Cyber Harassment and Threats by a Former Partner

I. Introduction

Cyber harassment by a former partner is a common and serious problem in the Philippines. It can happen after a breakup, separation, annulment, domestic dispute, failed engagement, live-in relationship, or casual romantic relationship. The former partner may send repeated threatening messages, post humiliating statements online, spread private photos, use fake accounts, stalk the victim through social media, contact the victim’s family or employer, threaten self-harm to force reconciliation, or threaten to release intimate materials.

This conduct is not merely “drama” or a private lovers’ quarrel. Depending on the facts, it may involve violence against women and children, cybercrime, grave threats, unjust vexation, coercion, stalking-like conduct, psychological violence, cyberlibel, identity theft, data privacy violations, anti-photo and video voyeurism violations, harassment, blackmail, and civil liability for damages.

The legal response depends on the relationship, sex and gender of the victim, whether there was a dating or sexual relationship, the content of the threats, whether intimate materials are involved, whether children are affected, and whether the former partner’s acts are online, offline, or both.

This article explains the Philippine legal context, available remedies, evidence, protective measures, reporting options, and practical steps for victims of cyber harassment and threats by a former partner.

This is general legal information, not legal advice for a specific case.


II. What Is Cyber Harassment by a Former Partner?

Cyber harassment by a former partner refers to repeated, abusive, threatening, humiliating, controlling, or invasive conduct committed through digital means after or during the breakdown of a romantic, sexual, marital, dating, or domestic relationship.

It may happen through:

  • SMS or calls
  • Messenger
  • Facebook posts or comments
  • Instagram, TikTok, X, YouTube, Reddit, or other platforms
  • Viber, WhatsApp, Telegram, Discord, or group chats
  • Email
  • Fake accounts
  • Online forums
  • Dating apps
  • Shared cloud accounts
  • Online banking or e-wallet messages
  • Workplace communication channels
  • GPS tracking or location sharing
  • Spyware, account hacking, or unauthorized device access

The former partner’s goal may be to punish, control, shame, scare, pressure, monitor, extort, or force the victim to return.


III. Common Forms of Cyber Harassment by a Former Partner

1. Repeated unwanted messages

A former partner may send dozens or hundreds of messages despite being told to stop. The messages may include insults, begging, guilt-tripping, threats, accusations, or demands to reconcile.

2. Threats of physical harm

Examples:

  • “I will hurt you.”
  • “You will regret leaving me.”
  • “I know where you live.”
  • “I will wait outside your office.”
  • “I will hurt your new partner.”
  • “I will harm your family.”

These may support criminal complaints, protection orders, and urgent police action.

3. Threats to expose private information

The former partner may threaten to disclose:

  • Intimate photos or videos
  • Private chats
  • Medical information
  • Sexual history
  • Address
  • Workplace
  • Family details
  • Financial information
  • Secrets shared during the relationship

This may involve coercion, threats, data privacy violations, and other offenses.

4. Revenge porn or intimate image abuse

A former partner may threaten to upload, send, sell, or leak intimate photos or videos. This is one of the most serious forms of post-relationship abuse.

5. Cyberstalking-like behavior

Philippine law does not use “cyberstalking” in the same broad way some jurisdictions do, but stalking-like conduct may still be punishable under other laws.

Examples:

  • Monitoring check-ins
  • Tracking location
  • Creating fake accounts to watch the victim
  • Messaging friends to ask where the victim is
  • Following the victim’s online activity
  • Appearing at places after seeing posts
  • Using shared accounts or devices to track the victim

6. Online defamation

The former partner may post accusations such as:

  • “Cheater”
  • “Gold digger”
  • “Scammer”
  • “Prostitute”
  • “Abuser”
  • “Drug user”
  • “Criminal”
  • “Homewrecker”
  • “Bad parent”

If false and defamatory, these may lead to cyberlibel or civil damages.

7. Fake accounts and impersonation

The former partner may create fake profiles using the victim’s name or photos, pretending to be the victim, sending messages to others, or posting damaging content.

8. Harassing the victim’s family, friends, or employer

The former partner may message parents, siblings, co-workers, bosses, clients, classmates, churchmates, or new partners to shame or pressure the victim.

9. Account hacking or unauthorized access

The former partner may know the victim’s passwords and use them to access email, social media, cloud storage, messaging apps, e-wallets, or devices.

10. Threats involving children

A former spouse, live-in partner, or co-parent may threaten to take the child, withhold support, expose the parent online, or use the child to control the victim.


IV. Why Former-Partner Cyber Harassment Is Legally Serious

Post-relationship harassment is serious because it often involves a pattern of control. It may escalate from messages to stalking, public shaming, physical violence, extortion, or sexual image abuse.

The law may treat the situation more seriously when:

  • The victim is a woman and the offender is a current or former husband, sexual partner, or dating partner;
  • The harassment causes emotional or psychological suffering;
  • The offender threatens violence;
  • The offender uses intimate images;
  • The offender contacts the victim’s workplace or family;
  • Children are involved;
  • There is prior domestic violence;
  • The offender violates a protection order;
  • The offender uses fake accounts, hacking, or identity misuse;
  • The harassment is repeated despite clear refusal.

A breakup does not give a former partner permission to control, humiliate, or threaten the other person.


V. Relevant Philippine Laws

Several Philippine laws may apply depending on the facts.

A. Anti-Violence Against Women and Their Children Act

The Anti-Violence Against Women and Their Children Act, commonly known as VAWC, is one of the most important laws in former-partner harassment cases.

It protects women and their children from violence committed by:

  • A husband or former husband;
  • A man with whom the woman has or had a sexual or dating relationship;
  • A man with whom the woman has a common child;
  • A man with whom the woman has lived in a domestic relationship.

