Introduction
In the Philippines, the unauthorized use of an electronic signature can give rise to criminal liability, but the legal analysis is not always simple. There is no single short rule that says every misuse of an electronic signature is punished in exactly the same way. Instead, liability usually depends on the nature of the electronic signature, how it was used, what document or transaction was affected, whether there was fraud or deceit, whether computer systems were unlawfully accessed, and which criminal statute best fits the act.
In Philippine law, the subject sits at the intersection of:
- the Electronic Commerce Act,
- the Rules on Electronic Evidence,
- the Cybercrime Prevention Act,
- the Revised Penal Code,
- special laws on access devices, falsification, fraud, privacy, and data misuse,
- and ordinary principles of criminal intent, authorship, and proof beyond reasonable doubt.
This article explains the Philippine legal framework on criminal liability for unauthorized use of an electronic signature, including the meaning of electronic signatures, the kinds of unauthorized acts covered, the possible criminal offenses, evidentiary issues, corporate and employment settings, and the practical problems that arise in prosecution.
I. What Is an Electronic Signature Under Philippine Law
An electronic signature is broadly understood as electronic data or a method in electronic form that is attached to or logically associated with an electronic document and used by a person to authenticate or approve that document.
The concept is much broader than a scanned handwritten signature.
In practice, an electronic signature may take forms such as:
- a typed name used as signature in an electronic document,
- a scanned image of a handwritten signature,
- a digital signature based on cryptographic methods,
- a click-to-sign process,
- a signature pad capture,
- a one-time-password-based confirmation,
- a certificate-based signature,
- or another electronic method adopted to authenticate an electronic act or record.
This broad coverage matters because unauthorized use may occur even without sophisticated hacking. A person may commit a punishable act by simply taking another person’s signature image, using another person’s signing credentials, or falsely causing a system to register approval as if it came from the real signatory.
II. Why Unauthorized Use of an Electronic Signature Is Legally Serious
Unauthorized use of an electronic signature is serious because a signature, whether physical or electronic, performs core legal functions. It can:
- identify the signer,
- indicate consent,
- authenticate a document,
- bind a party to contractual obligations,
- authorize payment or transfer,
- approve internal corporate action,
- consent to disclosure,
- submit reports to government agencies,
- or create documentary evidence with legal consequences.
When someone uses another person’s electronic signature without authority, the act can produce harm far beyond mere imitation. It may result in:
- fraudulent contracts,
- unauthorized fund transfers,
- falsified corporate approvals,
- fake government submissions,
- procurement fraud,
- employment or payroll fraud,
- tax-related irregularities,
- and data or privacy breaches.
Because of this, the law may treat the act as a form of fraud, falsification, identity misuse, computer-related offense, or another crime depending on the facts.
III. The First Principle: Unauthorized Use Is Not Just a Technical Violation
A common mistake is to think unauthorized electronic signing is only an internal compliance issue or a civil matter. That is not correct.
In Philippine law, unauthorized use of an electronic signature can trigger:
- criminal liability,
- civil liability for damages,
- administrative liability,
- employment sanctions,
- and in some cases regulatory or professional consequences.
An employee who uses a manager’s electronic signature to approve a purchase order is not merely violating office policy. Depending on the facts, that conduct may amount to falsification, estafa, cybercrime, or other criminal wrongdoing.
Likewise, a person who accesses another’s email or signing account and uses it to sign a contract may be committing more than one offense at the same time.
IV. The Main Legal Sources in Philippine Law
Criminal liability for unauthorized use of an electronic signature does not come from only one statute. The possible legal sources are usually drawn from several bodies of law.
A. Electronic Commerce law
Philippine law recognizes the legal validity of electronic documents and electronic signatures. Because the law gives legal effect to electronic signatures, their misuse can also produce legal and criminal consequences.
B. Rules on Electronic Evidence
These rules help courts determine how electronic signatures and electronic documents are authenticated and proven. They do not by themselves define all crimes, but they are crucial in litigation.
