Philippine Lawbytes 160: Technology Service Providers As Indispensable Parties in the Online MCLE and the Necessity for Understanding and Setting Standards (Copyright by Dr. Atty. Noel Guivani Ramiscal)

Last June of this year, I came out with an article that enumerated some of my comments on the Implementing Rules and Regulations of the Supreme Court on the Online Mandatory Continuing Legal Education (MCLE) seminars for lawyers. I circulated it with several entities and decided to publish it this month on this blogspace. I have gotten some comments to my comments since then, and I desire to highlight in this article one very important entity the Supreme Court missed in its enumeration of the parties involved in the provisioning of the online MCLE and their concomitant obligations, i.e., the technology service providers.

Perusing the IRR’s provision on the technical requirements, it was stipulated that:

a) Providers must have:

1) Reliable internet connection;

2) High bandwidth availability, able to scale and capable of supporting numerous simultaneous connections;

3) Encryption mechanism to protect users’ data;

4) High availability/uptime and low downtimes;

5) Data Retention and Destruction Policy;

6) Audit Trails and Logs;

7) Fast and reliable 24/7 Customer Service Support in case of technical glitches/issues [Rule 1, Section 2. Technical Requirements].

It was a mistake to exclude in the IRR any specific reference to technology service providers because most, if not all, the Supreme Court MCLE accredited government and private providers (hereinafter “accredited providers”) are not technologically and logistically equipped to provide all these technical requirements, and then some, to MCLE online participants. It is quite explicit that even in the accreditation process, these accredited government and private providers have to present a “working prototype of their online MCLE offering” [Rule 1, Section 1. c)], which requires a feasible proof of concept and evidence of viable technical capabilities that these accredited providers on their own, do not possess. So, in order to comply with these requirements, these accredited providers would have to outsource or seek the assistance of so-called “third party” technology providers who would be the ones that are actually equipped to provide the technology services and support to make the MCLE online seminars a reality.

The COMELEC example

One must be wary in treating technology providers as third parties, which are outside of the disciplinary purview of the Supreme Court. In my book “Cryptology: The Law and Science of Electronic Secrets and Codes” I dissected the contractual relationship between COMELEC and Smartmatic TIM and gave it as an example of a horrific relationship that had apparently served to oppress and disadvantage the Philippine electorate.

Cryptology Book of Dr. Atty. Noel G. Ramiscal

Cryptology Book of Dr. Atty. Noel G. Ramiscal

What happened in the inception? Well, we the Philippine electorate and citizens, through COMELEC, paid billions of pesos for the technology that was not yet tested when it was procured, and as it turned out Smartmatic TIM did not originally own the intellectual property rights to the technology, including the source codes, when they were procured way back in 2009. It was a mere licensee. The owner was Dominion Voting Systems, a third party, who was not involved in the contract between COMELEC and Smartmatic TIM.

Dr. Atty. Noel G. Ramiscal presenting his manuscript of "Cryptology: The Law and Science of Electronic Secrets and Codes" to then UP Institute of International Legal Studies Director, Atty. Harry Roque Jr. last January 27, 2015

Dr. Atty. Noel G. Ramiscal presenting his manuscript of “Cryptology: The Law and Science of Electronic Secrets and Codes” to then UP Institute of International Legal Studies Director, Atty. Harry Roque Jr. last January 27, 2015

This fact was not esoteric or hidden knowledge, and Atty. Harry Roque, in 2009 already warned that if the relationship between Smartmatic TIM and Dominion Voting Systems soured, COMELEC would just be a
bystander.

True enough, Smartmatic filed a complaint against Dominion Voting Systems in Delaware, USA last September 11, 2012, and in its complaint, one of its revelations was that Dominion Voting Systems never gave it access to the revised source codes of the election technologies, ever since the May 2010 e-elections in the Philippines because it was exacting more money from Smartmatic, which the latter apparently was not willing to pay. Due to the conflict between the two, COMELEC was reduced to waiting for the source codes to be given to it by Smartmatic TIM. The alleged revised source codes for the election technologies were given to COMELEC several days before the May 13, 2013 e-elections, which of course, made it impossible for any legitimate Philippine source code reviewers to conduct comprehensive source code reviews prior to the e-elections, which was provided by law.