VAWC includes not only physical violence but also psychological violence, harassment, intimidation, stalking, public ridicule, emotional abuse, and acts causing mental or emotional suffering.

Cyber harassment by a former boyfriend, former live-in partner, former husband, or former sexual partner may fall under VAWC if the victim is a woman and the offender fits the covered relationship.

Examples of possible VAWC-related cyber abuse:

  • Repeated threatening messages after breakup;
  • Threatening to release intimate photos;
  • Publicly humiliating the woman online;
  • Messaging her employer to ruin her reputation;
  • Threatening to take the child away;
  • Using the child to harass or control the woman;
  • Sending abusive messages causing emotional distress;
  • Monitoring and stalking her online;
  • Threatening violence against her or her new partner.

VAWC is powerful because it may allow criminal complaints and protection orders.


B. Cybercrime Prevention Act

The Cybercrime Prevention Act may apply when the harassment or threat is committed through a computer system, phone, internet platform, social media, or electronic communication.

Cybercrime issues may include:

  • Cyberlibel
  • Identity theft
  • Illegal access
  • Computer-related fraud
  • Data interference
  • Misuse of digital accounts
  • Online threats or harassment connected with other offenses
  • Crimes under the Revised Penal Code committed through ICT, which may carry higher consequences

If the former partner uses social media, email, messaging apps, fake accounts, hacked accounts, or digital devices to commit the abuse, cybercrime authorities may be involved.


C. Revised Penal Code: Threats, Coercion, Unjust Vexation, Libel, and Related Offenses

The Revised Penal Code may apply to conduct such as:

1. Grave threats

Threatening to commit a serious wrong against the victim, family, property, or another person may amount to grave threats depending on the wording and circumstances.

2. Light threats

Less serious threats may still be punishable.

3. Coercion

Forcing or compelling someone to do something against their will, such as forcing reconciliation, forcing a meeting, forcing payment, or forcing silence, may involve coercion.

4. Unjust vexation

Repeated annoying, distressing, or harassing acts may amount to unjust vexation, depending on facts.

5. Libel or slander

False and damaging statements may lead to libel, cyberlibel, oral defamation, or civil damages.

6. Falsification or impersonation-related acts

Fake documents, fake court notices, fake police reports, or impersonation may create separate liability.


D. Anti-Photo and Video Voyeurism Act

This law is critical when intimate photos or videos are involved.

It may apply when a person:

  • Takes intimate photos or videos without consent;
  • Copies or reproduces intimate images without consent;
  • Shares or distributes intimate images without consent;
  • Publishes, broadcasts, or uploads intimate photos or videos;
  • Threatens or uses intimate materials to shame or control the victim.

Even if the victim originally consented to taking the photo or video, that does not mean the former partner may distribute it. Consent to private recording is not consent to public sharing.

Threatening to release intimate materials may also support complaints under other laws such as threats, coercion, VAWC, cybercrime, or data privacy violations.


E. Safe Spaces Act

The Safe Spaces Act addresses gender-based sexual harassment in streets, public spaces, online spaces, workplaces, and educational or training institutions.

Online sexual harassment may include:

  • Unwanted sexual comments;
  • Misogynistic, transphobic, homophobic, or sexist remarks;
  • Unwanted sexual messages;
  • Threats involving sexual humiliation;
  • Uploading or sharing sexual content;
  • Creating fake sexualized posts;
  • Persistent unwanted sexual advances online.

A former partner who sexually harasses the victim online may fall under this law depending on the facts.


F. Data Privacy Act

The Data Privacy Act may apply when a former partner misuses personal information.

Examples:

  • Posting the victim’s address, phone number, workplace, or ID;
  • Sharing private messages;
  • Accessing personal accounts without authority;
  • Using photos or documents obtained during the relationship;
  • Disclosing medical, sexual, financial, or family information;
  • Creating fake accounts using the victim’s data;
  • Sending personal information to third parties to harass the victim.

A former partner may have obtained information during the relationship, but that does not mean they have the right to misuse or publicly disclose it after separation.


G. Civil Code Remedies

Civil remedies may be available for:

  • Abuse of rights;
  • Acts contrary to morals, good customs, or public policy;
  • Defamation;
  • Privacy invasion;
  • Emotional distress;
  • Damages caused by unlawful conduct.

The victim may claim damages when harassment causes reputational harm, emotional suffering, lost employment, business damage, medical costs, or other losses.


VI. VAWC and Former Partner Cyber Harassment

VAWC deserves special attention because many cyber harassment cases involve former romantic or sexual partners.

A. Who may be protected?

A woman may be protected if the offender is a man who is or was:

  • Her husband;
  • Her former husband;
  • Her live-in partner;
  • Her former live-in partner;
  • Her boyfriend;
  • Her former boyfriend;
  • Her sexual partner;
  • Her former sexual partner;
  • The father of her child.

Children may also be protected if they are affected by the abuse.

B. Does the relationship need to be current?

No. Former relationships may be covered. A former boyfriend or former partner may still be liable if the acts are connected to the relationship or breakup.

C. Is physical injury required?

No. Psychological violence, emotional abuse, harassment, intimidation, stalking, and public humiliation may be enough depending on the evidence.

D. Can online acts be VAWC?

Yes. Online harassment can cause psychological violence and emotional distress. Messages, posts, threats, fake accounts, and digital surveillance may support a VAWC complaint.

E. What remedies are available?

The victim may seek:

  • Barangay Protection Order;
  • Temporary Protection Order;
  • Permanent Protection Order;
  • Criminal complaint;
  • Police assistance;
  • Custody-related protection, where applicable;
  • Support-related relief, where applicable;
  • Stay-away or no-contact conditions;
  • Removal from residence, where appropriate;
  • Other protective measures.