C. Cybercrime law
Where the unauthorized use involves computer systems, data interference, unauthorized access, computer-related fraud, or computer-related forgery, cybercrime law becomes highly relevant.
D. Revised Penal Code
Traditional crimes such as estafa, falsification, use of falsified documents, and similar offenses may still apply, even if committed through electronic means.
E. Other special laws
Depending on the facts, laws on access devices, privacy, banking secrecy-related conduct, data protection, and industry regulation may also come into play.
V. Is There a Specific Crime Called “Unauthorized Use of Electronic Signature”
Not always in that exact label.
In many cases, Philippine prosecutors and courts will not treat the case as a free-standing offense called simply “unauthorized use of electronic signature.” Instead, they will ask:
- What exactly was done?
- Was there false representation?
- Was the electronic signature used to fabricate or falsify a document?
- Was a computer system accessed without authority?
- Was money or property obtained through deceit?
- Was a digital certificate misused?
- Was confidential data accessed or altered?
- Was there identity theft-like conduct?
The offense charged will usually be the crime that most accurately captures the conduct.
So the same act of unauthorized electronic signing may be prosecuted differently depending on its context.
VI. Core Forms of Unauthorized Use
Unauthorized use of an electronic signature commonly appears in several forms.
1. Signing in another person’s name without permission
This may involve typing the person’s name, pasting a signature image, or using their signature credentials.
2. Using a scanned handwritten signature without authority
A person may take a scanned signature from an old document and paste it into a new one.
3. Using another person’s digital certificate or cryptographic signing token
This is especially serious because it directly impersonates the authorized signer in a technically authenticated environment.
4. Logging into another person’s email, portal, or workflow account and signing as them
This often combines unauthorized access with false signing.
5. Causing a system-generated approval to appear as though the real signatory consented
This may occur through credential theft, password sharing abuse, or workflow manipulation.
6. Reusing a signature that was originally authorized for one document on a different document
Authority to sign one document does not automatically mean authority to sign another.
7. Altering an electronically signed document after execution
Even if the original signature was real, later unauthorized alteration may amount to forgery, falsification, fraud, or use of falsified electronic records.
VII. The Importance of Authority
The central legal question is often authority.
Not every use of another person’s electronic signature is criminal. In some organizations, there may be valid delegated signing authority, pre-authorized use, facsimile signing arrangements, or digital workflow permissions.
The real question is whether the act was:
- authorized,
- impliedly authorized,
- ratified,
- mistakenly but honestly done,
- or knowingly done without authority.
Criminal liability typically requires more than a mere technical irregularity. The prosecution generally needs to show that the accused knowingly used the signature without lawful authority and under circumstances amounting to a criminal offense.
Thus, an accidental clerical use of the wrong saved signature file is not the same as intentionally using the CEO’s electronic signature to divert funds.
VIII. Electronic Signature Misuse as Falsification
One of the strongest bases for criminal liability is falsification.
In Philippine law, falsification generally involves making it appear that a person participated in an act or document when that person did not in fact do so, or making untruthful statements in documents under circumstances punishable by law, or altering genuine documents in ways that affect their integrity.
Applied to electronic signatures, falsification may occur where a person:
- makes it appear that another person electronically signed a document,
- attaches a false signature to an electronic contract,
- alters an electronic document after signing,
- fabricates approvals or certifications,
- or submits a false electronically signed record as genuine.
The fact that the document is electronic does not make falsification impossible. The legal wrong remains the same: making a false document or false appearance of authorship or assent.
IX. Can an Electronic Document Be Falsified Like a Paper Document
Yes, in principle.
Philippine law recognizes electronic documents as legally meaningful. Once the law recognizes them as valid documentary instruments, their falsification or fraudulent use can also be legally actionable.
The method differs from paper forgery, but the legal harm is similar. Instead of forging ink on paper, the offender may forge:
- the identity of the signer,
- the signing credentials,
- the digital certificate,
- the electronic approval trail,
- the metadata,
- the contents of the file,
- or the electronic context that makes the document appear authentic.
This is why electronic signature misuse is often analyzed as the digital equivalent of signing another person’s name or fabricating documentary consent.
