Cyber Libel and Defamation for Spreading False Information

A Philippine Legal Guide

In the Philippines, spreading false information about another person can lead to criminal, civil, and sometimes even administrative consequences. When the defamatory statement is published online—through Facebook, X, TikTok, YouTube, Instagram, group chats, blogs, comment sections, emails, or similar digital platforms—the issue often becomes cyber libel. If the same defamatory matter is expressed through speech rather than writing or online posting, the issue may instead fall under oral defamation or related offenses. In everyday language, people often use “defamation” broadly, but in Philippine law the exact classification matters.

This topic is frequently misunderstood. Many people think that any false statement is automatically cyber libel. That is not correct. Others think that adding “in my opinion” or “allegedly” makes a harmful post safe. That is also not always correct. Some believe truth is always a complete defense; others think deleting the post erases liability. Neither assumption is universally right.

This article explains the Philippine legal framework on cyber libel and defamation for spreading false information: what the offenses are, how they differ, the legal elements, the role of falsity, publication, malice, defenses, privilege, online republication, group chats, screenshots, anonymous accounts, corporate victims, public officials, damages, criminal procedure, evidence preservation, and practical issues that arise when a person posts or shares false information online.


1. The basic legal framework

In Philippine law, defamation is generally discussed through the traditional offenses of:

  • libel
  • oral defamation or slander
  • slander by deed

When the libelous matter is committed through a computer system or similar digital means, the issue may become cyber libel under the cybercrime framework, using the traditional concept of libel as the underlying offense.

So the basic structure is:

A. Traditional libel

Defamation in writing, print, or similar permanent form.

B. Cyber libel

Libel committed through a computer system or analogous digital medium.

C. Oral defamation

Defamation spoken rather than written.

D. Civil defamation-type liability

Even where criminal prosecution is not pursued or does not prosper, civil damages may still be sought in proper cases.

This means that “spreading false information” does not always produce one single legal consequence. The precise form of publication matters.


2. What is defamation?

Defamation is essentially an imputation that tends to:

  • dishonor,
  • discredit,
  • disgrace,
  • ridicule, or
  • lower a person in the estimation of others.

In Philippine legal terms, the statement must generally be of a kind that damages reputation or tends to expose a person to public hatred, contempt, or ridicule.

Examples include false imputations that a person:

  • committed a crime,
  • is corrupt,
  • is a scammer,
  • is immoral,
  • has a sexually improper relationship,
  • is mentally unstable in a degrading sense,
  • has a stigmatizing disease used to humiliate,
  • stole money,
  • committed fraud,
  • abused someone,
  • or engaged in other disgraceful conduct.

Not every insulting statement is actionable. Mere rude language, generalized anger, or obvious insult may not always reach the threshold of criminal defamation. The law focuses on defamatory imputations, not just bad manners.


3. What is libel?

Libel is defamation made through writing, printing, engraving, radio, painting, theatrical exhibition, or similar means that embody the defamatory matter in a relatively fixed form. In practical modern application, written online posts often fit the logic of libel.

Examples of potentially libelous formats include:

  • Facebook posts
  • tweets or X posts
  • Instagram captions
  • TikTok text posts
  • YouTube community posts or descriptions
  • blog articles
  • online news comments
  • email blasts
  • online forums
  • screenshots with defamatory captions
  • graphics or memes containing defamatory claims

When that same libelous content is made through a computer system, the offense may be treated as cyber libel.


4. What is cyber libel?

Cyber libel is essentially libel committed through a computer system or digital technology. The defamatory content is still analyzed using the traditional principles of libel, but the online mode of publication brings it under the cybercrime framework.

This commonly includes:

  • social media posts
  • online articles
  • websites and blogs
  • digital comments
  • online forums
  • messaging platforms when used in a publication-like way
  • other computer-based publication systems

Cyber libel is not a separate universe of defamation law. It is traditional libel, digitally committed, with the consequences and issues that arise from the internet’s speed, reach, permanence, and replicability.


5. Why cyber libel is especially serious

Online defamation can spread faster and wider than traditional libel. A false accusation posted online can:

  • go viral,
  • be screenshotted,
  • be copied to multiple platforms,
  • be reshared indefinitely,
  • remain searchable,
  • damage employment and business opportunities,
  • attract harassment,
  • and permanently affect reputation.

Because of this, cyber libel complaints are often filed even when the original speaker believes they were “just posting online” or “just warning others.”

The internet does not make speech legally consequence-free.