VII. Protection Orders

Protection orders are legal measures designed to stop abuse and protect the victim.

A. Barangay Protection Order

A Barangay Protection Order may be available in VAWC cases and is usually intended for immediate protection. It may order the respondent to stop committing acts of violence or harassment.

A victim may seek barangay assistance when harassment is urgent, especially if the offender knows the victim’s residence or has threatened physical harm.

B. Temporary Protection Order

A Temporary Protection Order is issued by a court and may provide broader protection. It can include stay-away orders, no-contact provisions, custody or support-related relief, and other measures depending on the law and facts.

C. Permanent Protection Order

A Permanent Protection Order may be issued after hearing and is intended for longer-term protection.

D. No-contact and stay-away provisions

In cyber harassment cases, the victim may request orders prohibiting the former partner from:

  • Calling or messaging;
  • Contacting through fake accounts;
  • Posting about the victim;
  • Contacting family or employer;
  • Coming near home, school, or workplace;
  • Disclosing private information;
  • Sharing intimate photos or videos;
  • Using the child to communicate threats;
  • Harassing through third parties.

VIII. When the Victim Is Male or LGBTQ+

VAWC specifically protects women and their children against covered male offenders in covered relationships. However, male victims and LGBTQ+ victims are not without remedies.

Depending on facts, they may use:

  • Revised Penal Code complaints for threats, coercion, unjust vexation, libel, or slander;
  • Cybercrime complaints;
  • Anti-Photo and Video Voyeurism Act;
  • Safe Spaces Act, where applicable;
  • Data Privacy Act;
  • Civil action for damages;
  • Barangay conciliation, if appropriate and safe;
  • Protection-related remedies under other applicable laws or court processes.

The exact legal route depends on the sex and gender of the parties, relationship, nature of threats, and evidence.


IX. When Children Are Involved

Cyber harassment by a former partner can harm children even if the messages are directed at the adult.

Examples:

  • Threatening to take the child;
  • Threatening to withhold support unless the victim reconciles;
  • Sending abusive messages to the child;
  • Posting the child’s photos in the dispute;
  • Using the child’s school or relatives to track the victim;
  • Threatening to expose the victim to the child;
  • Forcing the child to carry messages;
  • Harassing the victim during custody exchanges.

If children are affected, remedies may include:

  • VAWC protection for the woman and children;
  • Custody-related relief;
  • Child protection referrals;
  • Court orders on communication and visitation;
  • School notification for safety;
  • Police or barangay assistance;
  • Data privacy complaints if the child’s information is exposed.

A former partner’s parental status does not justify harassment.


X. Types of Threats and Their Legal Importance

Not all threats are legally the same. The exact words matter.

A. Threats of physical violence

These are urgent. Preserve evidence and consider immediate police or barangay assistance.

Examples:

  • “I will kill you.”
  • “I will beat you.”
  • “I will hurt your family.”
  • “I will burn your house.”
  • “I will wait outside your office.”

B. Threats to expose intimate materials

These may involve VAWC, voyeurism, coercion, cybercrime, and data privacy concerns.

Examples:

  • “I will upload your video.”
  • “I will send your nudes to your parents.”
  • “Pay me or I will post this.”
  • “Come back to me or I will leak everything.”

C. Threats to ruin reputation

May involve defamation, cyberlibel, VAWC, coercion, or civil damages.

Examples:

  • “I will tell everyone you are a prostitute.”
  • “I will post that you are a cheater.”
  • “I will tell your boss you are immoral.”
  • “I will ruin your name.”

D. Threats involving work or school

These may be intended to cause economic or social harm.

Examples:

  • “I will message your HR.”
  • “I will send your photos to your school.”
  • “I will report you to your clients.”
  • “I will make sure you lose your job.”

E. Threats of self-harm

A former partner may threaten suicide to force the victim to respond or return.

This is emotionally manipulative and should be handled carefully. The victim may notify the former partner’s family or emergency services, but does not have to remain in an abusive relationship to prevent self-harm.

F. Legal threats

A former partner may threaten false cases, barangay reports, police complaints, or custody action. Some legal threats are legitimate; others are intimidation.

The victim should preserve messages and respond through proper channels if a real legal document is received.


XI. Evidence: What to Preserve

Evidence is crucial. Preserve everything before blocking or deleting.

Important evidence includes:

A. Messages

  • SMS
  • Messenger
  • Viber
  • WhatsApp
  • Telegram
  • Email
  • Instagram DMs
  • TikTok messages
  • Discord messages
  • Dating app messages

B. Posts and comments

  • Facebook posts
  • Comments
  • Stories
  • Reels
  • TikTok videos
  • X posts
  • YouTube comments
  • Reddit posts
  • Group chat messages

C. Threats

  • Screenshots with dates and times
  • Voice notes
  • Call recordings, if lawfully obtained
  • Call logs
  • Missed call records
  • Threats sent to relatives or friends

D. Identity evidence

  • Profile links
  • Usernames
  • Phone numbers
  • Email addresses
  • Account URLs
  • Screenshots of fake accounts
  • Photos used
  • Mutual friends confirming account identity

E. Intimate image abuse evidence

  • Threats to release images
  • Screenshots of posted images
  • URLs
  • Names of recipients
  • Date and time of posting
  • Evidence that the former partner possessed the material
  • Evidence of non-consent

F. Hacking or account access evidence

  • Login alerts
  • Password reset emails
  • Unknown devices
  • Account recovery notices
  • Changed passwords
  • Suspicious sessions
  • Emails from platforms
  • Screenshots of unauthorized activity

G. Impact evidence

  • Medical or psychological records
  • Work disciplinary notices caused by harassment
  • Employer emails
  • Witness statements
  • Family messages
  • Police blotter
  • Barangay records
  • Takedown reports
  • Platform responses

XII. How to Take Good Screenshots

Good screenshots should show:

  • Full message or post
  • Sender name or account
  • Date and time
  • Profile photo or username
  • URL, if possible
  • Context before and after the threat
  • The victim’s request to stop, if any
  • Delivery/read status, if helpful

Avoid editing screenshots. Keep originals. If possible, use screen recording to show scrolling through the conversation and opening the profile.

