introduction, and of advertising
the same.
RA 6955 is mentioned in the Anti-Trafficking in Persons Act (RA 9208) which recognizes
and considers the matching of any person for marriage for the specific purpose of
prostitution, pornography, sexual exploitation, etc., as an act of trafficking in persons.
It may be said that RA 6955 criminalizes the business of matching Filipino women to foreign
nationals, whether the resulting marriage is legitimate or it turns out to be a mere front for
trafficking. On the other hand, RA 9208 punishes the matching of any person for marriage
when it is done specifically for the purpose of trafficking as defined therein.
RA 6955 does not mention any ICT as a means of carrying on the business of matching, as it
particularly states only “mail-order basis” and “personal introduction.” However, it does
penalize the manager of “television or radio station, or other media” for knowingly allowing
or consenting to the acts prohibited by the law. Also, the prosecutor or the court may
construe business and advertising, or mail to include its contemporary forms, that is, ecommerce and e-mail, so as to come within the purview of the law.
I. Anti-Sexual Harassment Act of 1995 (RA 7877)
The Anti-Sexual Harassment Act mandates heads of offices to issue rules and regulations
governing sexual harassment within their respective jurisdictions. The Civil Service
Commission (CSC) Administrative Disciplinary Rules on Sexual Harassment Cases (CSC
Resolution No. 01-0940) recognizes the commission of sexual harassment through some
ICT-related means such as texting and e-mail.
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 44
Working Paper: Not for Citation or Reproduction
Section of 53.C of the Rules defines and penalizes as an act of sexual harassment “telling
sexist/smutty jokes or sending these through text, electronic mail or other similar means,
causing embarrassment or offense and carried out after the offender has been advised that
they are offensive or embarrassing or, even without such advise, when they are by their
nature clearly embarrassing, offensive or vulgar” and other analogous cases.
J. Special Protection of Children Against Child Abuse, Exploitation and
Discrimination Act of 2003 (RA 7610)
The Special Protection of Children Against Child Abuse, Exploitation and Discrimination Act
penalizes different forms of child abuse, namely (1) child prostitution and other sexual
abuse; (2) child trafficking; (3) obscene publications and indecent shows; (4) and other
acts of abuse, neglect, cruelty, exploitation, and other conditions prejudicial to the child’s
development.
Each of these forms of child abuse involve elements that may be realized through ICT.
Like the Anti-Child Pornography Act, this law amply protects female minors or girl children
and adult women who are “unable to fully take care of themselves or protect themselves
from abuse, neglect, cruelty, exploitation or discrimination because of a physical or mental
disability or condition,” who are included in its definition of “children” [Section 3(a)].
K. Electronic Commerce Act of 2000 (RA 8792)
The e-Commerce Act is the first ever law on ICT in the Philippines (and the third in
Southeast Asia). Its stated objective is “to facilitate domestic and international dealings,
transactions, arrangements, agreements, contracts and exchanges and storage of
information through the utilization of electronic, optical and similar medium, mode,
instrumentality and technology, to recognize the authenticity and reliability of electronic
documents related to such activities, and to promote the universal use of electronic
transaction in the government and general public.”122
It provides for the recognition and use of electronic commercial and non-commercial
transactions and provides penalties for the unlawful use thereof.
It gives validity and legal recognition to electronic documents, electronic signatures and
electronic transactions. Second, it facilitates the admission of electronic documents and
electronic signature as evidence in cases of disputes. Third, it penalizes unauthorized
access to information and interference in communications systems (i.e., hacking,
introduction of viruses and the like).
122
Section 3, RA 8792
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 45
Working Paper: Not for Citation or Reproduction
The law is useful in the prosecution of ICT-related VAW in matters concerning evidence, as
it gives legal effect or validity to electronic documents that constitute proof in ICT-related
VAW cases.
Local Ordinances
It may also be worthwhile to look into relevant local legislation or ordinances passed (and
executive orders issued) by local governments, to have an idea about the extent of
regulation of ICT-related VAW at the local level as well as the efficacy of using this front in
combating ICT-related VAW.
Two highly-urbanized cities, Quezon City and Davao City, have passed an ordinance (with
implementing rules and regulations [IRR]) that provides for a women or gender and
development code for the city. Davao City has had City Ordinance No. 5004 (The Women
Development Code of Davao City) since 1997. On the other hand, Quezon City passed its
Ordinance No. SP-1401, S‐2004 (An Ordinance Providing for a City Gender and
Development Code and For Other Purposes), largely patterned after the Davao City
ordinance, in 2004.
The two local laws are almost identical, even as to their voluminousness, both having over
70 pages of ordinance with IRR. They both define women’s rights based on the UN
Convention on the Elimination of all forms of Discrimination Against Women (CEDAW),
recognize VAW as a development concern, define VAW in accordance with the UN
Declaration on the Elimination of Violence Against Women (DICT-RELATED VAW), and
accordingly provide for mechanisms to empower women and promote and respect
women’s rights (e.g. support for women-survivors of violence).
As regards ICT-related VAW, the 1997 Davao City Code remarkably already recognized
“cyberspace” and “satellite TV” as means through which acts of trafficking in women, as
defined therein, may be committed. The Quezon City Code does the same, since it is
evidently modeled after the Davao City Code. Some forms of ICT-related VAW like the
operation of cybersex dens may come within the definition of “entertainment
establishments” which are subject of regular mandatory surveillance under both
ordinances.
Still, as far as criminalizing, prosecuting, and penalizing VAW (ICT-related or otherwise) is
concerned, the ordinances generally refer back to the Revised Penal Code and other penal
statutes. The recourse to national law is truer for the QC ordinance and its IRR, which
became effective after the Anti-VAWC Act of 2004 (RA 9262) and the Anti-Trafficking in
Persons Act of 2003 (RA 9208) were passed.123 Consequently, the ordinances do not
provide penalties for ICT-related VAW, particularly trafficking in women as defined therein,
except meting out the maximum fine and imprisonment that the local government can
impose as well as cancellation of business permit against establishments that operate as
conduit for sex tours.
123
The Davao City ordinance has most probably been deemed amended by these and other later laws as well.
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 46
Working Paper: Not for Citation or Reproduction
The resort to national criminal statutes is understandable, if not necessary or inevitable,
because the definition of felonies is largely the province of the State acting through
Congress. In fact, the Local Government Code124 limits the power of the Sangguniang
Panlungsod or City Council to approve punitive ordinances only to those imposing a fine not
exceeding P5000.00 or imprisonment for a period not exceeding one (1) year, or both in the
discretion of the court, for its violation. Also, ordinances can be implemented and enforced
only within the territorial jurisdiction of the local government unit concerned. Moreover,
local governments cannot contravene national laws in the exercise of their legislative
powers.
On the whole, local legislation as a venue for policy advocacy on ICT-VAW may be useful
only insofar as being a strategy to bring the implementation of national laws and programs
to combat ICT-related VAW to the local level.
There is as yet no available record regarding the enforcement of the penal provisions as to
VAW of the two ordinances.
Challenges and Gaps in the Existing Laws
As shown in the foregoing mapping of relevant Philippine laws, while it has been suggested
that some of these laws may be theoretically flexible enough to be applied to cases of ICTrelated VAW, the applicability of these laws has not been significantly tested. The general
notion, however, is that ICT-related VAW cannot as yet be effectively prosecuted, whether
due to lack of policy, lack of capacity, or the sheer impenetrability of new ICT. Nonetheless,
even if new criminal statutes need not be passed, there is still a clear need for legislative
efforts towards adapting procedural and investigative tools to the specificities of new
technology, which can include the issuance of rules or the institution of capacity-building
programs.
a. General Issues on Prosecution
The existence of the laws discussed above does not guarantee the prosecution of ICTrelated VAW. As generally recognized in available legal studies on the subject, the difficulty
in prosecuting ICT-related VAW largely lies in applying existing norms to a technology that
did not exist at the time the laws were drafted, which translates to an absence of specific
suitable policies, in turn requiring appropriate legislative action and policy advocacy. The
same is true for the Philippines.
While there is a definition of VAW in Philippine law, the same is not exactly true for ICTrelated VAW and its many different forms. Here begin the problems in prosecuting cases.
The major problems for prosecution include questions so basic as ascertaining the identity
of the offender; identifying the place of the commission of the offense, which is, in turn, a
124
Section 458(1)(iii)
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 47
Working Paper: Not for Citation or Reproduction
determinant of jurisdiction; and defining and proving the injury caused (question of
evidence). If these problems are not addressed, there is practically no prosecution to speak
of.
For instance, one of the known advantages of the Internet for criminals is the anonymity it
affords them. One can freely assume multiple false identities in cyberspace since there is as
yet no foolproof way of tracing a digital or cyber act to a real person.