6. The basic elements of libel and cyber libel

A cyber libel case generally revolves around the classic elements of libel, plus the online mode of commission. The key elements are commonly understood as follows:

  1. There is an imputation of a discreditable act or condition to another person.
  2. The imputation is published.
  3. The person defamed is identifiable.
  4. There is malice, either presumed or actual, unless privilege removes the presumption.
  5. For cyber libel, the publication is made through a computer system or similar digital means.

If any of these is missing, the case weakens substantially.


7. Falsity matters, but not in the simplistic way people think

The topic here is spreading false information, and falsity is obviously central in ordinary understanding. But Philippine libel law does not operate on the crude formula:

false statement = automatic cyber libel

Instead, the legal inquiry usually asks:

  • Was there a defamatory imputation?
  • Was it published?
  • Was the person identifiable?
  • Was it malicious?
  • Is there a valid defense such as truth, privilege, or fair comment?

A statement can be damaging yet not actionable if it falls within privilege or protected comment. A statement can be false yet still fail as a case if publication or identifiability is not proved. A statement can also be partly true but misleading in a way that still creates problems.

So falsity matters greatly, but it is not the only element.


8. What kinds of false information commonly lead to cyber libel complaints?

Common examples include false online claims that someone:

  • is a thief or estafador
  • is a scammer
  • stole company funds
  • committed adultery or concubinage in a degrading context
  • is corrupt in office
  • committed sexual abuse or harassment without basis
  • forged documents
  • is a drug user or dealer
  • has a criminal record
  • abandoned children or family
  • spread disease or has a stigmatized condition used to humiliate
  • cheated customers
  • manipulated donations
  • is mentally ill in a contemptuous or false way
  • runs a fake business
  • committed academic fraud or professional misconduct

These statements are especially dangerous because they go directly to character, criminality, business reputation, or morality.


9. Publication: the statement must be communicated to someone else

A private thought is not libel. A defamatory statement must be published, meaning communicated to a third person.

In cyber libel, publication may occur through:

  • posting on a public profile
  • posting in a private group with other members
  • sending an email to multiple persons
  • posting in a comment thread
  • sharing in a group chat
  • uploading a video containing defamatory allegations
  • forwarding defamatory screenshots to others

The law does not always require publication to the whole world. Communicating the defamatory statement to even one third person can be enough in principle.


10. Is a private group chat enough for publication?

Potentially yes. Many people assume that because a post is inside:

  • a Messenger group,
  • Viber group,
  • Telegram group,
  • WhatsApp group,
  • workplace chat,
  • or private Facebook group,

it is automatically safe from libel law. That is incorrect.

If the defamatory statement is communicated to third persons in the group, publication may exist. The smaller or more private nature of the audience may affect proof, damages, and context, but it does not automatically eliminate publication.

A false accusation in a barangay group chat, HOA chat, workplace chat, parent Viber group, or family thread can still be legally dangerous.


11. Identifiability: must the name be stated?

No. The victim need not always be named explicitly, so long as the person is identifiable from the context.

A statement may still be defamatory if it refers to:

  • “the HR manager of Company X,”
  • “that doctor in Clinic Y,”
  • “the treasurer of our homeowners association,”
  • “the woman who borrowed money from us in Block 3,”
  • “the professor handling this section,”

and enough people can reasonably identify who is meant.

Attempts to hide behind initials, nicknames, blurred photos, or vague references may fail if the audience still knows who is being targeted.


12. Malice: a central concept

Malice is one of the most important concepts in libel law. In broad terms, it refers to the wrongful intent attached to the defamatory imputation.

In ordinary libel analysis, defamatory statements are often treated as presumed malicious, unless they fall into a privileged category. This means the law may presume malice from the defamatory publication itself.

But this presumption can be challenged by defenses such as:

  • truth in a proper context,
  • privilege,
  • fair comment,
  • absence of defamatory meaning,
  • lack of identifiability,
  • or other recognized defenses.

Where the statement is privileged, actual malice may need to be shown more specifically.


13. Truth is important, but not every “true” statement is automatically safe

A common defense to defamation is truth, but this area is more nuanced than people assume.

A person often thinks:

  • “It’s true, so I can post it.” That is not always a complete legal answer.

Questions may include:

  • Can the speaker actually prove truth?
  • Was the imputation made with good motives and for justifiable ends?
  • Was the publication privileged?
  • Was the presentation misleading, exaggerated, or selective?
  • Was it stated as fact when the evidence was uncertain?

A person who cannot prove truth in court is in a dangerous position if they made a serious accusation online.

“Everyone knows it’s true” is not proof.


