Counterfeit Goods Complaint and Cyber Libel Case Against Online Seller Philippines

1) The typical scenario

A buyer purchases branded goods from an online seller (marketplace, social media shop, messaging app). The item arrives and appears fake (counterfeit) or materially misrepresented. The buyer seeks a refund, reports the seller to the platform, or posts a warning online. In response, the seller may:

  • deny the counterfeit claim,
  • threaten or file cases (often cyber libel, sometimes grave threats, unjust vexation, or data privacy-related complaints), and/or
  • continue selling the same allegedly counterfeit items.

This creates two intersecting legal tracks:

  1. Counterfeit goods / IP enforcement (plus consumer/fraud claims), and
  2. Cyber libel (defamation online), frequently arising from public posts, reviews, “exposé” threads, or statements in group chats.

2) Key Philippine laws that usually apply

A. Intellectual Property (the core “counterfeit” framework)

Intellectual Property Code of the Philippines (Republic Act No. 8293, as amended) is the central law. Counterfeits typically implicate:

  1. Trademark infringement Selling, offering for sale, distributing, or using a mark confusingly similar to a registered trademark—especially for the same or related goods.

  2. Unfair competition Even without proving a registered mark, liability can arise if the seller passes off goods as those of another, uses deceptive packaging/get-up, or otherwise causes confusion.

  3. False designation / misleading representation Claims like “authentic,” “original,” “OEM” (when used to suggest brand-origin), fake receipts/certificates, or misleading tags can strengthen the case.

  4. Copyright infringement (sometimes) Common where the product includes pirated content or copied protected designs/artwork/manuals/labels—though many “counterfeit” disputes are trademark-centered.

Important practical note: In many IP cases, the brand owner/registrant (or authorized licensee) is the strongest complainant. A buyer can still report and complain through consumer/fraud channels, but IP enforcement is typically most direct when pursued by the rights-holder.


B. Consumer protection (buyer-centered remedies)

Consumer Act of the Philippines (RA 7394) can apply when consumers are sold goods that are unsafe, deceptively marketed, misbranded, or not in conformity with standards/labels. It is also relevant for:

  • deceptive sales practices,
  • misleading advertisements,
  • warranty/refund disputes (depending on facts and representations).

DTI processes can be used for consumer complaints (refund/replace/stop deceptive practice), often faster and more settlement-oriented than criminal litigation.


C. Fraud-related crimes (fact-dependent)

Depending on the representations and intent, a counterfeit-sale dispute can overlap with:

  • Estafa (fraud) under the Revised Penal Code, where deceit induced the buyer to part with money, and damage resulted.
  • Other related offenses (rarely used as primary tools compared to IP/consumer routes).

D. Online/digital evidence and cybercrime enforcement

  1. E-Commerce Act (RA 8792) Recognizes electronic data messages/documents and supports enforceability of e-transactions.

  2. Rules on Electronic Evidence Critical for admissibility of screenshots, chats, transaction logs, URLs, timestamps, and authentication.

  3. Cybercrime Prevention Act (RA 10175) Covers various cyber offenses and procedures; most relevant here is cyber libel.


E. Cyber libel (the retaliation case—and sometimes a real claim)

Cyber libel is essentially libel committed through a computer system. Libel originates in the Revised Penal Code; RA 10175 provides the cyber element and generally increases penalties.

Typical cyber libel triggers in marketplace disputes:

  • Posting “SCAMMER,” “FAKE SELLER,” “COUNTERFEIT,” “MANDARAYA,” etc., plus identifying details.
  • Posting accusations of criminal conduct without careful phrasing/supporting facts.
  • Viral posts tagging employers, family, or publishing personal info (which may also implicate data privacy).

Cyber libel is not automatically “invalid” just because the product is fake. The legal issue becomes whether the statement is defamatory, identifiable, published, and made with the required mental element—plus whether defenses apply.


3) Choosing the right cause of action (counterfeit side)

Option 1: Platform enforcement (fastest immediate containment)

  • Report listing/account; request takedown.
  • Provide evidence (photos, brand authentication, chat logs).
  • Ask platform to preserve logs/data (where possible).
  • This is not a substitute for legal action but helps stop ongoing sales.

Option 2: Administrative IP complaint (rights-holder-driven, often efficient)

For trademark-based complaints, an administrative route through IPOPHL may be available and can lead to orders, penalties, and enforcement measures depending on the case type and forum. This route is commonly used by brand owners and can be more specialized than ordinary courts.