In addition, to illustrate the problem of identifying the place of commission of the offense in
ICT-related cases: In a recent Philippine Supreme Court decision involving a criminal
charge of “Internet libel”125, the Court dismissed the case for failure to establish the
jurisdiction of the Makati regional trial court to hear the case. It held:
Venue is jurisdictional in criminal actions such that the place
where the crime was committed determines not only the venue of the
action but constitutes an essential element of jurisdiction. This principle
acquires even greater import in libel cases, given that Article 360, as amended,
specifically provides for the possible venues for the institution of the criminal
and civil aspects of such cases.
xxxx
If the circumstances as to where the libel was printed and first
published are used by the offended party as basis for the venue in the criminal
action, the Information must allege with particularity where the defamatory
article was printed and first published, as evidenced or supported by, for
instance, the address of their editorial or business offices in the case of
newspapers, magazines or serial publications. This pre-condition becomes
necessary in order to forestall any inclination to harass.
The same measure cannot be reasonably expected when it
pertains to defamatory material appearing on a website on the internet
as there would be no way of determining the situs of its printing and first
publication. To credit Gimenez’s premise of equating his first access to the
defamatory article on petitioners’ website in Makati with “printing and first
publication” would spawn the very ills that the amendment to Article 360 of
the RPC sought to discourage and prevent. It hardly requires much imagination
to see the chaos that would ensue in situations where the website’s author or
writer, a blogger or anyone who posts messages therein could be sued for libel
anywhere in the Philippines that the private complainant may have allegedly
accessed the offending website.
125
Bonifacio, et al. vs. Regional Trial Court of Makati, Branch 149, and Jessie John P. Gimenez, G.R. No.
184800 (May 5, 2010). Emphases (except underscoring) supplied.
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 48
Working Paper: Not for Citation or Reproduction
For the Court to hold that the Amended Information sufficiently
vested jurisdiction in the courts of Makati simply because the defamatory
article was accessed therein would open the floodgates to the libel suit being
filed in all other locations where the pepcoalition website is likewise accessed
or capable of being accessed.
It really does not take much to realize how the intangible instantaneous communication
that occurs in cyberspace, even transcending national boundaries, can go unregulated.
Thus, prosecuting offenses committed here is obviously very difficult.
b. Privacy Rights
Even assuming that the prosecution of ICT-related offenses is effective, the problem of
women’s rights vis-à-vis ICT is not entirely resolved. The crimino-legal approach to ICTrelated VAW generally looks at ICT as a site of women’s oppression and does not consider
it a space for women’s empowerment. This dual nature of ICT is a fact, and a wholistic legal
approach should regard both: Women’s rights in relation to ICT should be both protected
from harm and promoted to enable women’s fullest exercise of their agency.
If the State considers cyberspace as public space subject to government regulation, the law
should also recognize and safeguard certain activities in cyberspace as an exercise of
protected freedoms or as occurring within protected zones of privacy, and see to it that the
prosecutorial arm does not unduly restrict this exercise.
c. Need for Prevention
The range of responses to ICT-related VAW discussed in available references does go
beyond prosecution to include preventive as well as self-help measures. Often, these
measures involve the use of ICT itself to combat ICT-related violence.
Chawki and Wahab (2004) opines that understanding what human trafficking is and how it
can be committed should be coupled with law enforcement officers’ awareness of the
tactics that are commonly used to combat this crime. Preventive measures should first aim
at effectively monitoring the Internet, introducing codes of good practice, filtering systems,
etc. For some researchers, proposals for a [European] network of hotlines, filtering and
rating systems, self-regulation, codes of conduct, encouraging awareness actions and
assessing legal implications will reduce victim abuse. However, such policy will unlikely
stop predators on the Internet. On such a basis, it is submitted that combating trafficking
requires the implementation of both short and long term measures.
In the short term, one possible measure is to seize and confiscate the benefits from
trafficking for the purpose of sexual exploitation. In the long term and in general, human
trafficking should be subject to a global principle of public policy that aims at combating
and preventing this form of organized crime through raising global awareness and
increasing literacy rates, promoting economic development, improving social conditions in
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 49
Working Paper: Not for Citation or Reproduction
least developed source and transit countries, coordinating legislative efforts on national,
regional and global levels, and establishing a high level global network of cooperation
between national, regional, and international enforcement agencies and police forces.
Specifically, they recommend:
␣ The human rights of trafficked persons must be the center of all efforts to
combat trafficking. These human rights must be protected at all stages of the
trafficking spectrum. In combating trafficking through law enforcement, it is
important not to criminalize trafficked persons, but instead to address their
special concerns while being diligent to hold perpetrators accountable.
␣ Combating trafficking in human beings requires rights based approach
supported by the State’s criminal justice system. This approach will be
multidisciplinary incorporating a criminal justice response to prevent crime and
deter offenders and a human rights response to protect and defend the rights
and integrity of the trafficked persons.
␣ The Recommended Principals and Guidelines provide that States should
ensure that legislation prevents trafficked persons from being prosecuted,
detained or punished for the illegality of their entry or residence or for the
activities they are involved in as a directed consequence of their situation as
trafficked persons.
␣ An effective law enforcement response requires national legislation policy,
procedures and practices to be harmonized with international norms and
standards and incorporated in national plans and programmes. National plans of
actions should be used to build links and partnerships between governmental
institutions involved in combating trafficking and/or assisting trafficked persons
and relevant sectors of civil society.
␣ States should ensure that measures against trafficking don’t have an adverse
impact on the rights and dignity of those who have been trafficked.
␣ Finally, an effective law enforcement response requires enforcement of the
law, as the best law is irrelevant if it is not put into use.
In the 2011 Trafficking in Persons Report126 released by the United States Department of
State, new and social media platforms, whether issue-specific media or far-reaching
platforms such as Facebook and Twitter, were mentioned as powerful tools for the antitrafficking movement. The Report cited recent events in the Middle East and North Africa,
where these media have empowered grassroots activists with an unprecedented means to
disseminate information about and foster popular movements against modern slavery. It
named as an example websites such as www.change.org, which launches petitions and
126 http://www.state.gov/documents/organization/164452.pdf
accessed 28 June 2011. See page 35.
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 50
Working Paper: Not for Citation or Reproduction
shares news and information to draw attention to human trafficking issues. The Report
thus noted the ability of new media to serve as tools for raising awareness, sharing best
practices, and demanding government action. Nonetheless, it said that in order for the antitrafficking movement to realize the full potential of new media, these media should not just
be a tool for NGOs and civil society to disseminate information; they should also be a
resource for helping governments strengthen their anti-trafficking efforts. For instance,
using a global network to share training materials, intelligence, and success stories may
enhance government efforts in capacity building for law enforcement and criminal justice
systems. New media can also serve to track modern slavery as it crosses borders, helping
countries work together with shared information so that anti-trafficking efforts are not
isolated as individual domestic concerns.
Analysis on the Prevailing Legal Framework: Reactionary, Protectionist and
Ineffective
The mapping of laws revealed that the laws are often reactionary and protectionist in
approach. This is found to be limiting in promoting women’s empowerment and looking at
women as active agents exercising their right to self-expression and sexuality. This reflects
the sexist and patriarchal legal culture and the lack of gender responsiveness in the legal
system which fails to take into account the substantive equality of women, particularly on
issues on ICT, VAW and sexuality. The compounded complexity of ICT-related VAW
challenges the existing and limited legal responses of the State.
In terms of substantive protection against ICT-related VAW, the country, among others
have the Anti-Photo and Video Voyeurism Law, the Anti- VAWC Law, the Anti-Trafficking
Law, the Anti-Child Abuse, Anti-Child Pornography laws, and also the provisions of the
Revised Penal Code. For the taking, uploading or copying by any person of sexual acts or
similar activities, resort may be had with the Anti-Photo and Video Voyeurism Law. For
ICT-related VAW committed by men/women with whom the woman has had previous
dating relationship, remedy may be found under the Anti VAWC Law; for trafficking
through internet pornography, there is the Anti-trafficking law, while the two laws on
children may be invoked in cases of child pornography. The question however is not only
on the existence of laws, although the same, for purposes of legislative advocacy is a valid
question, but on how effectively these laws are being implemented in order to afford
remedies for women victims of ICT-related VAW.
As previously discussed, ICT-related VAW on the individual level may be committed by
acquaintances or by complete strangers. In the former, it is possible to identify the
perpetrator --- thus the dating relationship requirement under the Anti-VAWC law may be
proved and the law may be used. However, in cases of complete strangers who commit
cyberstalking or harassment, RA 9262 may be difficult to use as it would be difficult if not
impossible to establish the previous dating relationship required under the Anti-VAWC
law. Additionally, there is also the very practical problem of establishing the identity and
the location of the perpetrator, which also makes the use of the Anti-Voyeurism Law
difficult.