Indispensable Parties and Accountability

The whole point of the above example is that the real actual technology providers for legitimate activities tinged with public interest, like the online MCLE seminars, cannot and should not be treated as unseen third parties. The IRR relegated them to the invisible sidelines. They are indispensable parties in the provision of services to what I still believe is an important sector of the public, i.e., the legal professionals.

The thing is, accountability must not be held to rest by implication. Technology providers must be properly named or included in the IRR, to be held accountable to certain technological and legal standards, and not merely on the data privacy aspects.

Also, it would certainly be inequitable that in situations where their services go awry, only the accredited providers would get the blame, primarily from the participants who deal directly with them, and who might not know the real technology providers. At the very least, by subjecting these technology providers to the administrative arm of the Supreme Court, they can be made to explain for the lapses in their service, and can be subject to fines and sanctions.

Technological Standards

In my first article, I insisted on certain technological standards that need to be spelled out by the Supreme Court which necessitate that its relevant personnel, researchers and officials that draft IRRs on technology related matters must be up to speed in technological developments that pertain to its legal and judicial activities. It is only by understanding and setting the relevant standards can accredited providers and the Supreme Court determine if, how, and when technological providers can be held accountable for their fault, negligence and outright breach of their responsibilities.

The Necessity for Setting or Defining Standards

Now one of the comments I have received from my first article sideswiped the need for establishing standards in favor of trust or belief in the technology provider’s services. Trust or belief in an IT system that will implement the online MCLE course offerings, cannot, and should not replace the compliance of such IT system with industry standards, evidenced by legitimate third-party certifications, coupled with proven good governance and customer satisfaction.

Finding out the relevant standards and insisting on their compliance, are as much a task for the accredited providers in their negotiation and dealings with the technology providers, and the Supreme Court MCLE Committee, in its oversight or supervisory role.

I must point out that technology providers, particularly those in the cloud industry, can be classified into several entities according to the NIST Cloud Computing Standards Roadmap.

The accredited providers are technically the “cloud consumers”, since they are the ones “that maintain a business relationship with, and uses the service from, a cloud provider”. The accredited provider is the one that “requests the appropriate service, sets up service contracts with the cloud provider, and uses the service” for the benefit of its end users, the MCLE participants.

The technology providers can be classed under the NIST Roadmap either as cloud providers or cloud brokers. A cloud provider is one “responsible for making a service available to cloud consumers. A cloud provider builds the requested software/platform/infrastructure services, manages the technical infrastructure required for providing the services, provisions the services at agreed-upon service levels, and protects the security and privacy of the services”. An example is the Amazon Web Services (AWS).

However, the accredited provider, as a cloud consumer, may not be able to create, and or manage all the services necessary to realize and deliver the MCLE online courses to the MCLE participants. This would probably be the case for most Philippine accredited providers. So, instead of dealing directly with the cloud provider, the accredited provider would enlist the services of a cloud broker. This entity would manage the use, performance, and delivery of cloud services, and negotiate the relationships between cloud providers and the accredited provider. The cloud broker would provide a single interface or platform for multiple cloud services that may be in public, private or hybrid clouds and provided by different providers. An example is the IBM Cloud Brokerage Managed Services.

Two other entities must be mentioned for the sake of completion. A cloud carrier provides connectivity or access between cloud consumers (and their ultimate customers), and cloud providers. The cloud carrier also distributes cloud services through the physical transportation of storage media like high capacity hard drives. It is actually the cloud provider that will contract with the cloud carrier for the appropriate services, including encryption of connections between cloud consumers and cloud providers.

The last is the cloud auditor which the NIST Roadmap designated as the party that can “conduct independent assessment of cloud services, information system operations, performance, and the security of a cloud computing implementation. A cloud auditor can evaluate the services provided by a cloud provider in terms of security controls, privacy impact, performance, and adherence to service level agreement parameters”. This entity is especially crucial for the cloud consumer like an accredited provider which seeks proof of the technical viability of a cloud broker or cloud provider, prior to securing their services.

The Baseline Standards

Currently, there are different standards touted by different organizations concerning the evaluation of cloud computing technologies and environments by cloud customers. This article is not the place to discuss all of these, but I would like to point out a few technological standards that have received many citations from various entities which address the crucial features of cloud services. These standards should be asked by cloud consumers to, and verified by, cloud service providers and cloud brokers, via certifications or at the very least compliance reports.