14. Opinion is not an automatic shield

Another common myth is:

  • “It’s just my opinion.”

That phrase does not automatically prevent cyber libel liability. Calling something an opinion does not help if the statement still implies false defamatory facts.

For example:

  • “In my opinion, he is a thief” still carries a defamatory factual imputation.

By contrast, genuine rhetorical opinion, criticism, or value judgment may be more defensible when it does not assert undisclosed false facts as though they were true.

The law looks at substance, not just the label “opinion.”


15. “Allegedly” is also not an automatic shield

Adding words like:

  • allegedly
  • rumor has it
  • I heard
  • according to sources
  • maybe
  • seems like

does not automatically save a speaker if the overall post still spreads a defamatory accusation as though it were substantially true.

A person cannot launder defamation by dressing it in softening words. Courts and prosecutors look at the overall sting and effect of the statement.


16. Republication and sharing

One of the most dangerous features of online defamation is republication. A person can be exposed not only for creating the false post, but also for sharing, retweeting, reposting, copy-pasting, or otherwise republishing defamatory matter.

Examples:

  • sharing a post calling someone a scammer
  • reposting a screenshot accusing someone of sexual misconduct without verifying it
  • copying an online accusation to another platform
  • forwarding defamatory messages to a group
  • uploading someone else’s libelous content to amplify it

Repeating someone else’s defamatory statement does not always protect the repeater. “I just shared it” is often a weak defense.


17. Screenshots can preserve liability even after deletion

Deleting the post does not necessarily erase liability. Once published, the act may already be complete. Screenshots, archives, downloads, witness testimony, or cached copies may preserve the evidence.

Deletion may help reduce ongoing damage or show later remorse, but it does not automatically undo publication.

This is why impulsive posts can become permanent legal problems even if they are taken down within hours.


18. Anonymous and fake accounts

Many online defamatory posts come from dummy or anonymous accounts. People often assume anonymity makes them untouchable. In practice, anonymity complicates identification but does not always prevent it.

Investigative avenues may include:

  • account linkage evidence
  • email or phone recovery details
  • IP or device-related information through lawful process
  • pattern of writing and conduct
  • admissions
  • connected accounts
  • witness knowledge
  • metadata in some contexts

An anonymous post may still lead to a complaint if the author can later be traced.


19. Memes, images, and edited posts

Defamation is not limited to plain sentences. It can be conveyed through:

  • memes
  • graphics
  • edited screenshots
  • misleading captions
  • side-by-side image comparisons
  • fake chat screenshots
  • caricatures with factual accusations
  • videos with defamatory text overlays

A false meme calling someone a criminal or scammer can be just as dangerous as a long written rant.

The law looks at the defamatory imputation, not merely the artistic format.


20. Tagging and naming others in comment threads

A person may incur risk not only through the original post, but also by:

  • tagging the target under a defamatory thread,
  • naming the target in comments,
  • replying to others with false accusations,
  • confirming rumors publicly in comments,
  • posting “context” that identifies the victim.

Comments are not legally insignificant. A defamatory comment under someone else’s post can still stand on its own as a publication.


21. Livestreams and video content

Spreading false information through livestreams, reels, videos, podcasts, or online broadcasts can also create liability. Depending on the format and how the statement is embodied and transmitted, the issue may be analyzed as cyber libel or another form of defamation-related offense.

A livestream accusing someone of theft, fraud, or immoral conduct can be extremely risky because:

  • it reaches an audience immediately,
  • it is often recorded or clipped,
  • it may be reposted,
  • and it can cause rapid reputational harm.

Online speech is still speech with consequences.


22. Oral defamation versus cyber libel

If the accusation is spoken only, the issue may tend toward oral defamation, not libel. But once the spoken matter is embodied in an online publication, recording, or upload, the analysis can shift.

Examples:

  • yelling “thief” at someone in person: possibly oral defamation or related offense
  • posting a text accusation online: cyber libel
  • uploading a video accusing someone falsely: potentially cyber libel issues arise because of digital publication
  • voice note shared widely in a group: fact-sensitive, but legally risky

The form of communication matters.


23. Public officials and public figures

Statements about public officials, candidates, celebrities, and other public figures raise more complicated issues because public discussion and criticism receive greater space in law and public policy.

Still, this does not mean public officials can be defamed freely. False accusations of crime, corruption, or misconduct can still create liability. What changes is the analysis of:

  • fair comment,
  • public interest,
  • privilege,
  • and the need to protect robust discussion on public matters.