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 51
Working Paper: Not for Citation or Reproduction
In cases of syndicated ICT-related VAW, prosecution under the Anti-Trafficking law under
the clause “hiring, maintaining, and harboring women for sexual exploitation for purposes
of Internet pornography” has been resorted to by law enforcement officers, however,
difficulty has been expressed with regard the successful prosecution of the cases and of the
‘weakness’ of cyber trafficking as a case. For one, law enforcement officers have expressed
that the women they have rescued from trafficking were often complicit to the act such that
even if consent of the woman is not a bar for the prosecution of the offense, and even if an
affidavit of desistance by the women is not given any weight, the lack of cooperation from
the victim adversely affects the prosecution of cases.
In instances where the perpetrators/the syndicate are located outside of the country,
prosecution becomes even more difficult if not impossible. Here the problem of jurisdiction
comes in. This is further compounded by the fact that social network sites like facebook,
yahoo and youtube, which may be used in the commission of ICT-related VAW are based
outside of the country. Though the request to take down content may be favourably acted
upon by these sites upon proper request, the specific request for information for purposes
of prosecution would not be available as the same would already run counter against
privacy rights. And in most instances, request for private content from such sites may be
made available only through orders issued by courts with jurisdiction over these social
networking sites.
With the foregoing, these questions are worth asking: one, whether we have sufficient laws
or not to address ICT-related VAW and the other, on how effectively existing laws are being
implemented. There is, too , the more practical consideration: what women may do in the
face of ICT-Related VAW. This does not always mean the filing of criminal cases in court,
for as previously seen, this may not be the best way to proceed considering problems of
identity, location, jurisdiction or the basic implementation of existing laws. On the
individual level of ICT-Related VAW, it could mean the most basic and immediate concerns:
how to stop the abuse/violence from happening, how to take down content and how to
prevent the same from further spreading. In cases of syndicated ICT-related VAW, it could
mean, the rescue of women victims and the provision of immediate support services. Of
course, court action and prosecution are valid courses of action, only that they should not
be the only courses of action, especially so, when in our country court actions take decades
or more to reach its resolution and especially so when the evidence in ICT-related VAW are
often electronic requiring expertise for access and subsequent presentation in courts of
law.
Lastly, in this section too, it is worth mentioning that the law, in being reactionary and
focusing solely on criminalization run the risk of later trampling on the rights regime.
Instead then of calling for the passage of more laws on, say, cyber trafficking or cyber
prostitution, this research calls for a carefully studied approach on the matter as to avoid
going into or trampling individual rights to privacy and self expression.
To make a point, the Anti-trafficking law, though existent and used by law enforcement
officers in pursuing traffickers have not been effective in convicting as many traffickers as
apprehended. The existence of the article on vagrancy in the Revised Penal Code which
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 52
Working Paper: Not for Citation or Reproduction
criminalizes prostitution has been used by traffickers to gain a leverage as against women
victims of trafficking. Instead then of pursuing cases of trafficking, women cower, for fear of
retaliatory charges.
Second point, the country’s anti-child pornography law punishes mere possession of
materials considered by the law as constituting child pornography. This has been criticized
for its sweeping definition and lack of safety measures as it can penalize what may
otherwise have been legitimate acts. This is not to say that we should not have child
pornography laws, but that legislations, before adopted and enacted must be carefully
studied in all its aspects, so as not to fall into mere criminalization and protectionism, to the
detriment of other protected rights and freedoms.
To further expound on the matter, it is pertinent to cite the recently passed internet use
regulation in India. In said law, the government requires that any comment considered
objectionable be removed by the host site within 36 hours after receiving complaint. The
regulation’s definition of what should be taken down includes anything which is - "grossly
harmful, harassing, blasphemous defamatory, obscene, pornographic, paedophilic,
libellous, invasive of another's privacy, hateful, or racially, ethnically objectionable,
disparaging, relating or encouraging money laundering or gambling, or otherwise unlawful
in any manner whatever127." Anything which - "threatens the unity, integrity, defence,
security or sovereignty of India, friendly relations with foreign states, or public order or
causes incitement to the commission of any cognisable offence or prevents investigation of
any offence or is insulting any other nation," must also be removed.
Said regulation likewise require internet cafes to register with a central government
agency, keep records of the name, address, photo, and browsing history of visitors and
submit this to the agency . The government also requires the preparation of a monthly log
register showing date-wise details on the usage of the computer resource and the
submission of hard and soft copies of the same to the government.
The passage of the above mentioned regulations has raised alarms among the 80 million
internet users in India, concerns on civil liberties: the right to privacy and the freedom of
expression has been raised in the passage of the regulation. Although the government has
explained that the measure is necessary price to pay for national security, campaigners
against the regulation hope for change.
It is in this situation of India, and likewise in other countries where, as the Google Policy
Paper reports, that governments control and filter internet access (China, Iran, Pakistan,
Saudi Arabia, South Korea, and Vietnam)128, that we see the need to balance the right to
privacy and self expression with that of state intervention. In the desire to protect, against
hate speech, internet pornography or as the Indian regulation terms it “objectionable
127
Vaidyanathan, Rajini Freedom Fears of India’s Web users http://www.bbc.co.uk/news/technology-13508025
128Bradsher,
Keith and Claire Cain Miller. Google Sees Rules Violation s on Limits on Internet Access.
http://www.nytimes.com/2010/11/17/technology/17google.html
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 53
Working Paper: Not for Citation or Reproduction
content”, a clamp down on civil liberties , the right to privacy and freedom of expression
may happen. This research positions in that such should not be allowed to happen. Yes,
there is an obvious need to balance privacy rights and self expression with state
intervention. Mere protectionism and criminalization, without looking into proper
safeguards for civil liberties, is not the way to go, for then what is used to protect women,
would later be used to justify violations of privacy, self expression, and government
surveillance.
A Working Framework: The Continuum of VAW and Empowerment
The research hinges on the standpoint that VAW is not fragmented, it is a continuum.
Resonating Liz Kelly’s concept of “Continuum of VAW”, VAW is not necessarily deviant and
episodic, but rather, normative and functional – an everyday context for the lives and
experiences of women and girls all over the world. The idea of continuum is not to be taken
to mean a hierarchy of seriousness or severity. It reflects the continuum of complex and
interlinked experiences of harassment, violation, abuse, assault in the lives of individual
women.129
The study does not regard ICT-related VAW differently as traditional VAW. This posits
trivialization of ICT-related VAW, with the traditional VAW as the “real” or graver VAW.
The study emphasizes that ICT-related VAW causes serious harm to women as do
traditional VAW. With the continuum of VAW is the continuum of empowerment where
women find empowerment and exercise of her rights to sexuality and self-expression amid
these harms.
Conceptual Shifts in VAW: from victimization to empowerment discourses
What then, would be the manner by which we are to frame ICT-related VAW? What then
are the proper responses? The previous section ended in the note that mere protectionism
and criminalization cannot be the way to go. It does not help to see women only as victims
devoid of agency and empowerment, this view is supported in the current conceptual shifts
in the framing of violence against w0men as explained and expounded by the UN Special
Rapporteurs on VAW in its 15 year review of its VAW mandate.
The expert views of the Special Rapportuers on VAW revealed that there have been
conceptual shifts/gains of the SRVAW within the fifteen year period. These covered the
following: a) moving beyond the law; b) the path from victimization to empowerment; c)
sexuality and violence; d) demystifying discourses; and e) intersectionality of
discrimination and continuum of violence.
The conceptual shifts/gains in the understanding of VAW first mentioned, focused on
moving from the narrow conception of treating VAW largely within welfare/humanitarian
paradigm, with women as “poor victims in need of protection,” to an expansion of human
129
Liz Kelly, ‘The Continuum of Sexual Violence’ (1987).
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 54
Working Paper: Not for Citation or Reproduction
rights scrutiny “past symptoms of gender inequality that become manifest as distinct forms
of violence to look at structural and ideological causes that underlie the problem beyond
the injury caused130. Instead then of merely criminalizing acts falling within the definition
of VAW and the traditional notions of state responsibility, this conceptual shift:
“views VAW as an outcome of gender discrimination that shapes social,
economic, cultural, and political structures, rather than being independent of
them. As a consequence, the State is obligated not merely to protect against
violence, but rather to eliminate its “causes” -- -that is, gender discrimination
at structural, ideological and operational levels – as well as to bear the
responsibility for addressing its consequences131
Closely related to the concept of moving beyond law in addressing VAW is the shift from
victimization towards empowerment in the VAW discourse. The UN Special Rapporteur for
VAW recognized the Feminist critique of the VAW mandate which focused too much on
women as victims needing to be rescued, which elicit imperialist, protectionist or charity
based responses. In recognition that such does not address the root of the problem and
would only reinforce existing stereotypes, Special Rapporteur Yakin Ertuk clarified that the
victimization approach is a result of a short-sighted interpretations and treatment of
violence as an isolated phenomenon, she thus argued that:
“The United Nations mandate for the elimination of VAW entails tackling the
root causes of the problem at all levels, from the home to the transnational
arena. Such a call is also inherent in the prevention obligation of due
diligence standard. Therefore, perceived within such framework, the
“violence against women agenda” intrinsically challenges aspects of everyday
life that are taken for granted, and necessitates a shift of focus from a
victimization approach to one of empowerment. The former sees women as
weak, vulnerable and in need of protection , whereas in the latter approach,
women are seen to be subjected to violence not because they are vulnerable,
but because of a gender order that privileges male violence through
normative and institutional formations in society.132”
Yakin Ertuk, thus stresses the recognition that “violence is not an isolated incident
targeting vulnerable women but a systematically used tool of partriarchal control to ensure
that ‘women stay in their place’ and that the agenda for the elimination of VAW is not about
victimization but rather about the empowerment of women to overcome and eventually
change patriarchal hierarchies133.