For social media posts, capture the URL and account page. Posts can be deleted quickly.


XIII. Evidence Timeline

Prepare a timeline like this:

Date Time Platform Act Evidence
May 1 9:00 PM Messenger Threatened to post intimate photos Screenshot A
May 2 8:00 AM Facebook Posted insulting statement Screenshot B
May 2 10:00 AM SMS Threatened to go to workplace Screenshot C
May 3 7:00 PM Messenger Messaged victim’s sister Sister screenshot
May 4 6:00 PM Email Sent fake legal threat Email copy

A timeline helps police, prosecutors, barangay officials, lawyers, and courts understand the pattern.


XIV. Immediate Safety Steps

If there are threats of physical harm, do not treat the case as only an online problem.

Immediate steps may include:

  1. Tell a trusted person.
  2. Avoid meeting the former partner alone.
  3. Do not disclose location publicly.
  4. Change routines if necessary.
  5. Alert household members, security guards, school, or workplace.
  6. Save emergency numbers.
  7. Report urgent threats to police or barangay.
  8. Seek a protection order if VAWC applies.
  9. Secure children if they may be targeted.
  10. Keep copies of evidence outside the phone.

If danger is imminent, seek immediate help from local authorities.


XV. Digital Security Steps

Former partners often know passwords, security questions, device passcodes, and private habits. Secure accounts immediately.

A. Change passwords

Change passwords for:

  • Email
  • Facebook
  • Instagram
  • TikTok
  • X
  • Messenger
  • Viber
  • WhatsApp
  • Telegram
  • Cloud storage
  • Bank and e-wallet accounts
  • Phone lock screen
  • Laptop and tablet
  • Work accounts, if affected

Use unique passwords.

B. Enable two-factor authentication

Use authenticator apps or secure methods where possible. Be careful if the former partner has access to your SIM or email.

C. Check logged-in devices

Log out unknown devices from all accounts.

D. Revoke app access

Remove suspicious third-party apps connected to social media or email.

E. Secure cloud storage

Former partners may have access to shared albums, cloud backups, Google Drive, iCloud, or email recovery.

F. Check location sharing

Turn off or review:

  • Find My iPhone
  • Google location sharing
  • Facebook location
  • Snapchat maps
  • Shared ride-hailing accounts
  • Family tracking apps
  • Shared calendars
  • AirTags or trackers

G. Review shared devices

If the former partner had access to your phone or laptop, check for spyware or suspicious apps.


XVI. Communication Strategy With the Former Partner

A victim may choose to send one clear boundary message, such as:

Do not contact me again. Do not message my family, friends, employer, or any third party about me. Do not post or share any private information, messages, photos, or videos. Any further harassment, threats, or disclosure will be reported to the proper authorities.

After sending, avoid long arguments. Continued replies may encourage further harassment.

In dangerous situations, do not send messages that may escalate the offender. Safety comes first.


XVII. Should the Victim Block the Former Partner?

Blocking can protect mental health and reduce harassment, but preserve evidence first.

Consider:

  • Screenshot threats before blocking.
  • Save profile links and phone numbers.
  • Ask trusted people to monitor public posts if safe.
  • Use platform reporting tools.
  • Block fake accounts too.
  • Keep one controlled channel open only if needed for child custody, support, or legal reasons.

If there are children, communication may need to be limited to written, child-related matters only, or handled through relatives, lawyers, or court-approved channels.


XVIII. Reporting to the Barangay

A barangay may help in urgent local disputes and VAWC matters.

A victim may seek:

  • Barangay blotter;
  • Barangay Protection Order in VAWC cases;
  • Assistance in stopping harassment;
  • Referral to police, social worker, or court;
  • Documentation of threats.

However, barangay conciliation may not be appropriate for serious threats, intimate image abuse, cybercrime, or VAWC cases requiring protection. The victim should prioritize safety and formal remedies.


XIX. Reporting to Police

The victim may report to the local police station, Women and Children Protection Desk, or cybercrime unit depending on the facts.

Bring:

  • Valid ID;
  • Screenshots and printed copies;
  • Phone containing original messages;
  • Names and contact details of the former partner;
  • Relationship history;
  • Timeline;
  • Witness information;
  • Prior blotter or protection order, if any;
  • Evidence of physical threats or stalking;
  • Evidence involving children, if any.

For women and children, the Women and Children Protection Desk may be especially relevant.


XX. Reporting to PNP Anti-Cybercrime Group or NBI Cybercrime

If harassment is mainly online, cybercrime authorities may assist.

Prepare:

  • Full URLs;
  • Account names;
  • Screenshots;
  • Chat exports;
  • Email headers, if available;
  • Phone numbers;
  • Fake profile links;
  • Device details;
  • Evidence of hacking or identity theft;
  • Copies of posts before deletion;
  • Names of recipients of leaked materials.

Cybercrime reports are especially important for fake accounts, hacking, cyberlibel, intimate image threats, and online impersonation.