The Cloud Standards Customer Council advises cloud consumers like accredited providers to look for verification or certification of compliance by cloud service providers/brokers with several ISO/IEC standards.

ISO/IEC 27001 is an advisory standard that is meant to be interpreted and applied to all types and sizes of organizations according to the particular information security risks they face. This is not specific to cloud computing, but its principles can be usefully applied to the provision of cloud services. Some cloud service providers already claim conformance to ISO/IEC 27001, many of them through third-party certifications.

ISO/IEC 27002 is a collection of security controls (often referred to as best practices) that are often used as a security standard. Security controls described in ISO/IEC 27002 highlight the general features that need to be addressed, including asset management, access control and cryptography, to which specific techniques and technologies can then be applied. Accredited providers are advised to look for cloud service providers that conform to the ISO/IEC 27002 standard for physical and environmental security. A company can assert on its own behalf as to its compliance with this standard, but a 3rd party certification is a stronger form of attestation.

ISO/IEC 27017, is the Code of practice for information security controls based on ISO/IEC 27002 for cloud services. It provides guidelines for information security controls applicable to the provision and use of cloud services. Specific guidance is included in ISO/IEC 27017 to clarify cloud service customer and cloud service provider responsibilities. Since this standard is specific to cloud computing, accredited providers should seek cloud service providers with ISO/IEC 27017 certification.

ISO/IEC 27018 is the Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors. As its name entails, it sets specific guidelines, control objectives and controls aimed at protecting PII which is stored or processed by public cloud services. It uses as its bases the principles defined in ISO/IEC 29100 Privacy Framework. Both the Privacy Framework and ISO/IEC 27018 greatly complement the Philippine Data Privacy Law and should be consulted by accredited providers. Since ISO/IEC 27018 pertain to PII of online MCLE participants, accredited providers should verify if the cloud service provider has been certified as compliant of this standard. If not, accredited providers are advised to seek data compliance report from the cloud provider, reflecting the strength or weakness of controls, services, and mechanisms supported by the provider in all security domains.

When it comes to network security requirements, ISO/IEC 27033-1 — Network security overview and concepts; ISO/IEC 27033-2 — Guidelines for the design and implementation of network security; and ISO/IEC 27033-3:2010 — Reference networking scenarios – threats, design techniques and control issues, are quite pertinent. If the cloud service provider has an ISO/IEC 27001 certification, then its conformance to these standards would typically be included in the documentation of its adherence.

Digital certificates and encryption are important aspects of Information Asset Management, in support of public key infrastructure (PKI) and the establishment of trust when using cloud services. Accredited providers should be aware of the support that the cloud service provider has for digital certificates, including PKCS, X.509, and OpenPGP. However, I hasten to add that in the last two years, developments in quantum computing have accelerated, and I would tackle the subject of encryption in a separate article. Suffice it to say that we are now entering the age of quantum computing, and the quantum Internet, where the classical cryptographic systems employed now to protect e-data would no longer be safe.

I would also like to mention that Service Level Agreements (SLA) or Cloud Service Agreements (CSA), which are usually laid down by cloud providers/brokers need to be scrutinized and negotiated by accredited providers. It has been said that these agreements are “often the best indicator of how, and how often, the provider expects their service to fail. Therefore, CSCs (Cloud Service Customers) must remember that downtime, poor performance, security breaches and data losses are ultimately their risks to bear” [Object Management Group, Feb. 2019, Practical Guide to Cloud Service Agreements]. Thus, in my first Comments, I explained the significance of the “9”s in the percentages as they reflect in the expected uptimes and downtimes of a cloud provider service. The standard that should be imposed for this requirement, which should be reflected in the SLA between the accredited provider and the cloud service provider/broker should be 99.999%. This means that the online participant should never expect, and not experience any real downtime at all in accessing the online MCLE seminars 24/7, absent any force majeure or electricity outage that cannot be attributed to the fault or negligence of the cloud provider.