130
The UN SRVAW page 33
The UN SRVAW page 34
132
UN SRVAW page 35
133133
UN SRVAW page 35 citing Yakin Ertuk, “Violence Against Women: From victimization to empowerment,”
paper presented at ESCAP forum titled “Where’s the power in Women’s empowerment?’ held in Bangkok, 4
August 2008.
131
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 55
Working Paper: Not for Citation or Reproduction
Applying the first two conceptual shifts then, which is a call for moving beyond the law, and
a call from victimization towards empowerment – it becomes obvious that protectionism
through criminalization is not seen by the Special Rapporteur on VAW as the sole solution
to the problem. Substantive protection through laws are part of the solution but certainly
not the sole solution. For of what use are the laws protecting women from violence when
the same remains unimplemented and when the underlying causes of VAW continue to be
unaddressed? The report of the Special Rapportuer thus explains that there is a need to go
beyond the law, and beyond seeing women as helpless victims which merely reinforce
stereotypes. There is a need to look into the root cause of the problem—that of structural
inequality and patriarchal hierarchies --- and to address the same, not by protectionism but
by empowering women. Yakin Ertuk thus elaborates on empowerment discourses as:
There is then a need, not only to look into VAW in ICT, and how to protect women from the
same, but also to delve into empowerment discourse. Yakin Ertuk describes the aim of this
discourse in the following manner:
“Empowerment discourse – through interventions ranging from education,
skills, training, legal literacy, access to productive resources, among others –
aims to enhance women’s self-awareness, self-esteem, self-confidence and
self-reliance. This enables women to understand that subordination and
violence are not fate; to resist internalising oppression, to develop their
capabilities as autonomous beings; and constantly negotiate the terms of
their existence in public and private spheres.134”
The next conceptual shift pertains to sexuality and violence. In the report of the Special
Rapporteur, it was once again reiterated that the root cause of VAW is the unequal power
relation between men and women founded upon differential gender-based norms. It was
stressed that these unequal gender relations derive from “the dominant notions of
women’s sexuality and of masculinity that establish dual moral standards for women and
men.” The report stressed that these dominant notions of female sexuality as informed by
patriarchal society have shaped protectionist laws. These laws that refer to women’s
chastity, closure of rape cases upon marriage with the rapist, non-criminalization of marital
rape, adultery laws and restrictions regarding relationships outside ethnic, religious or
class boundaries are seen as ways of policing women’s sexuality within a dominantly
patriarchal society.
The report thus links the different forms of VAW in the manner by which female sexuality
is controlled in the family (e.g. focus on/giving premium to chastity), in the community (e.g
protectionist laws on rape and sexual assault law which focus on chastity), and in armed
conflict (e.g. wars of men waged in women’s bodies), and the different forms of VAW. The
report further stated that gender based violence is often used as an instrument to control
female sexual behaviour in ways that cast women as male property or punish women who
transgress sexual norms. In country communications for example, cases were brought to
the attention of the Special Rapporteur regarding retributions faced by women for their
134
Un SRVAW page 35
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 56
Working Paper: Not for Citation or Reproduction
expressions of reproductive or non-reproductive sexual activity as well as for expressions
of heterosexual or non-heterosexual sexuality. Other communications included torture and
risk of sexual violence for women detained by reason of sexual orientation; there are
communications in relation to honor crimes committed by family members to women due
to premarital sex, adultery or failing to prove rape.
On the part of women’s rights advocates, there is a need to continue rejecting this male
conception and framing of women’s sexuality. There is a need to reject protectionist
measures which merely strengthen existing stereotypes or those which are informed by
men’s conception of women’s sexuality. Instead, there is a need to look more into women’s
empowerment and agency and for the fulfilment of the sexual rights of women as likewise
stressed by the Special Rapporteur: a) the inclusion of same sex unions within the
expanded definition of sexuality; b) the reaffirmation of reproductive and sexual rights; c)
reiteration of Cairo statement that “all human beings have a right to a safe and satisfying
sex life.
Applying the third conceptual shift then, which pertains to sexuality and violence, and
looking at how the male enforced conception of women’s sexuality has frequently led to
gender based violence, there is a need to look into what and how sexuality is for women. As
the report of the Special Rapporteurs have consistently stressed the manner by which
women’s sexuality is defined by men and/or even forced by men on women, there is then
the need to look into what is sexuality, how it relates to ICT-related VAW, and how sexual
expression and freedom through ICT may be distinguished from sexual abuse and
exploitation.
Women’s Sexuality: Sexual expression and freedom vs. Sexual abuse
Sexuality and sexual rights are defined by the World Health Organization in the following
manner:
Sexuality is a central aspect of being human throughout life and
encompasses sex, gender identities and roles, sexual orientation, eroticism,
pleasure, intimacy and reproduction. Sexuality is experienced and expressed
in thoughts, fantasies, desires, beliefs, attitudes, values, behaviors, practices,
roles and relationships. While sexuality can include all of these dimensions,
not all of them are always experienced or expressed. Sexuality is influenced
by the interaction of biological, psychological, social, economic, political,
cultural, ethical, legal, historical, religious and spiritual factors.
Sexual rights embrace human rights that are already recognized in national
laws, international human rights documents and other consensus
statements. They include the right of all persons, free of coercion,
discrimination and violence, to: (1) the highest attainable standard of sexual
health, including access to sexual and reproductive health care services; (2)
seek, receive and impart information related to sexuality; (3) sexuality
education; (4) respect for bodily integrity; (5) choose their partner; (6)
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 57
Working Paper: Not for Citation or Reproduction
decide to be sexually active or not; (7) consensual sexual relations; (8)
consensual marriage; (9) decide whether or not, and when, to have children;
and (10) pursue a satisfying, safe and pleasurable sexual life. The responsible
exercise of human rights requires that all persons respect the rights of
others.135
Under International law, particularly, CEDAW, and as expounded by the Beijing
Platform for Action (1995), women’s fundamental right to control and make decisions
about their body, identity and sexuality is an integral part of their full development and
empowerment. Women’s human rights include their right to have control over, and decide
freely and responsibly on, matters related to their sexuality, including sexual and
reproductive health, free of coercion, discrimination and violence. The Platform for Action
produced by the Beijing Conference in 1995 took steps forward towards affirmative sexual
rights, going beyond reproduction, sexual health and freedom from sexual violence:
“Equal relationships between women and men in matters of sexual relations
and reproduction, including full respect for the integrity of the person,
require mutual respect, consent and shared responsibility for sexual
behaviour and its consequences136”
Having discussed of what constitutes sexual rights for women, and what are covered
by these sexual rights, there is also the need to locate and to look into how sexuality is
framed in feminist discourses before we can proceed in looking into the role of ICT, not
only in the perpetration of VAW but also in the exercise of women’s agency and
empowerment, their self-expression and sexual rights.
Why exclusive categorizations cannot work
For Feminists, it has been articulated that “claims to rights in relation to sexuality have
largely been about safety, bodily control, sexual self-definition, agency and pleasure.” The
on-going feminist discourse on sexuality involve that of radical and libertarian views, as
well as those negotiating between the two extremes. Two camps generally figure in the
discussion of sexual rights:
In the last four years, there has been an increasing polarization of American
feminist into two camps on issues of feminist sexual morality. The first camp,
the radical feminists, holds that sexuality in male dominant society involves
danger – that is, sexual practices perpetuate violence against women. The
opposing camp, self-styled “anti-prudes,” I term “ libertarian feminists,” for
135
International Council on Human Rights. Sexuality and Human
(2009)http://www.ichrp.org/files/reports/47/137_web.pdf page. 10
136
As cited in Leonore Tiefer, The Emerging Global Discourse of Sexual Rights
Rights:
A
Discussion
Paper.