X. Computer-Related Forgery
Where the act involves creating or altering electronic data so that it appears authentic when it is not, computer-related forgery may become relevant.
This is especially likely where the offender:
- inserts false electronic signatures into files,
- manipulates digital records to make them appear signed,
- alters electronically signed records,
- changes metadata or timestamps,
- creates false certificate-based signing appearances,
- or causes automated systems to register a false approval trail.
Computer-related forgery is particularly important because electronic signature abuse often happens through data manipulation rather than traditional pen-and-paper forgery.
XI. Computer-Related Fraud
If the unauthorized use of the electronic signature was meant to obtain money, property, credit, services, approval, or other benefit through deceit, the conduct may constitute computer-related fraud.
Examples include:
- signing electronic disbursement approvals to release company funds,
- electronically signing vendor forms to cause payment to a fake supplier,
- signing a loan or guarantee in another person’s name,
- using another’s signature to authorize online asset transfer,
- or causing a system to process transactions through false approval.
In these cases, the signature misuse is not the whole story. It is part of a fraudulent scheme.
XII. Estafa and Deceit-Based Liability
Even outside specific cybercrime provisions, unauthorized electronic signing may also amount to estafa if the elements of deceit and damage are present.
For example:
- a person signs another’s name electronically on an investment document to induce release of funds;
- an employee signs an executive’s name on a purchase authorization, causing the company to pay for fictitious goods;
- a person uses another’s electronic signature to secure money or property that would not have been released otherwise.
Here, the criminal wrong may be framed as deceit causing prejudice. The electronic signature is the instrument of fraud.
The same underlying conduct may also implicate cybercrime laws if computers or electronic systems were used in a manner covered by statute.
XIII. Unauthorized Access and Credential Misuse
Many electronic signature abuses begin not with the signature itself, but with unauthorized access.
A person may obtain control over another’s signature by:
- stealing passwords,
- accessing email accounts,
- using saved credentials,
- bypassing access restrictions,
- taking control of tokens or devices,
- intercepting one-time passwords,
- or abusing shared office systems.
In such cases, the offender may face separate liability for unauthorized access or illegal interference with computer systems or data, apart from the later misuse of the signature.
Thus, a single act can generate layered criminal exposure:
- unauthorized system access,
- misuse of credentials,
- falsification or computer forgery,
- fraud or estafa,
- use of falsified document,
- and sometimes identity-related or privacy-related offenses.
XIV. Misuse of Digital Certificates and Secure Signatures
A more technically advanced form of unauthorized use involves digital certificates, cryptographic keys, or secure-signature systems.
Where a person uses another person’s private key, certificate, token, or authenticated signing environment without consent, the legal consequences may be severe because the system is specifically designed to establish authenticity.
Such misuse may amount to:
- identity-based impersonation,
- falsification,
- computer-related forgery,
- fraud,
- unlawful access,
- or unlawful interference with protected electronic data.
It may also create evidentiary complexity because cryptographic signatures are often presumed more reliable than ordinary scanned signatures. If compromised, the damage may be broader and harder to detect.
XV. Unauthorized Use by Employees, Officers, and Insiders
A large number of real-world cases arise inside organizations.
Common scenarios include:
- an employee using a manager’s e-signature to approve overtime, leave, or payroll;
- a finance officer using a superior’s signature to process disbursements;
- a secretary reusing an executive’s scanned signature for unauthorized documents;
- a corporate officer electronically signing board or shareholder documents without actual authority;
- an IT administrator manipulating workflow approvals;
- or a procurement staff member using saved signature files to fake approvals.
Insider cases are especially serious because the accused often had legitimate access to systems but exceeded authority.
This matters because the defense may argue, “I had access,” but access is not the same as authority. A person may have technical ability to use the signature but no legal power to do so.
XVI. Does Password Sharing Eliminate Criminal Liability
Not necessarily.
In some workplaces, poor security practices exist. Passwords may be informally shared, signature image files may be stored in common folders, or assistants may be given access to signing workflows.