Conclusion:

The provision of MCLE online courses all over the Philippines must be professionalized. And this could only be done by adhering to technical and industrial standards that pertain to the delivery of services by technology providers, to which they must be held accountable. It is high time that the accredited providers and the Supreme Court, through its MCLE Committee, be cognizant of these standards that can ensure not only professionalism, but assist in meeting the needs of Philippine lawyers.

Lawbyte 112: ENCRYPTION OR CRYPTOGRAPHY AS A HUMAN RIGHTS AND PRIVACY TOOL AGAINST GOVERNMENT ABUSES AND CYBERPRIVACY PREDATORS, WHAT THE NATIONAL COMMISSION ON PRIVACY, DTI AND DCIT MUST DO, AND IBP BULACAN’S HUMANITARIAN OUTREACH PROGRAM

Over the last five years and since the start of this year, I have informed all the people who have attended and cared enough to listen to my lectures and guest stints in different fora about the importance of cryptography, which is all about the science and art of encrypting messages, documents and images, in mathematical algorithms, and in some cases with biological, DNA, and nanomolecular ciphers, to retain the secrecy of the encrypted data, and prevent unauthorized eyes (of embittered spouses, disgruntled employees, curious hackers, nefarious crackers, unfriendly and friendly governments) from discovering the content, which could mean the saving or wrecking of countless lives, the toppling of dictatorships and the crashing of economies.

The Private Launching of my book on Cryptology

The discussion of the science and law of cryptography is central to my most recent book “Cryptology: The Law and Science of Electronic Secrets and Codes”, which I am glad to say, finally saw the light of a launching, albeit privately, last June 18, 2016 at the Makati Shangrila, during the General Assembly of the Philippine Australian Alumni Association (PA3i) members from all parts of the Philippines. In this private launching, I apprised the PA3i members of the essential hows and whys of cryptography and its impact on their lives. Since the theme of the event pertains to the fundamental bonds of friendships and links between the Philippines and Australia, I stated that my cryptology book could not have been written by me, without the influence of Australia on me, personally and professionally.

The private launching of Dr. Ramiscal's CRYPTOLOGY book during the PA31General Assembly at MAKATI SHANGRILA, June 18, 2016

The private launching of Dr. Ramiscal’s CRYPTOLOGY book during the PA31General Assembly at MAKATI SHANGRILA, June 18, 2016

I was introduced to cryptology via my “Law and Internet” Master class way back in 1999 where the first word I deciphered using the PGP software was “apple”. The ramifications of this technology and the multidisciplinary fields that gave rise to it shook me to the core! I remember staying up way into the morning and staring at the Brisbane river as the sun rises, thinking that Einstein and Heisenberg were on some kind of intellectual drug for them to come up with otherworldly theories that have seen some awesome demonstrations as the years have gone by. It was in Australia where I felt real genuine freedom in academic research and inquiry, and I am forever grateful to the University of Queensland and its law faculty for supporting me in my Master of Laws (Advanced) and my Ph.D in law studies and research. Australia is one of those countries that have a sophisticated understanding of the grasp and reach of cryptology. As part of my recommendations in my book, I proposed that the Philippine government should look into the Australasian Information Security Evaluation Program (AISEP) used in Australia that reviews, among others, the source codes of cryptographic products. The Defense Signals Directorate (DSD) conducts a DSD Cryptographic Evaluation (DCE) “to analyse a product to determine whether the security architecture and cryptographic algorithms used have been implemented correctly and are appropriately strong for the product’s intended use by the recommending government agency.” This efficient and effective program is light years apart from the way that the COMELEC had handled source code reviews for the Automated Election Systems used in the 2010, 2013 and 2016 elections.

Dr. Atty. Noel G. Ramiscal with Her Excellency, the Australian Ambassador Amanda Gorely, June 18, 2016

Dr. Atty. Noel G. Ramiscal with Her Excellency, the Australian Ambassador Amanda Gorely, June 18, 2016