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 58
Working Paper: Not for Citation or Reproduction
whom the key feature of sexuality is the potentially liberating aspects of the
exchange of pleasure between consenting partners.137”
More in line with the radical feminists, Catharine MacKinnon situates/locates sexuality
within a theory of gender inequality, meaning the social hierarchy of men over women”.
She thus states:
“A theory of sexuality becomes feminist methodologically, meaning feminist
in the post-marxist sense, to the extent it treats sexuality as a social construct
of male power: defined by men, forced on women, and constitutive of the
meaning of gender. Such an approach centers feminism on the perspective of
subordination of women to men as it identifies sex -- -that is, the sexuality of
dominance and submission– as crucial, as fundamental, as on some level
definitive, in that process.”
For Mac Kinnon, sexuality in feminist light is seen as a “pervasive dimension of social life,
one that permeates the whole, a dimension along which gender occurs and through which
gender is socially constituted; it is a dimension along which other social divisions, like race
and class partly play themselves out.” She explains that sexuality is shaped not only under
conditions of gender inequality but that sexuality itself is a dynamic of the inequality of the
sexes. Thus:
“Dominance eroticized defines the imperatives of its masculinity submission
eroticized defines its femininity. So many distinctive features of women’s
status as second class-- the restriction and constraint and contortion, the
servility and the display, the self-mutilation and requisite presentation of self
as a beautiful thing the enforced passivity, the humiliation ---are made into
content of sex for women. Being a thing for sexual use is fundamental to it.”
MacKinnon further discussed the sexual objectification of women in her article, moving on
to the discussion on pornography where she cites the work of Dworkin in “Pornography:
Men Possessing Women”. She cites Dworkin in that “pornography is not harmless fantasy or
a corrupt misrepresentation of otherwise natural healthy sex, nor is it fundamentally a
distortion, reflection,projection, expression, representation, fantasy or symbol of it.
Through pornography, among other practices, gender inequality becomes both sexual and
socially real”
The previously discussed conceptual shift on VAW on moving from victimization to
empowerment – would however prevent us from totally agreeing with Mackinnon. Indeed,
that women’s sexuality has been and is being shaped by men is acknowledged. That the
same is a social construct and informed by male dominated and patriarchal society is
likewise acknowledged. However, in order to prevent from falling prey to victimization,
and in order to prevent reinforcing stereotypes, there is a need to go beyond dichotomizing
and categorization. There is a need to move beyond seeing women solely in the role of
137
Ann Ferguson
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 59
Working Paper: Not for Citation or Reproduction
‘victims’ needing protection to explore as well the exercise of women’s agency and
empowerment, as well women’s self expression and enjoyment of sexual pleasures.
Situated as it is within the context of gender inequality as stressed by Mac Kinnon, there is
also the valid discussion on empowerment and agency which cannot all together be
excluded in the discussion of sexuality. Ilene Philipson (1984) expressed this need to
abandon exclusionary categories in sexuality discourse, she says:
In a society characterized by male domination it is impossible to want just
freedom, on the one hand, or just protection, on the other. As long as women
are routinely raped and battered, and such rape and battering are glorified in
both pornography and mainstream media, as long as women are
systematically denied equal access to jobs and earn half what men do, and as
long as women have primary responsibility for child rearing, which often
causes them to live in poverty, protection is a necessary feminist demand.
It also does not mean that the questions of sexual fulfilment, pleasure, and
excitement should be absent from feminist discourse. It does mean, however,
that we should abandon simple-minded, exclusionary categories in the
discussion of sexuality and begin the difficult task of understanding the
connections between behavior and fantasy, sexual expression and object
relations, and sexual activity and ideology.
How then do we distinguish the exercise of sexual freedom and expression from that of
sexual abuse? And in the field of ICT, how do we distinguish when an act is a woman’s self
expression and exercise of sexuality versus sexual exploitation through ICT? What we have
here is then a question of “ freedom from” and “freedom to”. This has been expounded by
Alice Miller (2000) and many others as the tension between “protectionist” sexual rights
(i.e. the right to be free from sexuality-based interferences with human rights such as
bodily integrity or privacy) and “affirmative” sexual rights (i.e. asserting the right to sexual
diversity, pleasure or self-expression)138.
In response to the query posed above, this research proposes that the determination be
contextualized in every case, with the crucial issue being the woman’s agency and selfdetermination in the process. Agency and self-determination here is defined to be in its
fullest, exercised free from force, coercion and intimidation. Exercised from the stand point
where a woman can truly choose and not from a disadvantaged position begging or short of
acquiescence, such as exploitative conditions prevalent in syndicated operations of
prostitution and cyber sex dens.
The premium given on women’s agency stems from the conceptual shift that there should
be move from victimization to empowerment. We thus avoid a sweeping statement that all
women are static victims but look into different situations of women in different contexts
and how they exercise and negotiate their agency in said contexts. We have to acknowledge
138
As cited in Leonore Tiefer: The Emerging Glboal Discourse of Sexual Rights.
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 60
Working Paper: Not for Citation or Reproduction
that women react, women respond and women can choose to respond by empowering
themselves. A clear-cut resolution may not be provided through this discussion, but the
purpose more would be to expose a more nuanced view on said issues instead of a
sweeping call for criminalization.
Camgirls: self-expression, sense of identity and community
An interesting case in point here would be the study of Theresa Senft on camgirls. Senft
wrote Camgirls: Celebrity and Community in the age of Social Networks and who in the
process of writing her research, became a camgirl herself. Senft’s study was an
ethnographic study of camgirls: women who broadcast themselves over the web for the
general public while trying to get a measure of celebrity in the process. In said study, Stenft
explained that she was concerned on the question of “what does it mean to speak of the
personal as political in a network society?” She states:
“The notion of network society has always been problematic for feminists. At
one level, networks allow political affiliations among strangers who are at
geographic distances. At another level, networks enable the phenomenon
known as globalization, with its exploitation of women's labor, and the
feminization of work in general. Networks are also responsible existence of a
publicity culture that simultaneously encourages women to “"represent"”
through confession, celebrity and sexual display, yet punishes too much
visibility with conservative censure and backlash.”
In discussing the earliest of Camgirls, Senft explored how these individual camgirls
combine theatrical authenticity, branding and celebrity in order to make names for
themselves on the Web. She discussed how camgirls both control and are being controlled
by their audience. She demonstrated the complexity of the camgirl world and as described
by Jennifer Motter’s review of her book:
“She disproves the rumors that all camgirls’ video content is pornographic,
which is often assumed due to the frequent use of webcams to capture nudity
and sexual acts in exchange for money. In contrast, the camgirls she studied
use webcams as a vehicle for self-expression sense of identity and
community when they connect with others who share their personal stories
in virtual spaces. 139”
In her conclusion, Stenf provides for several recommendations for feminists in a networked
society. One of these recommendations include thinking heretically and taking ethichal
actions, she explains:
“My third recommendation for feminists in a networked society is to
think heretically about some of our most dearly held beliefs,
particularly regarding sex work and young people’s sexuality, ideally
139
Motter, Jennifer. Book Review on Senft’s CamGirls http://explorations.sva.psu.edu/vcg/5vol/Motter.pdf
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 61
Working Paper: Not for Citation or Reproduction
taking our cue regarding appropriate lines of dialogue from children
and sex workers themselves. I am not advocating pre-teen sexual
activity. Nor do I champion the sex positive notion that all sex work
under any condition is liberating, so long as I choose it for myself. I am
simply urging a relational, individual and local approach to these issues
rather than the current universal, abstract and global dictates
exemplified by the Bush administration.
In essence I am talking about ethics in micropolitics…I believe that
micro politics sets the stage for macro politics by rendering people
receptive, non-receptive to messages or plan of action. On the Web,
micropolitical tele-ethical acts might include, among other things,
online dialogues, building communities, ‘outing’ oneself online, and
even intervening when someone’s safety is at stake, as in my own
story140” (emphasis supplied)
Aside from the discussion on the complex lives of camgirls, micro politics and teleethicality on the web, Senft has likewise highlighted the usefulness of the on line spaces
and on line community for women. She has confessed that she takes the needed support in
instances of abuse from her online community, and in her recommendations, she
forwarded the solidarity among women in on line spaces. Sneft thus, like Gurumurthy and
others, recognize the empowering nature of these online spaces.
Cyborg Manifesto: a creature in post-gender world
Like Senft, Donna Haraway in her “Cyborg Manifesto” asserts that consciousness of
exclusion through naming is acute. She cautions that “painful fragmentation
among feminists (not to mention among women) along every possible fault line
has made the concept of woman elusive.” Haraway in her concept of cyborg defines it
as “a cybernetic organism, a hybrid of machine and organism, a creature of social
reality as well as a creature of fiction.”