But even in such settings, criminal liability may still arise if:
- the accused used the access beyond the scope allowed,
- signed a document not covered by any authority,
- concealed the act,
- used the signature for fraud,
- or knowingly caused false legal consequences.
The existence of lax controls may affect proof, internal accountability, or defenses, but it does not automatically legalize unauthorized signing.
Still, the defense may use these facts to argue lack of criminal intent, apparent authority, or organizational tolerance. That is why cases of this kind can become highly fact-sensitive.
XVII. Identity Misrepresentation and Personation
Unauthorized use of an electronic signature often involves personation. The offender makes it appear that another individual acted, consented, approved, or certified something.
This is legally significant because many crimes involving false identity or assumed authority do not depend on the medium used. Whether the false appearance was created through ink or code, the deception may still be punishable.
The more the case involves impersonation in official, financial, or contractual settings, the stronger the case for criminal liability.
XVIII. Use of Falsified Electronic Documents
Even a person who did not personally create the false signature may incur liability by using the falsified electronic document.
For example:
- a person knowingly submits a contract bearing a fake electronic signature;
- a manager knowingly forwards an electronically signed certificate that was not genuinely signed;
- a company representative knowingly relies on a false e-signed board resolution to obtain a permit or bank action.
Thus, liability may attach not only to the forger or unauthorized signer, but also to someone who knowingly uses the resulting falsified electronic document as though it were genuine.
Knowledge is crucial here. Innocent reliance is different from knowing use.
XIX. Government Filings and Public Documents
Unauthorized use of electronic signatures becomes even more serious where the document is submitted to a government agency or affects public records.
Examples include false electronic signatures in:
- tax submissions,
- government procurement papers,
- permits and licenses,
- corporate filings,
- notarization-related processes where applicable,
- compliance certifications,
- and other official statements.
Where electronic documents perform public or regulatory functions, falsification concerns intensify. The law generally takes a stricter view of false documents used in relation to public authority.
XX. Banking, Financial, and Payment Contexts
Electronic signature abuse in financial settings is especially dangerous.
It may involve:
- online banking authorizations,
- payment instructions,
- digital loan documents,
- securities transfers,
- internal treasury approvals,
- customer onboarding documents,
- insurance forms,
- or electronic guarantees.
In such settings, liability may expand beyond general fraud and falsification. Other laws or regulations may be implicated, and the evidentiary trail may include authentication logs, IP records, transaction histories, token use, and audit trails.
Financial harm also makes prosecution more likely.
XXI. Data Privacy and Confidentiality Aspects
Unauthorized use of an electronic signature often overlaps with misuse of personal data and confidential credentials.
For instance, if a person accesses, copies, or uses:
- a private key,
- signature image file,
- government-issued signing credentials,
- email credentials,
- or identifying data tied to a signatory,
the conduct may also create privacy or confidentiality issues.
Not every privacy violation is automatically a separate criminal offense in the same case, but the misuse of protected personal information can strengthen the unlawful character of the act and may support parallel claims or penalties where the law applies.
XXII. Can There Be Criminal Liability Without Financial Damage
Yes.
Although many cases involve money, financial loss is not always required for every possible offense. Criminal liability may arise even without direct monetary damage if the act constitutes:
- falsification,
- unauthorized access,
- computer-related forgery,
- use of falsified electronic document,
- or another offense where the law punishes the integrity violation itself.
For example, using a dean’s electronic signature to falsely certify a student record may be punishable even if no money changed hands. The wrong lies in the false document and fraudulent representation of authority.
XXIII. Must There Be Intent to Defraud
Not in every formulation, but criminal intent is generally important.
Some offenses require deceit, prejudice, or fraudulent purpose. Others focus more on the unlawful creation or use of false electronic data or documents.
In practice, prosecutors usually try to prove that the accused:
- knew the signature was not theirs to use,
- knew they lacked authority,
- intentionally created the false appearance of assent,
- and used the act to cause a legal consequence.
Intent can be inferred from conduct, such as:
- secrecy,
- password theft,
- document alteration,
- backdating,
- deletion of logs,
- concealment from the true signatory,
- or benefit obtained from the act.