Option 3: Criminal IP complaint (strong deterrent, higher burden and complexity)

If the facts support criminal trademark infringement/unfair competition:

  • A complaint is filed for preliminary investigation (typically with the prosecutor’s office).
  • If probable cause is found, the case proceeds to court.
  • This route can support warrants and seizures (subject to strict rules).

Option 4: Civil IP action (injunction + damages + destruction)

Civil cases are useful when the main objectives are:

  • stop sales immediately (injunction),
  • recover damages, and/or
  • impound/destruction of counterfeit goods and paraphernalia.

Option 5: Consumer complaint / DTI mediation (buyer remedy-focused)

Best when the main goal is refund/replace and corrective action, and the matter is relatively contained.

Option 6: Estafa/fraud complaint (when deceit is clear and provable)

Useful when:

  • there are explicit deceptive representations (“authentic,” “with official receipt,” fake certificate),
  • the seller’s intent to defraud is inferable,
  • there is clear damage and reliance.

4) Cyber libel: what must be proven (and what usually fails)

Elements typically litigated

Cyber libel generally tracks classic libel elements, plus the online medium:

  1. Defamatory imputation The statement tends to dishonor, discredit, or expose a person to contempt/ridicule.

  2. Identification The complainant is identifiable—by name, handle, photos, shop link, or contextual clues.

  3. Publication Communicated to a third person (posts, reviews, group chats, public comments, stories).

  4. Malice In libel, malice is often presumed, but defenses can rebut it (e.g., privileged communication, fair comment, good faith).

  5. Cyber element Use of a computer system / online publication.

Common defenses in marketplace disputes (fact-sensitive)

  • Truth + good motives and justifiable ends (not just “it’s true,” but also proper purpose and good faith).
  • Fair comment / opinion on matters of public interest (stronger when clearly opinion and based on disclosed facts).
  • Qualified privileged communication (limited contexts; not a blanket shield).
  • No defamatory meaning (purely factual statement without defamatory sting, or phrased as a question/uncertainty).
  • No identification (too vague to identify complainant).
  • No publication (sent only to complainant, not to third parties).

Practical reality: phrasing matters

Courts tend to scrutinize tone, certainty, and insinuations. Compare:

  • Riskier: “X is a scammer selling fake items. Criminal.”
  • Safer (still not risk-free): “I ordered from X on [date]. The item I received appears not authentic based on [observable reasons]. I requested a refund and reported it to the platform.”

Also, posting private messages, threats, or personal data can create additional liabilities (harassment/threats/data privacy), even if the counterfeit claim is accurate.


5) Evidence: what wins (and what gets excluded)

A. Evidence for counterfeit / misrepresentation

Strong evidence often includes:

  • Test-buy documentation: order confirmation, invoices, tracking, payment records.
  • Unboxing video (continuous, showing package condition, labels, contents).
  • High-resolution photos: logos, serials, stitching/printing, packaging, inserts.
  • Comparative proof: side-by-side with authentic item; official brand identifiers.
  • Authentication letter/affidavit from the brand owner/authorized distributor or an expert.
  • Screenshots of listing: product description, “authentic/original” claims, photos, price, seller name, date/time, URL.
  • Chat logs: promises of authenticity, refusal of refund, admissions, threats.

B. Evidence for cyber libel

  • Screenshots are not enough by themselves if authenticity is challenged. Improve evidentiary value by capturing:

    • URL, date/time, account handle, post context, and comments,
    • multiple captures showing continuity,
    • device/system details where possible.
  • Affidavits explaining how the evidence was obtained and preserved.

  • Linking the account to the person (a frequent weak point): delivery details, payment accounts, platform KYC, prior communications.

C. Preserving electronic evidence (crucial)

Because posts can be deleted and accounts can vanish:

  • Preserve immediately (screenshots, screen recording, saving HTML where possible).
  • Keep original files and metadata (avoid repeatedly re-saving).
  • Maintain a clear timeline and storage chain.

6) Where to file in practice (and what each forum is good for)

Counterfeit / IP track

  • Platform reporting: quickest takedown attempt.
  • IP administrative/civil/criminal routes: best pursued with rights-holder participation.
  • Prosecutor’s office: for criminal cases; expect preliminary investigation, counter-affidavits, hearings.
  • Courts: civil injunctions/damages; criminal prosecutions.

Buyer remedy / consumer track

  • DTI (consumer complaint/mediation): practical for refund/replace and corrective actions.

Cyber libel track

  • Prosecutor’s office: complaint-affidavit + evidence; preliminary investigation process.
  • Cybercrime units (NBI/PNP): often involved for technical support, identification, and evidence handling depending on circumstances.