The cyborg, according to Haraway, is a matter of fiction and lived experience that
changes what counts as women's experience [in the late twentieth century]. The
cyborg is a condensed image of both imagination and material reality and is a
creature in a post-gender world. As alternative to the perspective that cyborg
works is about the final appropriation of women's bodies in a masculinist orgy of
war (Sofia, 1984) such as in Starwars; Haraway underlines that a cyborg world
might be about lived social and bodily realities in which people are not afraid of
140
Senft, Theresa Camgirls: Celebrity and Community in the Age of Social Networks. (2008)
http://uel.academia.edu/TheresaSenft/Books/130671/Camgirls_Celebrity_and_Community_in_the_Age_of_Social
_Networks
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 62
Working Paper: Not for Citation or Reproduction
their joint kinship with animals and machines, not afraid of permanently partial
identities and contradictory standpoints. With this, she points out that “the
political struggle is to see from both perspectives at once because each reveals
both dominations and possibilities unimaginable from the other vantage
point.”Single vision produces worse illusions than double vision or many-headed
monsters, as Haraway noted.141
Pornography: celebration of life, procreation and love
May Ling Su, a Filipina who is now residing in the US owns and manages her own porn site.
She poses nude photos and sex videos in her site. In a response to a letter written to her,
she shares her view that porn is as important to society as sex is important to the human
experience. To her, pornography is a “celebration of life, procreation, love”. She questions
why depicting sex in films is a taboo while depicting murder in films has been considered
legal.
When questioned about some feminists’ criticism of pornography as making money out of
women’s bodies, May Ling Su explains that among the considerations people have in
entering careers is that whether it would be a viable way to make a living. She started out
as an actress/ singer performing on state and TV. It was when she married that she and her
husband explored around cameras and tried posting online. She enjoyed the process saying
that “performing sex for an audience came naturally to me.” She said she was good at it, and
willing to learn more stunts. She enjoys sex in many ways.
She describes that the main advantage as she makes her own porn at her home as against
being employed in legitimate shows is that, she “calls the shots”:
“The main advantage to making my own porn at home versus being
employed in legit shows is that I call the shots. I decide who I have sex
with, when and how. Time is the biggest advantage. I’m sure you
know that doing shows on stage and TV takes up so much time! I get
to be a stay-at-home mom and raise my own child. It’s a challenge
scheduling work around when my kid is at school, but at least I’m in
control of my schedule.” 142
On feminists’ critique on pornography she further countered:
“I think feminists who criticize porn for “making money out of
women’s bodies” have good intentions, but their criticism is not
targeted correctly. It’s not porn that is the problem, it’s slavery in any
form – it could be a domestic helper that is not being paid just wages,
just as much as it could be a sex worker. If a woman decides to make
141
Haraway, Donna, “Cyborg Manifesto” http://www.stanford.edu/dept/HPS/Haraway/CyborgManifesto.html
142
May Ling Su http://maylingsu.com/2009/10/feminism-porn-philippines/
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 63
Working Paper: Not for Citation or Reproduction
money using her body, whether it’s for sex, or household chores, or
performance, or athletics, that is her choice and she deserves respect.
Respect means that she gets compensated well and treated well as a
person.”143
She explained the reasons why she makes porn:
I make porn because human sexuality is a study worth undertaking. My body and its
pleasures is a frontier worth exploring.144
For Mau Ling Su, expressing ambivalence for her porn life reflects that she lives a mindful
existence; that is to follow a path that is not well-trodden. She examines her life constantly
and considers it a form of meditation. 145
Spaces for agency and empowerment
Women’s exercise of their agency, empowerment, self-expression and sexual rights
through ICT is likewise seen in APC’s “Erotics: Exploratory Research on Sexuality and the
Internet”. In said research, the manner by which the Internet facilitates the exercise of
sexual rights and expression of sexualities, particularly of women living in different sociopolitical, economic and cultural contexts were explored. It focused on five countries: India,
Brazil, Lebanon, South Africa and the United States.
The research in part revealed how, in India young women negotiate risks on line, using the
medium to explore, define and challenge boundaries of gender and sexual norms
(pleasures and dangers) while at the same time exercise self-regulation for their own
safety, these include internalizing social norms on what may be ‘appropriate to post in
social networks’ to avoiding revealing one’s true location and identity in on line forum.
In the research from Brazil, it was explored how online social networking sites serve as
privileged means of communication for LGBT public, and how these sites become platforms
allowing people whose sexual orientations, experiences or identities are marginalized to
meet and socialize online, free from discrimination.
This is likewise true in the research from Lebanon which sees the use of ICT to express
sexual identities, negotiate anonymity and privacy on line and organizing queer issues
within Arab blogsphere.
The research from South Africa likewise sees the internet as potentially a space for the
struggles of minority groups, a place to cohere and provide sufficient resistance to protect
freedoms and human rights and to challenge construction of gender order since the
research focused on transgender and lesbian use of ICT.
143
May Ling Su http://maylingsu.com/2009/10/feminism-porn-philippines/
May Ling Su http://maylingsu.com/2007/10/give-up-porn/
145
Ibid.
144
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 64
Working Paper: Not for Citation or Reproduction
Last, the research from the United States focused on access and restriction to information
about sexuality in libraries across US and how legitimate LGBT NGOs and other sites are
filtered and arbitrarily blocked. Nevertheless, “Erotics” taken together speak of how ICT
and the internet provide spaces for agency and empowerment not only for women but also
for the LGBT community.
Empowerment Discourses through ICT
A networked society is a double edged sword, as Senft would state. Even in the existence of
online abuses and of ICT-related VAW, the field of ICT, the online world and online spaces
are legitimate battle grounds. The APC paper “Erotics” have shown the same, not only for
women but also for LGBT communities. Jeniffer Motter in her review of Senft elaborates
that:
“Feminist efforts are needed in both the physical and virtual world. Virtual
feminist consciousness-raising efforts may facilitate social justice when
women’s share their personal experiences of abuse, rape, isolation, abortion,
sexuality, marriage, family, and body image portrayal by the media, and,
subsequently, the group recognize these experiences as structural and
socially-institutionalized, and, therefore, political in nature (Hanisch, 1969,
2006; Redfern, 2001).146 … Online social networks may provide a supportive
community comprised of others with similar experiences, values, and beliefs
that may be difficult to establish in physical space.147”
Gurumurthy for her part has pointed out that ICTs provide radical choices for
empowerment and new pathways to citizenship, especially for marginalised women. She
further posits that “information society related policies to protect and further women’s
rights must address both negative and positive rights.” By this, she means that there is a
need to balance individual privacy, while enabling transparency in government. She sees
the need to balance concerns of self-expression with concerns of protection from
exploitation of women. To quote:
“While there is no doubt that policies are needed to address online violence,
the boundaries of state involvement in effecting such protection becomes
critical. While the government should be able to prosecute those engaged
in violence against women, a right to surveillance in general, without
adequate basis is likely to infringe on women’s privacy. The state's duty
to intervene and prosecute violence when it happens online should not
become an excuse for surveillance over the Internet. Thus, policy
approaches need to recognise both women's “public”, political rights as
well as “private”, individual rights, especially in the context of violence
against women148.”(emphasis added)
146
Motter, Jennifer. Book Review on Senft’s CamGirls http://explorations.sva.psu.edu/vcg/5vol/Motter.pdf
Motter, Jennifer. Book Review on Senft’s CamGirls http://explorations.sva.psu.edu/vcg/5vol/Motter.pdf
148
Gurumurthy (2009) page 3
147
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 65
Working Paper: Not for Citation or Reproduction
Conclusion and Recommendation: Transforming ICTs, situating and contextualizing
VAW and Sexuality
From the above discussion, the Information, Communication Technology (ICT) arena, far
from being confined to technology users and to technological implications, is in fact a site of
power where feminists can and should intervene. Being a product of the society and global
economy that spawned it, it is not immune from the prevailing power relations in society:
gender inequality and patriarchy included.
The existing digital and gender divide in the ICT arena and the different forms of violence
against women (VAW) being perpetrated through ICT are manifestations of the underlying
power relations in society and gender discrimination, which are not solely confined to the
ICT arena. ICT may be termed a new field, a new language, a new space , but it is not at all
free from patriarchal hierarchies and the resulting discrimination and VAW there from. In
the same vein, the different forms of VAW through ICT form part of the continuum of
vi0lence perpetrated against women which originate from the unequal power relations
between men and women. These ICT-related VAW are not at all new forms of VAW but are
made distinct by the manner of their perpetration: through the borderless world of ICT.
ICT-related VAW, with the different and emerging forms thereof has provided challenges in
terms of definition, prosecution as well as jurisdiction over such acts. This has been largely
attributed to the nature of ICT, where offenses and offenders are often intractable, where
various possibilities of digital personhood providing anonymity are readily available, and
where offenses are transborder/transnational, often beyond national criminal jurisdiction.
Question then arise both as to the sufficiency of the existing laws to address such acts of
ICT-related VAW, as well as the effective implementation of existing laws to combat the
same.