XXI. Reporting Intimate Image Threats

If the former partner threatens to release intimate photos or videos:

  1. Preserve the threat.
  2. Do not negotiate by sending more images.
  3. Do not pay money or agree to meet alone.
  4. Report the account to the platform.
  5. Consider police, cybercrime, and VAWC remedies.
  6. Seek takedown immediately if posted.
  7. Tell trusted people before the offender controls the narrative.
  8. Consider protection order if the offender is a covered former partner.

The victim’s consent to the relationship or to private intimacy is not consent to public exposure.


XXII. Platform Takedown and Reporting

For harmful content online, report to the platform immediately.

Possible platform categories:

  • Harassment
  • Bullying
  • Non-consensual intimate image
  • Impersonation
  • Threats
  • Hate or sexual harassment
  • Doxxing
  • Privacy violation
  • Fake account
  • Blackmail or extortion

Before reporting, save evidence because content may be removed and become harder to prove.

For intimate images, many platforms have emergency reporting channels for non-consensual intimate content.


XXIII. Workplace or School Notification

If the former partner threatens to contact the victim’s employer or school, the victim may preemptively notify a trusted HR officer, supervisor, guidance office, security office, or administrator.

A careful notice may say:

I am experiencing harassment from a former partner who may attempt to contact the workplace/school or send false or private information about me. I am documenting the matter and seeking appropriate help. Please do not disclose my schedule, contact details, or personal information to this person. Kindly preserve any message received from them.

This helps protect privacy and creates a record.


XXIV. When the Former Partner Uses Family Members or Friends

A former partner may use mutual friends, relatives, siblings, parents, co-workers, or fake accounts to continue contact.

The victim may document:

  • Names of intermediaries;
  • Messages they forwarded;
  • Whether they were asked to pressure the victim;
  • Any threats communicated through them;
  • Public posts or group chat messages.

Protection orders may sometimes prohibit contact through third parties.


XXV. False Accusations by a Former Partner

A former partner may accuse the victim of:

  • Cheating;
  • Stealing;
  • Abuse;
  • Abandonment;
  • Fraud;
  • Promiscuity;
  • Mental instability;
  • Bad parenting;
  • Drug use;
  • Sex work;
  • Criminal conduct.

If posted publicly or sent to third parties, false accusations may support defamation, cyberlibel, VAWC, or civil damages claims.

If the accusation is made in a formal complaint, respond through the proper legal process. Do not retaliate online.


XXVI. Cyberlibel Issues

Cyberlibel may arise when a defamatory statement is made online and identifies the victim.

A statement may be defamatory if it tends to dishonor, discredit, or cause contempt toward the victim.

Examples:

  • Posting that the victim is a criminal without basis;
  • Calling the victim sexually degrading names;
  • Accusing the victim of fraud;
  • Posting private allegations to ruin reputation;
  • Publishing edited screenshots to mislead others.

Truth, privileged communication, opinion, and context may matter. Cyberlibel cases require careful evaluation because online statements can also create counterclaims.

Victims should avoid responding with defamatory posts of their own.


XXVII. Doxxing and Exposure of Personal Information

Doxxing means exposing personal information to invite harassment or harm.

A former partner may post:

  • Home address
  • Workplace
  • Phone number
  • Email
  • Children’s school
  • Government ID
  • Medical information
  • Private photos
  • Family details
  • Bank details
  • Location updates

Doxxing may create data privacy, cybercrime, harassment, VAWC, and civil liability issues.

Take screenshots and request takedown immediately.


XXVIII. Account Hacking by a Former Partner

A former partner may know or guess passwords and access accounts.

Signs include:

  • Password reset emails;
  • Messages read without opening;
  • Unknown logins;
  • Changed recovery email;
  • Posts you did not make;
  • Deleted messages;
  • Friends receiving strange messages;
  • Cloud photos accessed;
  • Email forwarding rules added;
  • E-wallet login alerts.

Steps:

  1. Change passwords from a secure device.
  2. Log out all sessions.
  3. Enable two-factor authentication.
  4. Change recovery email and phone.
  5. Check email forwarding rules.
  6. Save login alerts.
  7. Report unauthorized access.
  8. Consider cybercrime complaint.

Unauthorized access may be illegal even if the former partner once knew the password.


XXIX. Spyware and Device Monitoring

Some abusive partners install spyware or monitoring apps.

Warning signs:

  • Battery drains quickly;
  • Phone heats up;
  • Strange apps;
  • Unusual data use;
  • Former partner knows private conversations;
  • Location is known unexpectedly;
  • Camera or microphone indicator appears;
  • Device settings changed.

Steps:

  • Use a safe device to seek help;
  • Back up evidence;
  • Consult a trusted technician;
  • Change passwords after securing device;
  • Consider factory reset;
  • Check shared accounts and cloud backups;
  • Inspect physical trackers like AirTags.

Do not confront the offender before planning for safety if physical harm is possible.


XXX. Blackmail and Extortion

A former partner may demand money, sex, reconciliation, silence, or withdrawal of a case in exchange for not releasing damaging information.

Examples:

  • “Send me money or I will post your video.”
  • “Meet me or I will send your photos to your parents.”
  • “Come back to me or I will ruin your life.”
  • “Withdraw the complaint or I will expose you.”

This may involve threats, coercion, extortion-like conduct, VAWC, voyeurism, cybercrime, and data privacy violations.

Do not pay or comply without legal advice. Preserve the demand.


XXXI. Harassment Through New Partner

A former partner may harass the victim’s new romantic partner.

Examples:

  • Threatening the new partner;
  • Sending intimate images of the victim;
  • Accusing the victim of cheating;
  • Posting about the new relationship;
  • Creating fake accounts to attack both;
  • Appearing at locations where both are present.