A person may criticize a mayor, senator, judge, or influencer strongly. But inventing false facts is far more dangerous than expressing harsh opinion on verified conduct.


24. Fair comment on matters of public interest

One recognized area of protection is fair comment on matters of public interest. This generally covers criticism directed at issues where the public has a legitimate concern, such as:

  • public office
  • public spending
  • governance
  • public controversies
  • professional performance in public-facing roles

But fair comment has limits. It is stronger where:

  • the facts relied upon are true or substantially established,
  • the statements are comment rather than fabricated fact,
  • the criticism is tied to public interest,
  • and the speaker is not acting with actual malice.

A false invented accusation is much harder to protect than a harsh evaluation of known facts.


25. Privileged communication

Certain communications may be privileged, meaning they are protected or treated differently for libel purposes.

Absolute privilege

Some statements made in specific legal or official settings receive stronger protection.

Qualified privilege

Some communications are protected unless actual malice is shown. Examples may include certain fair and true reports or certain private complaints made in good faith to proper authorities.

This is extremely important in practice because a person may lawfully complain to the police, prosecutor, school, HR department, regulatory agency, or governing board in good faith, even if the accusation is serious, without automatically committing libel.

But blasting the same accusation on social media is a very different matter.


26. Complaint to authorities versus public posting

This is one of the most important practical distinctions.

Safer legal route

If a person honestly believes another committed wrongdoing, the proper route is often:

  • file a complaint with police,
  • report to HR,
  • report to the school,
  • complain to a regulatory body,
  • seek legal advice,
  • submit evidence to the proper forum.

Riskier route

Posting the accusation publicly online:

  • “Beware, this person is a thief”
  • “This teacher is a molester”
  • “This businessman is a scammer”
  • “This neighbor is a drug addict”

can trigger cyber libel exposure if the accusation is false or unprovable.

The law generally gives more room to good-faith reporting to proper authorities than to public online shaming.


27. Business and corporate reputation

Defamation issues can also arise in business settings, including false claims that:

  • a company is a scam,
  • a restaurant poisons customers,
  • a clinic uses fake doctors,
  • a business launders money,
  • a seller is a fraudster,
  • a cooperative steals member funds.

Depending on the exact target and wording, both natural persons and business-related entities may be affected. If the defamatory statement points to identifiable officers, owners, or professionals, the risk becomes even more concrete.

Online “call-out” culture becomes especially dangerous when factual accusations are made without evidence.


28. Review bombing and false reviews

False online reviews can create legal risk when they go beyond negative opinion and assert defamatory false facts.

Example:

  • “Bad service, I didn’t like it” is very different from
  • “This clinic fakes lab results,”
  • “This seller steals identities,”
  • “This hotel runs a prostitution ring,” if those factual allegations are false.

A customer can criticize honestly, but inventing criminal or disgraceful conduct is a different matter.


29. Malicious editing and misleading context

Sometimes the false information is not wholly invented, but distorted:

  • cropped screenshots
  • edited chat messages
  • selective quotation
  • misdated documents
  • false captions on real photos
  • presenting satire as fact
  • taking jokes literally to destroy reputation

A statement can be defamatory not only because it is completely fabricated, but because it creates a false damaging impression through manipulation.

Half-truths can be legally dangerous.


30. Satire, jokes, and parody

Satire and parody may have some protection, especially when clearly non-literal. But the defense weakens when the content is presented so realistically that reasonable viewers may believe it as fact.

A fake “wanted” poster, edited criminal booking image, or fabricated scandal post described later as “just a joke” may still create serious exposure if it damaged reputation and appeared factual.

Humor is not an absolute shield.


31. The role of intent

Many people ask whether they can avoid liability by saying:

  • “I didn’t mean to ruin their reputation.”

Intent can matter, but the law often focuses on the deliberate publication of the defamatory matter itself. If a person intentionally posts a false accusation to others, later claims of “I was just emotional” or “I was only venting” may not carry much weight.

Recklessness is also dangerous. Publishing a serious accusation without verifying facts can create major legal problems.


32. Good faith

Good faith can be relevant, especially in privileged communications or fair comment contexts. But “good faith” is not a magic defense if the speaker:

  • had no basis,
  • ignored obvious doubt,
  • refused to verify,
  • embellished facts,
  • or posted recklessly to destroy another’s name.

A person who truly wishes to act in good faith should usually go to the proper authority, preserve evidence, and avoid unnecessary public accusations.