XXIV. Good Faith as a Defense
Good faith can be a major defense in these cases.
An accused may argue:
- there was actual authority,
- there was long-standing office practice allowing the act,
- the signature was applied ministerially and not deceptively,
- the signer orally approved the document,
- the accused believed the act was authorized,
- the document was later ratified,
- or the accused had no intent to falsify or defraud.
Good faith does not automatically excuse everything. But where criminal intent is doubtful, it can be decisive.
For example, if an assistant attaches a superior’s pre-approved signature block to a routine letter exactly as instructed, that is very different from forging approval for a fraudulent payment voucher.
XXV. Negligence Versus Criminal Misuse
Not every problematic use of an electronic signature is criminal. Sometimes the real issue is negligence, weak internal control, or sloppy document practice.
Examples include:
- accidental use of the wrong signature file,
- system auto-population errors,
- mistaken reliance on outdated delegated authority,
- or improper but non-deceptive document handling.
These may still create civil, administrative, or employment consequences, but criminal conviction generally requires proof of the elements of the offense charged and guilt beyond reasonable doubt.
The line between criminal misuse and negligent mishandling can be heavily contested.
XXVI. Ratification Does Not Always Erase the Crime
Sometimes the real signatory later approves or benefits from the transaction. That can complicate matters, but it does not automatically erase criminal liability.
If the accused already committed falsification, forgery, or unauthorized access, later ratification may affect:
- damages,
- corporate consequences,
- credibility of the complainant,
- or practical prosecutorial decisions.
But a completed criminal act is not always wiped out just because the result was later accepted.
Still, ratification can be important in defending against claims of deceit or prejudice, especially in commercial contexts where the supposed victim later affirmed the transaction.
XXVII. Corporate Resolutions and Board Documents
A particularly sensitive area involves corporate documents bearing unauthorized electronic signatures, such as:
- board resolutions,
- secretary’s certificates,
- shareholder consents,
- banking authorities,
- stock transfer approvals,
- and regulatory submissions.
These documents can change control of money, property, and legal rights. False electronic signatures in this context may support charges involving falsification, fraud, use of falsified documents, and cybercrime.
Because corporate acts often rely on documentary regularity, misuse of electronic signatures here can have enormous effects and may involve several participants.
XXVIII. Electronic Signature Abuse in Employment Disputes
Employment-related examples are very common.
They include unauthorized e-signatures on:
- time records,
- payroll adjustments,
- leave forms,
- disciplinary notices,
- contracts,
- quitclaims,
- tax forms,
- benefits claims,
- and HR certifications.
These may begin as internal HR disputes but become criminal when the unauthorized signing is intentional and designed to deceive or injure another party.
For instance, forging an employee’s electronic signature on a resignation letter may expose the offender to serious criminal and civil consequences.
XXIX. Can a Scanned Signature Be “Electronic Signature” for Criminal Purposes
Yes, potentially.
Even a simple scanned image of a handwritten signature, once used electronically to authenticate or make a document appear approved, can function as an electronic signature in practical legal analysis.
Thus, a person who copies a scanned signature from an old PDF and pastes it into a new electronic contract without permission may still be creating a false electronically signed document.
The lack of sophisticated cryptography does not save the offender. The question is whether the image was used to falsely represent another person’s assent or authorship.
XXX. Proof Problems in Criminal Cases
These cases are often hard to prove because the accused may deny authorship and claim:
- the account was shared,
- the system auto-signed,
- the file came from someone else,
- the signatory verbally consented,
- the device was accessible to many people,
- or the logs are incomplete.
To prove criminal liability, investigators and prosecutors may rely on:
- system logs,
- IP addresses,
- email trails,
- access records,
- audit trails,
- metadata,
- certificate usage records,
- one-time-password history,
- device forensics,
- chat messages,
- witness testimony,
- and surrounding circumstances showing motive and opportunity.
Electronic evidence is central. Without a reliable trail, the case may become difficult even where suspicion is strong.