The new partner may also be a victim and should preserve evidence. Threats against the new partner can support separate complaints.


XXXII. Harassment Through Children and Co-Parenting Apps

If the former partner is a co-parent, they may use child-related communication to continue abuse.

Examples:

  • Sending insults under the pretext of visitation;
  • Repeated unnecessary messages;
  • Threatening custody action to control the victim;
  • Withholding support unless the victim replies;
  • Using the child to deliver messages;
  • Posting about custody disputes online.

Possible remedies:

  • Limit communication to child-related matters;
  • Use written channels only;
  • Request court-defined communication rules;
  • Seek protection order if VAWC applies;
  • Document support and custody threats;
  • Avoid exposing the child to adult conflict.

XXXIII. Financial Abuse and Online Threats

A former partner may use money to harass:

  • Threatening to stop support;
  • Demanding return of gifts;
  • Threatening to post debt claims;
  • Using shared bank accounts;
  • Locking the victim out of e-wallets;
  • Making unauthorized transactions;
  • Monitoring spending;
  • Threatening lawsuits to force contact.

Financial control may be relevant in VAWC cases, family law disputes, civil cases, or cybercrime if digital accounts are misused.


XXXIV. What If the Former Partner Threatens Suicide?

Threats of self-harm can be frightening and manipulative.

The victim may:

  • Notify the former partner’s family or close friends;
  • Call emergency services or local authorities if the threat seems imminent;
  • Preserve the messages;
  • Avoid meeting alone;
  • Avoid accepting responsibility for the former partner’s choices;
  • Set boundaries;
  • Seek help from counselors or authorities.

A person should not be forced to stay in a relationship because of threats of self-harm.


XXXV. What If the Former Partner Apologizes Then Repeats the Conduct?

A cycle of abuse may include:

  1. Threats or harassment;
  2. Apology;
  3. Promise to stop;
  4. Temporary calm;
  5. Renewed threats;
  6. Escalation.

Document every incident. Repeated behavior strengthens the case for protection.


XXXVI. Demand Letter or Cease-and-Desist Letter

A cease-and-desist letter may be useful when the victim wants a formal warning before filing cases.

It may demand that the former partner:

  • Stop contacting the victim;
  • Stop contacting family, friends, employer, or school;
  • Remove harmful posts;
  • Stop using fake accounts;
  • Delete intimate images;
  • Stop threatening disclosure;
  • Preserve evidence;
  • Communicate only through counsel, if applicable.

However, if there is immediate danger, intimate image threats, or serious violence risk, report first rather than sending a warning that may trigger escalation.


XXXVII. Sample Cease-and-Desist Message

This is a formal demand for you to stop contacting me, threatening me, posting about me, and contacting my family, friends, workplace, or any third party regarding me.

You are not authorized to share, post, send, or disclose any private information, photos, videos, conversations, or personal data involving me.

Any further threats, harassment, impersonation, posting, or disclosure will be documented and reported to the proper authorities, including cybercrime, privacy, and protection-order remedies where applicable.

Keep it factual and avoid insults.


XXXVIII. Sample Complaint Narrative

I was previously in a relationship with [name] from [date] to [date]. After our separation, [name] repeatedly contacted me through [platforms] despite my request to stop.

On [date], [name] sent messages threatening to [state threat]. On [date], [name] posted [describe post] on [platform]. On [date], [name] contacted my [family/employer/friends] and disclosed private information about me.

These acts have caused fear, anxiety, humiliation, and emotional distress. I am submitting screenshots, call logs, account links, witness statements, and other evidence. I respectfully request assistance and appropriate legal action.


XXXIX. Sample Affidavit Outline

A complaint-affidavit may include:

  1. Identity of complainant;
  2. Relationship with respondent;
  3. Date and circumstances of breakup;
  4. Description of harassment;
  5. Specific threats and dates;
  6. Platforms used;
  7. Evidence attached;
  8. Impact on victim;
  9. Prior requests to stop;
  10. Fear for safety, if applicable;
  11. Relief requested.

For VAWC cases, include facts showing the covered relationship and psychological impact.


XL. Evidence Annex List

Organize attachments:

  • Annex A: Screenshots of threats
  • Annex B: Screenshots of social media posts
  • Annex C: Profile link and identity of respondent
  • Annex D: Call logs
  • Annex E: Messages sent to family or employer
  • Annex F: Intimate image threat screenshots
  • Annex G: Takedown reports
  • Annex H: Police or barangay blotter
  • Annex I: Medical or psychological certificate, if any
  • Annex J: Witness statements

Good organization improves credibility.


XLI. What If the Victim Still Has the Former Partner’s Private Information?

Do not retaliate by posting the former partner’s photos, secrets, messages, or private information. Retaliation can create liability and weaken the victim’s case.

The safest approach is:

  • Preserve evidence;
  • Report to proper authorities;
  • Avoid online fights;
  • Do not threaten counter-exposure;
  • Do not hack accounts;
  • Do not access shared accounts without authority;
  • Communicate through legal channels.

XLII. If the Former Partner Is Abroad

Cyber harassment can be committed from abroad.

Steps:

  • Preserve evidence;
  • Report to Philippine cybercrime authorities if the victim is in the Philippines or harm occurs here;
  • Report to platforms for takedown;
  • Consider reporting to authorities in the offender’s location if known;
  • Preserve immigration, address, or contact information;
  • Seek protection orders if applicable and enforceable locally;
  • Protect digital accounts and contacts.

Cross-border enforcement is harder, but reporting still helps document the abuse and may support platform actions.