Questions exist as well in distinguishing ICT-related VAW committed on the individual level
and those committed in a syndicated manner and for profit. A subjective and
contextualized approach is forwarded for ICT-related VAW committed on the individual
level: an acknowledgement of instances where women choose to exercise their agency and
empowerment . The same cannot, however be said with syndicated ICT-related VAW. In
syndicated ICT-related VAW, conducted for profit, the victimization of women is
institutionalized, a cause for serious concern and protection. In this institutionalized
victimization, with its availing context and circumstances, the its organized nature, the
number of victims, the economic and sometimes political power of the perpetrator –taken
together, totally negate proper consent and valid bargaining or negotiating power.
However, even as ICT by extension of the existing power relations in society, has become a
site of continuing gender inequalities and emerging forms of violence, both individual and
syndicated level, it has likewise shown that the same can be a platform for women’s agency
and empowerment. It has not only provided women with information and education, it has
not only provided for a a possible tool to challenge gender inequality and promote women
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 66
Working Paper: Not for Citation or Reproduction
empowerment, it has also provided spaces for self-expression. Within ICT are stories not
only of victimization and violence against women, but also of emancipation and spaces for
liberation.
The question then is how to address violence against women in ICT while at the same time
harnessing the empowering capacities of ICT for women. These empowering capacities, not
being limited to information and education, but also in the promotion of women’s rights,
the fight against gender inequality and the owning by women of their sexuality and sexual
rights.
At this point, it is useful to draw from Gurumurthy’s study and on how she calls for the
transformation and engendering of the ICT arena: both internationally and nationally and
both in programs and policy levels. This call, as stated, is a call for the transformation of the
ICT arena is a call for an enabling environment for women to be able to access and enjoy
the benefits and empowering nature of ICTs. This also involves addressing underlying
socio-cultural contexts of structural inequality between men and women and the manner
by which these affect women’s access to ICTs as well as women’s vulnerability to abuse.
This also involves a gendered policy to ICTs, in international, local and programme level
with accompanying focus on access, training and content.
The global architecture of ICT, from the point of view of equality and justice is far from
ideal. The dominant forces driving the system are capitalism – profits, monopolistic trends,
and corporate gatekeeping of the arena – and the patriarchal tendencies which go with
these – the discrimination against, devaluing and exclusion of, and violence against women.
However, in addition to the powerful corporate players, the ICT arena also has players who
oppose these forces, using ICTs as catalysts for social transformation149. Although the ICT
arena has been a site of continuing gender inequalities and even a site of emerging forms of
violence, it has also shown its potential for women’s empowerment and agency through (a)
livelihood opportunities; (b) health; (c) education; and (d) as a tool to challenge gender
inequality and promote women’s empowerment.
Additionally, where women have used ICTs for their own purposes, they report increased
knowledge and self-esteem. This seems to be almost universally true for different sociocultural contexts – from China to Ethiopia, from Peru to India150. This empowering process
has the potential of destabilising existing gender relations. She however speaks of, and
stresses the importance of providing an enabling environment for women to assure the
equal enjoyment and access to the benefits of ICTs.
The transformation of the ICT arena for the benefit and enjoyment of women not only
entails engendering programmes and policies. In due recognition that the gender power
dynamics that permeate the ICT arena are the same gender power dynamics prevalent in
society, and in recognition as well that the forms of violence perpetrated through ICTs form
part of the continuum of violence experienced by women and rooted at the same structural
149
150
Gurmurthy page 28
Hafkin 2002c, Gurumurthy 2004.
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 67
Working Paper: Not for Citation or Reproduction
inequality brought upon by the system of patriarchy, the transformation of the ICT arena,
involves the transformation of these underlying power relations. 151
The digital and gender divides are realities that must be confronted if we are to confront
the issue of women’s access to and enjoyment of the benefits of ICT. Thus, part of the
creation of an enabling environment for women’s access and enjoyment of ICT include the:
a) availability of ICT infrastructure for women; b) capacity building and training for women
on the new technology to move beyond traditional ICT roles to highly technical skills; c)
creation of relevant applications and content for women.
With the above, it is, however, equally important, to look and address as well the
underlying causes of these divides within the society. This entails breaking down
conceptual and perceptual barriers that separate ‘gender’ concerns and ‘wider concerns’ in
the policy making arena152. It involves looking into the process of eliminating gender
discrimination, the root causes of VAW, at structural, ideological and operational levels --this includes structures and systems on which the institutions of the family, the community,
the market, and indeed the State are founded153.
Addressing gender in policy and programme intervention is imperative because, even with
improved communications and networking infrastructure, women are likely to be
bypassed. The process of engendering polices also involves engendering policies
concerning ICTs and their access also means addressing gender issues in education, health,
telecommuni-cations, infrastructure and rural development policies so that ICTs can enable
outcomes that are gender equal. 154
Far reaching changes towards gender equality and women empowerment in the ICT
arena are needed at every level ---international, national and programme stressing
that engendering ICTs is not merely about greater use of ICTs by women, it is also
about transforming the ICT system. This involves the following: 155




Governments building ICT policies with strong gender perspectives
and engaging with civil society and gender and ICT experts on these
areas.
International fora such as WSIS being used to challenge northern and
corporate dominance of the ICT arena.
Clear gender strategies being deployed through design, in the
implementation and evaluation of ICT projects and programmes.
Collecting information with sex-disaggregated statistics and gender
indicators on access to, use of and content of ICTs, on employment
and on education.
151
Hafkin 2002c, Gurumurthy 2004.
Margaret Gallager, Beijing’s Legacy, page 2
153
Un SRVAW page 34
154
Gurmurthy page 28
155
Ibid.
152
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 68
Working Paper: Not for Citation or Reproduction

Consideration of gender issues in: ICT/telecommunications policy;
representation in telecommunications/ICT decision-making; and the
differential impact of telecommunications/ICTs on men and women.
In addressing violence against women and the issue of sexuality in ICT, it is worth noting
Gurumurthy:
Among the greatest challenges to a strong feminist response to issues of
violence against women and ICTs is the fact that feminist analytical
frameworks have to coherently address the changing realities restructuring
gender relations in response to the advent of new information and
communication technologies. Piecemeal efforts to tinker with policy domains
like employment, education or crime may fail to add up to a cogent national
response to the opportunities and challenges presented by new technologies,
especially for transformatory change that privileges the marginalised. Also,
feminist engagement with policies needs to approach rights from the vantage
of an alternative ICT discourse. Policies are needed to promote appropriate
technologies that can create secure and empowering online spaces. Feminist
engagement with such policies is part of the imperative that can and should
shape the emerging technological paradigm. By far the most urgent feminist
response that is required is to stop seeing digital and online spaces as a
different realm confined to technology users, but an important site of
power that requires a feminist intervention156.(emphasis added)
The call then for the transformation of the ICT arena is a call for an enabling environment
for women to be able to access and enjoy the benefits and empowering nature of ICTs. This
involves addressing underlying socio-cultural contexts of structural inequality between
men and women and the manner by which these affect women’s access to ICTs as well as
women’s vulnerability to abuse. This also involves a gendered policy to ICTs, in
international, local and programme level with accompanying focus on access, training and
content. This is also in line with the program of the Association for Progressive
Communications “Take back the Tech” which asks women to take control of ICTs and
consciously use them to change power relations between men and women and particularly
to use ICT activism to combat violence against women157.
The interrelation of ICT, VAW and sexuality opens up an array of discourses in different
areas of women’s rights. The compounded complexity of the phenomenon of ICT-related
VAW opens a terrain that has to be carefully studied by feminists, women’s rights
advocates and other stakeholders. While the study stands in recognition of ICT-related
cases as an emerging pressing concern, the issues at hand are found to be needing of more
intensive study. It is therefore recommended that the research undertakes another phase.
A research should be done on cyber dens to further substantiate the phenomenon of ICTrelated VAW based on first-hand accounts of women involved in these activities.
156
157
Gurumurthy (2009) page 3
ICTs and VAW, Kathambi Kinoti
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 69
Working Paper: Not for Citation or Reproduction
Given the status of the ICT-VAW discourse in the Philippines particularly among women’s
rights groups and advocates, there is a critical need to discuss and level off appreciation of
the groups on the ICT-VAW issue.
The immediate need might be capacity-building before policy advocacy. With this relatively
new area of VAW, the question remains on what would be the implications as the law
progresses more into the spheres of people’s lives. As outcome of the research, a practical
strategy would be to target law enforcers and promote understanding of the continuum of
VAW which may be applied, for instance, in gathering of evidences.
ICT-related VAW and the advent of ICT in women’s lives are emerging concerns needing of
further study and analysis. These pose as a challenge as well as an opportunity in
strengthening the efforts of women’s movements in women’s rights advocacy. The
women’s movements are once again called to reflect and examine issues of sexuality, selfexpression, agency and empowerment vis-à-vis harms, need for protection and violations
against women.