XXXI. Authentication of Electronic Evidence
In Philippine litigation, the prosecution must not only show that a false signature appeared. It must also properly establish the authenticity and reliability of the electronic evidence used to prove the offense.
This may involve showing:
- how the document was created,
- how the signature process worked,
- who controlled the signing credentials,
- how the file was stored,
- whether the logs are reliable,
- whether the metadata was preserved,
- and whether the evidence remained unaltered.
Improperly handled electronic evidence can weaken the case. Chain of custody and digital integrity matter.
XXXII. Presumptions and Rebuttal
Some forms of electronic signature, especially secure or certificate-based systems, may carry stronger evidentiary weight because they are designed to show authenticity and signer identity.
But those presumptions can be rebutted. The defense may show:
- credential compromise,
- device theft,
- internal misuse,
- password disclosure,
- inadequate control,
- malware,
- spoofing,
- or system defects.
Thus, the mere presence of a digital signature does not always conclusively prove the named person personally signed. At the same time, an accused cannot easily hide behind technical complexity if evidence shows intentional misuse.
XXXIII. Liability of IT Personnel and System Administrators
System administrators and IT personnel may be especially exposed if they abuse privileged access to:
- reset credentials,
- access signature systems,
- retrieve certificate files,
- manipulate logs,
- inject approvals,
- or conceal unauthorized use.
Their technical role may make the misconduct more sophisticated, and the abuse of entrusted access can strengthen the prosecution’s narrative of intent and concealment.
However, because IT systems are complex, accusations against IT staff also require careful proof. Mere ability is not enough; actual unlawful participation must be shown.
XXXIV. Conspiracy and Group Liability
Unauthorized use of electronic signatures is often not done by one person alone.
A scheme may involve:
- one person obtaining credentials,
- another preparing the document,
- another submitting it,
- and another receiving the benefit.
Where the evidence shows coordinated action toward a common unlawful purpose, conspiracy principles may apply. This can make each participant liable for the acts of the others within the criminal design.
For example, in a fake disbursement scheme, the false signer, the uploader, and the payee may all face liability if they acted together.
XXXV. Attempted Offenses
Even if the scheme fails, attempted liability may still arise depending on the offense and the stage of execution reached.
For example:
- the accused uploads a false electronically signed document, but payment is blocked;
- a forged digital approval is submitted, but the system detects it;
- a person accesses credentials and begins using them, but the transaction is stopped.
Whether the law treats the act as attempted crime, consummated falsification, or another offense depends on the precise facts and statute involved.
XXXVI. Civil and Administrative Consequences Alongside Criminal Liability
Although this article focuses on criminal liability, it is important to understand that unauthorized use of an electronic signature often also results in:
- damages,
- rescission or nullification of contracts,
- disciplinary action,
- termination from employment,
- disqualification from office,
- regulatory sanctions,
- and reputational damage.
The same act can therefore generate multiple proceedings at once.
Still, criminal conviction requires independent proof and cannot rest solely on internal policy violation.
XXXVII. Common Defenses
Typical defenses in these cases include:
1. Authority
The accused was authorized, expressly or by office practice.
2. Good faith
The accused believed there was authority or prior approval.
3. Ratification
The supposed signatory later approved or adopted the act.
4. Lack of authorship
Someone else used the credentials or system.
5. Shared access
Many persons could access the account or signature device.
6. No deceit or no damage
Important in fraud-based charges.
7. System error
The system auto-applied a signature or approval.
8. Invalid or unreliable electronic evidence
Logs, metadata, or files are incomplete or unauthenticated.
The strength of these defenses depends entirely on the surrounding facts.
XXXVIII. What Prosecutors Usually Need to Show
To build a criminal case, the prosecution usually needs to establish several things clearly:
- that the signature or signing credentials belonged to another person or required that person’s authority;
- that the accused used, caused the use of, or benefited from the unauthorized signature;
- that the use was knowing and unauthorized;
- that the act falls under a punishable offense such as falsification, computer-related forgery, fraud, estafa, unauthorized access, or use of falsified documents;
- and that the evidence linking the accused to the act is reliable and admissible.