XLIII. If the Victim Is Abroad and the Former Partner Is in the Philippines

The victim may still seek help through:

  • Authorized representative in the Philippines;
  • Philippine consulate for guidance;
  • Police or cybercrime complaints;
  • Lawyer in the Philippines;
  • Platform reporting;
  • Family members preserving local evidence;
  • Protection-related remedies if applicable.

If the victim plans to return to the Philippines, safety planning is important.


XLIV. If the Former Partner Is a Police Officer, Military Personnel, Lawyer, Teacher, Public Official, or Professional

If the offender is a professional or public officer, additional administrative remedies may exist depending on conduct.

Possible actions:

  • Criminal complaint;
  • Administrative complaint before employer or agency;
  • Professional disciplinary complaint, where appropriate;
  • Internal affairs or disciplinary unit complaint;
  • Protection order;
  • Civil damages.

Abuse of authority, access to records, or threats using official position may aggravate the situation.


XLV. If the Former Partner Uses Legal Cases as Harassment

Some former partners file repeated complaints, barangay reports, or threats of cases to intimidate the victim.

The victim should:

  • Respond to real notices;
  • Preserve false threats;
  • Ask for copies of actual complaints;
  • Avoid ignoring court or prosecutor documents;
  • Document malicious or repeated filings;
  • Seek legal advice if legal harassment becomes a pattern.

A false complaint may have legal consequences, but the response must be handled carefully.


XLVI. If the Former Partner Claims “Freedom of Speech”

Freedom of speech does not protect threats, harassment, non-consensual intimate image sharing, doxxing, cyberlibel, coercion, or privacy violations.

A person may express feelings about a breakup, but they cannot unlawfully threaten, expose, defame, or abuse another person.


XLVII. If the Former Partner Says “You Sent Me the Photos, So I Can Post Them”

No. Private sharing during a relationship does not give unlimited permission to publish, forward, upload, or use intimate materials for revenge, threats, or humiliation.

Consent to receive or possess a private image is not consent to distribute it.


XLVIII. If the Former Partner Says “I Did Not Name You”

A post may still identify the victim if people can reasonably determine who is being referred to through:

  • Photos;
  • Initials;
  • Tags;
  • Context;
  • Shared history;
  • Comments;
  • Location;
  • Nicknames;
  • Screenshots;
  • Mutual friends.

The absence of a full name does not automatically make a post harmless.


XLIX. If the Former Partner Uses Dummy Accounts

Dummy accounts are common.

Evidence linking the former partner may include:

  • Same writing style;
  • Same private information known only to the former partner;
  • Timing after breakup;
  • Threats sent before from real account;
  • Same phone number or email;
  • Mutual contacts;
  • Account recovery clues;
  • IP or subscriber information obtainable through lawful process;
  • Admissions;
  • Screenshots from friends;
  • Repeated references to private events.

Do not assume a dummy account makes the case impossible.


L. If the Former Partner Deletes Messages

Deleted messages may still be proven through:

  • Screenshots already taken;
  • Recipient copies;
  • Chat backups;
  • Platform records through lawful process;
  • Email notifications;
  • Witnesses who saw the messages;
  • Screenshots from third parties;
  • Device forensic examination in serious cases.

Act quickly to preserve evidence.


LI. If the Victim Deleted Messages

If the victim deleted messages, try:

  • Checking archived chats;
  • Checking cloud backups;
  • Asking recipients for screenshots;
  • Checking email notifications;
  • Downloading platform data;
  • Checking old devices;
  • Reviewing call logs;
  • Using screenshots sent to friends.

Do not fabricate evidence to replace deleted messages.


LII. If the Victim Previously Replied Angrily

Victims sometimes respond emotionally. That does not automatically erase the former partner’s liability.

However, hostile replies can complicate the case. From now on:

  • Stop online arguments;
  • Keep messages factual;
  • Use one boundary notice;
  • Preserve evidence;
  • Report through proper channels.

Avoid threats or defamatory counter-posts.


LIII. Mental Health and Medical Evidence

Psychological violence and harassment may cause:

  • Anxiety
  • Panic attacks
  • Depression
  • Insomnia
  • Loss of appetite
  • Fear of leaving home
  • Work impairment
  • Trauma symptoms
  • Emotional distress

Medical or psychological consultation may help the victim recover and may support evidence of harm, especially in VAWC or civil damages claims.


LIV. Civil Damages

The victim may claim damages when harassment causes injury.

Possible damages may include:

  • Moral damages for emotional suffering;
  • Actual damages for therapy, medical bills, lost income, relocation, or security costs;
  • Exemplary damages in proper cases;
  • Attorney’s fees and litigation expenses, where allowed.

Civil claims require proof of wrongful conduct and damage.


LV. Barangay Conciliation: Use With Caution

Some disputes between residents of the same city or municipality may require barangay conciliation before court action. However, serious cases involving VAWC, threats, cybercrime, or protection orders may not be suitable for ordinary barangay mediation.

A victim should not be forced into unsafe face-to-face confrontation with an abusive former partner.

If barangay involvement is needed, request safety measures and documentation.


LVI. What Not to Do

Do not:

  1. Meet the former partner alone after threats.
  2. Send more intimate photos.
  3. Pay blackmail money without seeking help.
  4. Delete evidence.
  5. Publicly retaliate with insults or private information.
  6. Hack the former partner’s accounts.
  7. Use fake accounts to attack back.
  8. Ignore real legal documents.
  9. Assume threats will not escalate.
  10. Keep the abuse secret if safety is at risk.
  11. Let the offender use children as messengers.
  12. Sign agreements under threat.
  13. Withdraw complaints because of pressure without legal advice.
  14. Blame yourself for the offender’s conduct.
  15. Delay reporting intimate image threats.