My great appreciation to Her Excellency, the indefatigable and inimitable Australian Ambassador Amanda Gorely!
Heartiest thanks are in order to the brilliant and generous officers of PA3i, most especially to Ms. Vivian Valdez, Mr. Arvin Yana, Col. Ariel Querubin, Atty. Teresita Tuazon, Dr. Jean Loyola, Mr. Vic Badoy, Ms. Abee Generao and Mr. Ramon Santos, and of course to the fabulous PA3i members, some of whom are Drs. Rey Ramos, Fe Hidalgo, Wendell Capili and Emanuel Florido, Attys. Ma. Nena German and John Titus Vistal, Messrs. Joey Baril, Jay Juan, Edson Lopez, Greg Quimio, Kitz Arellano, Jong Belano, Ruel Limbo, the spouses Freddie and Norma Fajardo, Ms. Neri Torreta, and Ms. Dane Zuyco (apologies to the very many whose names I cannot remember). Congratulations as well to all 2016 Australian Alumni Awards Nominees and Winners, some of whom I had been privileged to meet, including, Ms. Loda Grace Dulla, Mr. Arsenio Ella and Chief Inspector Kimberly Molitas! They all make us proud!


How Cryptography has become a Crucial Liberation Technology

I expounded on the extent of cryptography and its significance in the digital global world in my MCLE lectures for the Philippine Deposit Insurance Corporation (January 28, 2016), the Arellano Law Foundation (February 27, 2016), the IBP Leyte (April 29, 2016), the IBP Negros Oriental (May 17, 2016), UP IAJ (July 2, 2016), the IBP Lanao del Norte (July 12, 2016), the ACLEx (July 22, 2016) and the most recent being the IBP Bulacan Chapter (July 23, 2016).

Dr. Ramiscal's MCLE Lecture on Cryptology for the ALF, MIDAS HOTEL, FEB 27 2016

Dr. Ramiscal’s MCLE Lecture on Cryptology for the ALF, MIDAS HOTEL, FEB 27 2016

I strove to explain the mathematical and scientific bases for the cryptographic products that are being sold or developed by research institutions in different parts of the world, and how the multidisciplinary fields and endeavors that nurture cryptology are being threatened by the stringent export and licensing restrictions of countries implementing the Wassenaar Arrangement, which was geared at stopping the flow of cryptographic products to states that have known terrorist elements.

Dr. Atty. Noel G. Ramiscal's MCLE lecture at PDIC last JANUARY 28, 2016

Dr. Atty. Noel G. Ramiscal’s MCLE lecture at PDIC last JANUARY 28, 2016

To be candid, this is easy to understand. There are infamous criminals and criminal activity that rely on cryptology to assure their continued operations. Cryptographic products have been implicated in drug trafficking, human trafficking, arms trafficking, online child pornography, murders for hire, and a slew of criminal conduct. It was said that the late Osama bin Laden used to send his extermination orders via encrypted text messages.

But, cryptography is also a beacon of hope, trust, and survival. As a tool for securing basic human rights to life, liberty, security and privacy, I highlight the fact that many international human rights organizations including Amnesty International rely on strong cryptographic software to secure their information. The Onion Router (TOR) system which relies on a system of virtual encrypted channels operated by exit node operators has been considered a crucial “liberation” technology. This allows a tool for the masses to reveal government corruption, oppression, tortures and killings motivated by politics, religion, money and greed, and escape the censorship and wrath of these governments. In the memorable Arab Spring, I tell and show the audiences of the tragic story of Neda Agha Soltan, a woman targeted by a Basilij sniper, all because she loved to sing passionately, about her life in Iran, and how the video of her murder and the picture of her dead face with the disjointed eyes, managed to get worldwide circulation, through the TOR system. That was one of the crucial moments when millions of people all over the globe became overnight activists and Neda Agha Soltan became an iconic image of the oppressed and silenced victims of tyranny and intolerance everywhere.

Dr. Ramiscal's CRYPTOLOGY lecture for UPIAJ, July 2, 2016

Dr. Ramiscal’s CRYPTOLOGY lecture for UPIAJ, July 2, 2016

Finally, cryptography is a first line of defense against all forms of unwarranted and illegal access or intrusions into the personal, sensitive information of natural and juridical persons. It is also a technology that is at the core of many personal and business transactions that involve currency. As I point out in all my lectures, every time anyone types their PIN or access codes into an ATM or secure website, cryptographic techniques are employed. I apprised the lawyers who attended my IBP Bulacan lectures last July 23, 2016, that cryptography is also at the heart of the Europay Mastercard Visa (EMV) chip cards that the Bangko Sentral ng Pilipinas have mandated all Philippine banks to roll out by January 2017! I also mentioned this fact in my July 22, 2016 lecture for the ACLEx. Apparently, this fact is not well known among the lawyers in these two fora, because only one lawyer professed to know about this.