Proof of motive, concealment, and resulting benefit often strengthens the case considerably.
XXXIX. Illustrative Philippine Scenarios
To understand how liability works, consider common examples.
A. Finance manager’s signature used on a fake disbursement
An employee inserts the finance manager’s electronic signature into a payment approval to release company funds. Possible liability may include falsification, computer-related forgery, fraud, estafa, and use of falsified electronic documents.
B. HR officer signs an employee’s resignation electronically
An HR officer uses the employee’s e-signature without consent to make it appear the employee resigned voluntarily. This may give rise to falsification and other liabilities, even if no direct money was taken.
C. Corporate secretary’s digital certificate used to file a false board resolution
A person uses the secretary’s certificate-based signature to file a document representing board approval that never occurred. This is highly vulnerable to prosecution for falsification, cybercrime-related offenses, and use of falsified documents.
D. Borrower uses spouse’s scanned signature on a loan document
A person electronically signs a spouse’s name without authority to obtain a loan. Possible liability may include falsification and estafa, depending on resulting damage and deceit.
E. Assistant uses executive’s signature on a routine letter
If clearly authorized and ministerial, this may not be criminal. But if done secretly for an unauthorized purpose, it can become a crime.
XL. Distinction Between Voidness of Transaction and Criminal Liability
A false electronic signature may make a document defective, voidable, unenforceable, or ineffective as to the supposed signer. But that civil consequence is separate from criminal liability.
A court may conclude both that:
- the document is not binding on the real signatory, and
- the accused is criminally liable for falsification or fraud.
Or it may conclude that the document was irregular but criminal intent was not proven beyond reasonable doubt.
The two issues must be separated carefully.
XLI. Practical Evidentiary Red Flags
In real cases, certain facts strongly suggest unauthorized criminal use:
- use of another’s credentials without disclosure,
- rushed processing of documents,
- deletion of emails or logs,
- use outside office hours,
- creation of false audit trails,
- document backdating,
- diversion of funds,
- forged approvals clustered around one user or device,
- concealment from the true signatory,
- and inconsistent explanations by the accused.
None of these alone proves guilt, but together they often form the factual backbone of prosecution.
XLII. The Broader Policy of Philippine Law
Philippine law gives electronic documents and electronic signatures legal effect because commerce, governance, and daily transactions increasingly depend on them. But legal recognition requires legal protection.
If the law treated electronic signature misuse as trivial, trust in digital transactions would collapse. That is why the legal system treats unauthorized use seriously: it threatens not only one victim, but the reliability of electronic contracting and governance more broadly.
Thus, criminal law protects both individual victims and the integrity of digital transactions.
XLIII. Bottom-Line Legal Rule
Under Philippine law, the unauthorized use of an electronic signature can result in criminal liability when the act amounts to falsification, computer-related forgery, computer-related fraud, estafa, unauthorized access, use of falsified electronic documents, or other punishable offenses, depending on the facts.
The decisive questions are usually:
- whether the accused had authority,
- whether the signature was used knowingly without permission,
- whether the act created a false appearance of authorship or consent,
- whether deceit, access violation, or prejudice occurred,
- and whether electronic evidence reliably proves the accused’s participation.
XLIV. Final Synthesis
Criminal liability for unauthorized use of an electronic signature in the Philippines is not confined to one narrow statute or one simple formula. It is a multi-layered legal issue governed by the law on electronic commerce, cybercrime principles, the law on falsification and fraud, and the rules on electronic evidence.
A person may be criminally liable not only for directly signing another’s name electronically, but also for stealing credentials, using scanned signatures without authority, misusing digital certificates, altering electronically signed documents, submitting false e-signed records, or profiting from their use. Liability may arise even without physical paper, even without handwritten forgery, and even where the signature exists only as data, credentials, workflow events, or cryptographic proof.
The central legal truth is this: an electronic signature is legally meaningful, and unauthorized use of it can be as criminally serious as forging a handwritten signature, and in some cases even more serious because it may combine documentary falsification, system intrusion, and digital fraud in one act.