LVII. Practical Step-by-Step Guide for Victims

Step 1: Assess immediate danger

If there is a threat of physical harm, contact police, barangay, building security, family, or trusted persons immediately.

Step 2: Preserve evidence

Take screenshots, save URLs, export chats, save call logs, and back up evidence.

Step 3: Secure digital accounts

Change passwords, enable two-factor authentication, check logged-in devices, and revoke access.

Step 4: Send a boundary notice, if safe

Tell the former partner to stop contact and stop posting or sharing private information.

Step 5: Avoid further arguments

Do not engage in long emotional exchanges.

Step 6: Report platform abuse

Report fake accounts, threats, non-consensual intimate images, impersonation, or doxxing.

Step 7: Notify trusted people

Tell family, workplace, school, or security if they may be contacted or if there is physical risk.

Step 8: File appropriate complaints

Consider barangay, police, Women and Children Protection Desk, cybercrime units, privacy authority, or court protection orders depending on facts.

Step 9: Seek legal and psychological support

A lawyer, women’s desk, social worker, counselor, or trusted support group can help.

Step 10: Continue documenting

Harassment cases are often patterns, so document every new incident.


LVIII. Practical Step-by-Step Guide for a Friend or Family Member Helping the Victim

Step 1: Believe and support the victim

Avoid blaming them for the former partner’s conduct.

Step 2: Help preserve evidence

Take screenshots, save links, and store copies.

Step 3: Avoid confronting the offender recklessly

This may escalate danger.

Step 4: Assist with reporting

Accompany the victim to barangay, police, lawyer, or support services.

Step 5: Help secure accounts and devices

Assist with password changes and privacy settings.

Step 6: Watch for escalation

Take threats seriously.

Step 7: Support safety planning

Help arrange transportation, safe accommodation, or workplace notification if needed.


LIX. Practical Step-by-Step Guide for Employers or Schools

If a former partner harasses an employee or student through the workplace or school:

  1. Preserve messages or emails received.
  2. Do not disclose schedules, contact details, or private information.
  3. Refer the matter privately to the victim.
  4. Alert security if physical threats exist.
  5. Block abusive accounts or numbers.
  6. Avoid spreading the content internally.
  7. Support the victim’s documentation.
  8. Cooperate with lawful requests from authorities.
  9. Consider flexible safety measures if needed.
  10. Protect confidentiality.

Workplaces and schools should not become tools of harassment.


LX. Sample Workplace Notice

I am experiencing harassment from a former partner who may contact the office or send false or private information about me. Please do not disclose my schedule, contact details, address, or personal information. Kindly preserve any communication received from this person and inform me or security immediately.


LXI. Sample Platform Report Text

This account is harassing and threatening me. The person is my former partner and is using this account to send threats, disclose private information, and contact people connected to me. I am requesting urgent review, takedown of abusive content, and preservation of account records.

For intimate images:

This content contains or threatens non-consensual intimate images of me. I did not consent to publication or sharing. Please remove it urgently and preserve relevant records.


LXII. Frequently Asked Questions

1. Can I file a case against a former partner for online threats?

Yes. Depending on the threats and relationship, possible remedies include VAWC, cybercrime complaints, threats, coercion, unjust vexation, protection orders, data privacy complaints, and civil damages.

2. Does VAWC apply to a former boyfriend?

It may apply if the victim is a woman and the former boyfriend had a sexual or dating relationship with her. Psychological violence and harassment may be covered.

3. What if my former partner threatens to post my intimate photos?

Preserve the threat, do not send more materials, report to platforms and authorities, and consider complaints under laws on intimate image abuse, VAWC, threats, coercion, cybercrime, and data privacy.

4. What if the photos were originally sent voluntarily?

Voluntary private sharing does not mean the former partner may publish or forward them. Distribution without consent can still be unlawful.

5. Can I get a protection order for online harassment?

In VAWC cases, protection orders may address harassment, contact, threats, stalking, and related conduct, including acts done online.

6. What if my former partner uses dummy accounts?

Document the accounts and preserve evidence linking them to the former partner. Authorities may seek platform records through proper process.

7. Should I block my former partner?

Often yes, after preserving evidence. If there are children or legal matters, consider limited written communication or communication through counsel or approved channels.

8. Can I post about what they did?

Be careful. Factual statements may be safer, but online retaliation can create legal risk. It is usually better to report through proper channels.

9. Can my former partner be liable for messaging my employer?

Possibly, especially if the messages are threatening, defamatory, invasive of privacy, or part of VAWC psychological abuse.

10. What if I am afraid they will come to my house or workplace?

Treat it as a safety issue. Inform trusted people, security, barangay, or police, and consider a protection order where available.


LXIII. Conclusion

Cyber harassment and threats by a former partner in the Philippines can trigger serious legal remedies. The conduct may fall under VAWC, cybercrime laws, the Revised Penal Code, the Anti-Photo and Video Voyeurism Act, the Safe Spaces Act, the Data Privacy Act, and civil liability principles. The proper remedy depends on the relationship, the type of threats, the platforms used, the evidence, and whether intimate images, children, workplace harassment, or physical danger are involved.

The victim’s strongest protection is quick, organized action: preserve evidence, secure digital accounts, avoid unsafe meetings, notify trusted people, report platform abuse, and seek help from barangay, police, cybercrime authorities, women and children protection desks, courts, or privacy authorities as appropriate.

A former partner has no legal right to threaten, stalk, shame, expose, impersonate, hack, or control another person after a relationship ends. The end of a relationship does not end a person’s rights to safety, privacy, dignity, and legal protection.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.