Dr. Noel G. Ramiscal donating a copy of his Cryptology book to the CEU Law Library thru ACLEX's Mr. Canata

Dr. Noel G. Ramiscal donating a copy of his Cryptology book to the CEU Law Library thru ACLEX’s Mr. Canata

The importance of cryptography in all our lives is such that I have been donating copies of my books to several universities in the Philippines as part of my advocacies as a Law and I.T. Evangelist to spread the word about the proper appreciation and ethical use of cryptography. Greatest gratitude to the UP IAJ, the different IBP Chapters all over the Philippines, the ALF, and the ACLEX for providing me with the opportunity to impart the current trends and important rules that pertain to the protection of the rights of digital denizens to my fellow brothers and sisters in Law and Life!

DR. ATTY. NOEL G. RAMISCAL DONATING COPY OF HIS CRYPTOLOGY BOOK TO ARELLANO LAW LIBRARY THRU ALF

DR. ATTY. NOEL G. RAMISCAL DONATING COPY OF HIS CRYPTOLOGY BOOK TO ARELLANO LAW LIBRARY THRU ALF

What the National Privacy Commission (NPC), Department of Trade and Industry (DTI), and the Department of Communication Information Technology (DICT) should do to secure the e-data of millions of Philippine citizens from security breaches

In the Philippines, the awareness of cryptography began with the famous case filed by Atty. Harry H. Roque Jr. (who is now a Congressman) against the Commission on Election (COMELEC) in the latter’s use of the AES machines in 2009. Due to the current hearings on the I.R.R. on Data Privacy Law, interest in cryptography has newly arisen.

In my lecture for the MERALCO lawyers last June 24, 2016, on the “Legal Challenges and Complications of the Data Privacy Law”, I told the lawyers that I have been involved with the Data Privacy bills that were being pushed since 2008. In fact I was even a Technical Consultant of the former Commission on Information Communication Technology (CICT) and wrote a white paper on the cyberprivacy bills, before the CICT was downgraded into the ICTO and now formally elevated to the DCIT. This law mentioned “encryption” only once. I protested the fact that it only required encryption of data for purposes of off-site access (see Sec. 23, 3). This huge oversight has apparently been fixed in the current modification of the I.R.R., which has yet to be passed by the NCP.

The security breach of the unique personal information of the over forty million Philippine voters contained in the COMELEC database by Anonymous Philippines, and the subsequent irresponsible, unwarranted and illegal publication of these pieces of information by a U.S. website (wehaveyourdata.com) underscore the grave need to understand cryptography and how it could be used to protect the information of Philippine citizens, and the accountability and criminal liability of irresponsible government agencies. The State of the Nation Address (SONA) of President Duterte last July 25, 2016 showed how keenly he believes that computers and I.C.T. products can actually prevent corruption and lead to efficient public service.

My book traces the legal issues concerning the cryptographic features of the AES machines and the veritable absence of any comprehensive source code reviews by Philippine legitimate source code reviewers since the Roque case up to the 2015 Pabillo case and ties all the related issues, to come up with several major proposals that are quite valid and useful in the legal, political and social milieu of the Philippines after the 2016 elections.
Cryptology front cover
These proposals include overhauling the cryptosystem evaluation of any I.C.T. products that will be sold or used in the Philippines, and making the source code reviews for these products, not a piecemeal process, nor a per agency process, but a systematic process to be overseen by the three agencies I identified, which are the NPC, the DTI and the former Information Communication Technology Office, which has now been upgraded to the DCIT. This must be done to prevent the monumental fiascos committed by the COMELEC in its handling of the source code reviews of the AES machines in the past three automated elections from ever happening again. The justifications and the extensive details of my proposal are in my book.

For this article I desire to emphasize that these agencies, particularly the NPC, must consider not only the AISEP program I referenced earlier, but also the U.S. and Canadian Cryptographic Module Validation Program (CMVP) which the US National Institute of Standards and Technology (NIST) and the Communications Security Establishment Canada (CSEC) jointly developed, and the process observed by the Communications-Electronics Security Group (CESG) in the United Kingdom which conducts the CESG Assisted Products Service (CAPS) on cryptographic products. Together with AISEP, these systems or processes establish I.C.T. standards in the proper review of source codes of cryptographic goods.