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 70
Working Paper: Not for Citation or Reproduction
Bibliography
Berkman Center for Internet and Society, “The Internet and the Sex Industry”
http://cyber.law.harvard.edu/vaw02/
Chawki, Judge Mohamed and Dr. Mohamed Wahab, Technology is a Double-Edged Sword:
Illegal Human Trafficking in the Information Age (2004) available at www.DROITTIC.fr.
Citron, Danielle Keats, Cyber Civil Rights, 89 B.U.L. REV. 61, 69-75 (2009).
Citron, Danielle Keats, Law’s Expressive Value in Combating Cyber Gender Harassment,
Michigan Law Review Volume 108:373.
Cornwall, Andrea and Susie Jolly, Introduction: Sexuality Matters, Institute of Development
Studies (IDS) Bulletin Vol. 37 No. 5 October 2006.
Diamond, Irene and Lee Quinby. American Feminism in the Age of the Body. Journal of
Women in Culture and Society 1984, vol. 10, no. 1.
Ferguson, Ann, Ilene Philipson, Irene Diamond, and Lee Quinby, and Carole S. Vance and
Ann Barr Snitow. Forum: The Feminist Sexuality Debates. 1984 by The University of
Chicago.
Ferguson, Ann. Sex War: The Debate between Radical and Libertarian Feminists. Journal of
Women in Culture and Society 1984, vol. 10, no. 1.
Foucault, Michel. The History of Sexuality Volume I: An Introduction. New York: Pantheon
Books (1978) Translated from the French by Robert Hurley.
Gurumurthy, Anita and Niveditha Menon, Violence against Women via Cyberspace,
Economic & Political Weekly (EPW), Vol. XLIV No. 4 (October 3, 2009).
Gurumurthy, Anita. Gender and ICTs: An Overview. Bridge Development.
http://www.bridge.ids.ac.uk/reports/cep-icts-or.pdf accessed on February 2011
Haraway, Donna, “A Cyborg Manifesto: Science, Technology, and SocialistFeminism in the Late Twentieth Century," in Simians, Cyborgs and Women:
The Reinvention of Nature.
http://www.stanford.edu/dept/HPS/Haraway/CyborgManifesto.html
http://computer.yourdictionary.com/cyberharassment
http://computer.yourdictionary.com/cyberpornography
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 71
Working Paper: Not for Citation or Reproduction
http://uel.academia.edu/TheresaSenft/Books/130671/Camgirls_Celebrity_and_Communit
y_in_the_Age_of_Social_Networks
http://www.atimes.com/atimes/Southeast_Asia/JG26Ae01.html
http://www2.ohchr.org/english/issues/women/rapporteur/docs/15YearReviewofVAWM
andate.pdf
Huyer, Sophia and Swasti Mitter. ICTs, Globalisation and Poverty Reduction: Gender
Dimensions of the Knowledge Society.
http://unpan1.un.org/intradoc/groups/public/documents/unpan/unpan037351.pdf
accessed February 2011
International Council on Human Rights. Sexuality and Human Rights: A Discussion Paper.
(2009)http://www.ichrp.org/files/reports/47/137_web.pdf
Jac sm Kee “Erotics: Exploratory Research on Sexuality and the Internet”
http://www.apc.org/en/node/11958/ accessed March 2011
Kowalski, Robin M., Limber, Susan P. and Agatson, Patricia W., Cyber Bullying: Bullying in
the Digital Age. Malden, MA: Blackwell Publishing, 2008.
Marcelle, Gillian M. Transforming Information Communication Technology for Equality.
(2000) http://www.onlinewomeninpolitics.org/beijing12/mono9-ICT.pdf accessed
Feruary 2011
Motter, Jennifer. Book Review on Senft’s CamGirls
http://explorations.sva.psu.edu/vcg/5vol/Motter.pdf retrieved in March 2011
Philipson, Ilene. The Repression of History and Gender: A Critical Perspective on the Feminist
Sexuality Debate. Journal of Women in Culture and Society 1984, vol. 10, no. 1.
Pulkkinen, Jyri . The Paradigms of E-Education. (2004) Description of globalization in
http://herkules.oulu.fi/isbn9514272463/html/x464.html accessed on February
2011
Roman, Antonio B., Purging Pornography from the Internet, IBP Law Journal Magazine,
Volume XXIII Number 3 Third Quarter of 1997 September 1997.
Senft, Theresa Camgirls: Celebrity and Community in the Age of Social Networks. (2008)
Sheldon, Kerry and Howitt, Dennis, Sex Offenders and the Internet. West Sussex: John Wiley
& Sons Ltd. 2007
Soto, Jessica Umanos. Violence against Women and Information Technologies: Philippines
Country Report.
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 72
Working Paper: Not for Citation or Reproduction
http://www.genderit.org/sites/default/upload/philippines_APC_WNSP_MDG3_VAW_
ICT_ctryrpt.pdf retrieved in March 2011
Sparrow, William. Pedophiles get tech-savvy
http://www.atimes.com/atimes/Southeast_Asia/JG26Ae01.html
Su, May Ling, Feminism and Porn in the Philippines.
http://maylingsu.com/2009/10/feminism-porn-philippines/ retrieved in March
2011
United Nations Special Rapporteur on the Promotion and protection of the right to freedom
of opinion and expression, Frank La Rue. (2011) A/HRC/17/27. http://daccess-ddsny.un.org/doc/UNDOC/GEN/G11/132/01/PDF/G1113201.pdf?OpenElement
accessed on March 2011
United Nations Special Rapporteur on Violence against Women. “15 years of the UN Special
Rapporteur on VAW, its cause and consequences”. ( 2010)
United Nations. The Digital Divide Report: ICT Diffusion Index 2005
http://www.unctad.org/templates/webflyer.asp?docid=6994&intItemID=2068&lang
=1
Williams, Rachel. Gender, Bodies and Cyber Stalking: Embodying Theory, Developing
Methodology. (2009)
http://researcharchive.vuw.ac.nz/bitstream/handle/10063/1171/thesis.pdf
accessed March 2011
Women’s Legal Bureau for SIBOL, Women’s Health and the Law. Quezon City: WLB, 1997.
Women’s Legal and Human Rights Bureau, Inc., Proceedings of the Roundtable Discussion on
Sexism, Culture and the Young Filipino Women, Quezon City, 25 March 2010.
Unpublished.
Women’s Legal and Human Rights Bureau, Transcending Gender, Sexuality and Human
Rights: Women’s Sexuality and Sexual Rights in the Philippines. First International
Conference on Human Rights in Southeast Asia 14-15 October 2010 Bangkok,
Thailand. Unpublished.
News Articles:
Alquitran, Non. 9 Nabbed in Taguig cybersex den raid.
http://www.philstar.com/Article.aspx?publicationSubCategoryId=65&articleId=6757
02
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 73
Working Paper: Not for Citation or Reproduction
Amoroso, Ed. 28 arrested in Cavite cybersex den raid.
http://www.philstar.com/nation/article.aspx?publicationSubCategoryId=67&articleI
d=700138
Bradsher, Keith and Claire Cain Miller. Google Sees Rules Violation s on Limits on Internet
Access.
Chua, Ryan. Are you a victim of cyber stalking. http://www.abscbnnews.com/nation/05/24/11/are-you-victim-cyber-stalking
Delos Angeles, Edison and Ador Vincent Mayol. Cebu cybersex den raided; Dutch national, 4
Filipinas charged.
http://newsinfo.inquirer.net/breakingnews/regions/view/20110409-330147/Cebucybersex-den-raided-Dutch-national-4-Filipinas-charged
http://www.nytimes.com/2010/11/17/technology/17google.html
Internet Porn: untouchable Crime.
http://www.newsbreak.com.ph/humantrafficking/story-iporn.htm
Kinoti, Kathambi. ICTs and Violence Against Women. Originally published by: AWID
Ressource Nethttp://www.wittproject.net/spip.php?article413
Suspected cybersex dens raided: 38 held. Philippine Daily Inquirer
http://newsinfo.inquirer.net/inquirerheadlines/regions/view/20110110313720/Suspected-cybersex-den-raided-38-held
Swedes jailed for running Philippine cybersex den.
http://www.thelocal.se/33706/20110511/
Vaidyanathan, Rajini Freedom Fears of India’s Web users
http://www.bbc.co.uk/news/technology-13508025
Women and Children: Online Hot Ticket Items?
The Sexual Commodification of Women and Children on the Internet
http://www.ed.uiuc.edu/wp/netfiles.uiuc.edu/hadowns/www/sexcommodification.htm
Prepared by the Women’s Legal and Human Rights Bureau (WLB) 74
Download