7) Strategy when BOTH counterfeit and cyber libel are in play

If the buyer wants to complain about counterfeits but avoid cyber libel exposure

  1. Prioritize private dispute channels first Refund demand, platform dispute resolution, DTI complaint.

  2. Use careful, factual language Describe the transaction and observable facts. Avoid:

    • declaring crimes (“estafa,” “criminal syndicate”) unless already supported by formal findings,
    • insults (“mandaraya,” “magnanakaw”)—these invite libel framing.
  3. Document everything before any public post Public posts are often the basis of cyber libel complaints.

  4. Coordinate with the rights-holder Brand owners have clearer standing for trademark enforcement and stronger authentication.

If the seller filed cyber libel as retaliation

Common defense approach focuses on:

  • showing factual basis and good faith,
  • demonstrating that statements were opinion based on disclosed facts,
  • proving lack of malice / absence of defamatory imputation,
  • disputing identification and account attribution when appropriate,
  • challenging weak evidence (unauthenticated screenshots, missing URLs/timestamps).

If the buyer also has a cyber libel or related claim against the seller

This sometimes happens when the seller:

  • posts the buyer’s name/photo/address (possible data privacy issues),
  • threatens violence (possible grave threats),
  • publicly accuses the buyer of crimes.

8) Remedies and consequences (what outcomes look like)

Counterfeit / IP cases may lead to:

  • Injunctions stopping sales/ads/listings,
  • Seizure/impoundment of goods and paraphernalia (court-controlled and rule-bound),
  • Destruction of counterfeit goods,
  • Damages (actual damages, possibly other forms depending on the case),
  • Criminal penalties (fines/imprisonment) in appropriate cases.

Cyber libel cases may lead to:

  • Criminal prosecution (with the possibility of arrest if warrants issue, subject to procedure),
  • Bail and court appearances,
  • Civil damages (often included or pursued separately depending on strategy).

Settlement is common in both tracks, but outcomes depend on prosecutorial discretion and court approval. An affidavit of desistance often helps in practice, but it does not automatically erase a case once filed.


9) Practical step-by-step playbook (Philippines)

A. Filing/advancing a counterfeit complaint (buyer + rights-holder aligned)

  1. Preserve proof: listing screenshots (URL/time), payment, delivery, chats, unboxing.

  2. Authenticate: brand confirmation/expert evaluation whenever possible.

  3. Stop the bleed: platform report + request takedown.

  4. Demand letter: refund + cease selling + preserve records (tone matters).

  5. Choose forum:

    • consumer/DTI for buyer remedy,
    • IP administrative/civil/criminal (ideally with rights-holder).
  6. Prepare affidavits: clear chronology, attach exhibits, explain how evidence was gathered.

  7. Be ready for counter-allegations: cyber libel threats are common—keep communications professional.

B. Responding to a cyber libel complaint

  1. Secure copies of the alleged defamatory material exactly as posted.
  2. Map each element: defamatory imputation, identification, publication, malice, cyber element.
  3. Assemble defenses: truth/good faith; opinion; privileged context; lack of identification/publication; absence of malice.
  4. Validate evidence: challenge unauthenticated screenshots and unclear attribution.
  5. Avoid escalation: do not post more statements while the matter is pending.

10) Common mistakes that derail cases

In counterfeit complaints

  • No authentication (only “it looks fake”).
  • No preserved listing page/URL/timestamps.
  • Weak chain of custody for the item (can’t show it’s the same item received).
  • Not involving the rights-holder when trademark issues are central.

In cyber libel cases (either side)

  • Overstating claims (“criminal,” “thief,” “syndicate”) instead of sticking to verifiable transaction facts.
  • Posting personal data (may open a separate, serious legal problem).
  • Assuming anonymity online prevents identification (platform logs, payment trails, delivery details often connect dots).

11) Writing about counterfeits safely (when consumer warnings are the goal)

To reduce cyber libel risk while staying truthful:

  • State dates, platform, order number (if safe), and what was received.
  • Use observable facts (“missing serial,” “packaging inconsistent,” “material differs”) and attach photos.
  • Describe actions taken: “requested refund,” “reported to platform,” “filed DTI complaint,” etc.
  • Avoid labeling the person with crimes or insults.
  • Avoid doxxing.

12) Final note (important)

This topic sits at the intersection of IP law, consumer law, criminal procedure, and cybercrime, where small factual differences change outcomes. If an actual complaint is being prepared or defended, the best next step is to assemble the complete evidence set (listing URL/time, chats, proof of payment, delivery, item, authentication) and have it assessed for the strongest forum and least-risk narrative.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.