Another matter that these agencies must look into are the practices of these governments in choosing the right set of cryptographic products to safeguard the data of their respective governments and citizens. The U.S. and Australian government have, for example, selected a suite of cryptographic technologies that are suited for protecting the security, integrity and non-repudiability of different types of electronic data, including digital signatures. These are very important, specially for the NCP, because its I.R.R. placed it as the lead agency when it comes to setting the guidelines for data protection and encryption [See Sec. 9, a., 1. Rule III].

The IBP Bulacan Chapter’s Humanitarian Outreach Program

One of the best things about taking my advocacies to the road is the opportunity to meet new people as well as get in touch with former classmates and schoolmates who are doing so well, not only in their personal and professional lives but in their advocacies as well.

Dr. Atty. Noel G. Ramiscal's Cryptology MCLE Lecture for IBP Bulacan, July 23, 2016

Dr. Atty. Noel G. Ramiscal’s Cryptology MCLE Lecture for IBP Bulacan, July 23, 2016

I was in Bulacan last year and totally enjoyed myself in my MCLE lectures. This year, I was truly amazed at the huge and warm support I got from the lawyers attendees, with the added bonus of seeing and conversing for quite some time with one of my classmates in UP Law, Atty. Pingki Bartolome Bernabe, who was the past IBP Bulacan President. Pingki is one of those kind, brilliant, creative souls, who would do wonders in her life, no matter what profession she is in. She was one of the very few people I could talk with in law school and I felt she never judged me in any way, which meant so much to me during that trying time. My mom and I were quite fortunate and appreciative in joining her in the ride back to Manila in her SUV. She’s got four amazing children, a doting husband, a successful career and a wonderful advocacy that has blossomed into a thriving movement in IBP Bulacan.

Dr. Ramiscal with current IBP Bulacan Pres. Atty. Topico, the past IBP Pres. Atty. Bartolome Bernabe and a lawyer gentleman from Bulacan, July 23 2016

Dr. Ramiscal with current IBP Bulacan Pres. Atty. Topico, the past IBP Pres. Atty. Bartolome Bernabe and a lawyer gentleman from Bulacan, July 23 2016

She and the current IBP Bulacan President, the dashing and jovial Atty. Arni Topico, and several other lawyers (including the fabulous Atty. Francine Longid and the suave Atty. Paul Alcudia) have banded together, and through their own resources have given lectures and pro bono services to our overseas foreign workers stationed in different countries. They have been tapping into the international network of pro bono lawyers with strong positive results, working with foreign lawyers and helping acquit some of our countrymen criminally charged in other countries and creating goodwill for our country by helping foreign nationals who get into legal trouble in the Philippines. This year, their group will be presenting a paper in an international conference and will participate in a European summit on pro bono/legal aid service. They are performing a very specialized service that answers a niche need that should be emulated by other IBP Chapters and recognized by the Supreme Court. I am so proud and uplifted by the accomplishments of this group of devoted, exceptional lawyers! May their initiative be blessed with more connections and the necessary funds to make it sustainable! This is a perfect example of lawyers bettering the world with their talents! May their tribe increase and prosper!

Dr. Atty. Ramiscal with the great IBP Bulacan officers, July 23 2016

Dr. Atty. Ramiscal with the great IBP Bulacan officers, July 23 2016

As always, thank you to the excellent IBP staff of Bulacan, Ms. Aida Oasay, and IBP National, Ms. Flora Arguson. To all the wonderful, gorgeous IBP Bulacan lawyers I met last July 23, 2016, and the great IBP Bulacan officers, I would like to say that it was truly a privilege and an honor to have served as one of your MCLE lecturers! I am genuinely moved by your generousity of Spirit and Kindness. Ilah’s dulce de leche and Eurobake’s inipit, were good, Rosalie’s Suman sa Pinipig were heavenly, but Il-Jamie’s crispy pata is worth coming all the way from Laguna to Bulacan! Thank You! God Bless Us! Insha Allah!