33. Defamation and actual damages

A person targeted by cyber libel may suffer:

  • job loss,
  • client loss,
  • humiliation,
  • family conflict,
  • social ostracism,
  • emotional distress,
  • reputational injury,
  • mental anguish,
  • and online harassment.

These harms can support civil claims for damages in proper cases, whether through the criminal case’s civil aspect or separate civil action where appropriate.

So cyber libel is not only about punishment. It can also lead to compensation claims.


34. Civil and criminal exposure can coexist

A person who spreads false information online may face:

  • a criminal complaint for cyber libel, and
  • civil claims for damages.

These are not mutually exclusive. Even where criminal prosecution becomes complicated, civil liability may still remain relevant.

The reputational harm caused by false online accusations is often the basis for both.


35. Evidence in a cyber libel case

A strong cyber libel case usually involves careful evidence preservation, such as:

  • screenshots of the full post
  • URL links
  • date and time stamps
  • account name and profile data
  • comment threads
  • reposts and shares
  • witness affidavits from people who saw the post
  • web archives or cached copies
  • device captures
  • proof of the victim’s identity from context
  • proof of falsity, where applicable
  • records of resulting harm

Evidence should ideally capture the whole context, not just isolated lines.


36. Why screenshots alone may not always be enough

Screenshots are useful, but they can be challenged as:

  • cropped,
  • edited,
  • incomplete,
  • taken out of context,
  • or insufficient to prove authorship.

That is why stronger evidence often includes:

  • full thread capture,
  • profile identification,
  • metadata where available,
  • corroborating witnesses,
  • archived pages,
  • admissions,
  • and proof connecting the accused to the account.

A case built only on a blurry screenshot may face problems.


37. Authorship and account ownership

One major issue in cyber libel cases is proving who actually controlled the account that published the defamatory content.

Defenses may include:

  • “That’s not my account.”
  • “I was hacked.”
  • “Someone else used my phone.”
  • “The page is managed by another person.”
  • “I did not write that post.”

So the complainant must often prove account ownership or control through:

  • profile links,
  • associated contact information,
  • admission,
  • consistent usage patterns,
  • related messages,
  • or other identifying evidence.

38. Can reacting, liking, or commenting create liability?

Simply “liking” a post is usually different from authoring or republishing it, though context matters. But commenting in a way that repeats or confirms the defamatory accusation can create separate exposure.

For example:

  • a mere emoji reaction is different from
  • “Yes, he really stole money from us too.”

The second may stand as its own defamatory publication if false.


39. Journalists, bloggers, and content creators

Those who publish regularly online should be especially careful. Content creators often assume that independent or citizen journalism gives wide protection. It does give room for commentary and reporting, but it also carries responsibility.

The safer approach is:

  • verify facts,
  • distinguish allegation from proof,
  • attribute carefully,
  • avoid sensational certainty without evidence,
  • and understand privilege rules.

Online audience size can magnify both harm and liability.


40. Public warning posts: “Beware of this person”

These are common and legally dangerous. A “beware” post can be valid if grounded on provable, carefully stated facts and published for a legitimate purpose through proper channels. But many such posts become cyber libel complaints because they include:

  • exaggerated accusations,
  • false criminal labels,
  • unverified rumors,
  • humiliating photos,
  • and invitations for others to shame the target.

Public warning culture is not a license to publish unverified allegations.


41. What if the speaker later apologizes?

Apology may help in:

  • reducing hostility,
  • supporting settlement,
  • mitigating damages in practical terms,
  • showing lack of persistence.

But apology does not automatically erase liability once publication occurred. It may influence how the case develops, but it is not an automatic legal reset button.


42. Common defenses raised by the accused

A person accused of cyber libel commonly argues:

A. The statement is true

But truth must usually be proved, not merely asserted.

B. It was only opinion

This works only if it was truly non-defamatory opinion and not a disguised false factual imputation.

C. The victim was not identifiable

This may work if the audience genuinely could not know who was meant.

D. There was no publication

This is harder where the post was seen by others.

E. The statement was privileged

This can be powerful when the communication was made in good faith to proper authorities or in another protected context.

F. The accused did not author the post

This is a major factual defense in anonymous or disputed-account cases.

G. There was no malice

This can matter especially in privileged communications or fair comment cases.

H. The words were not defamatory

Some statements may be insults or opinion rather than defamatory imputations of fact.


43. Common mistakes made by complainants

Victims of online defamation often weaken their case by:

  • failing to preserve the original post quickly,
  • relying only on cropped screenshots,
  • not identifying the account properly,
  • not documenting who saw the post,
  • filing based on hurt feelings rather than defamatory content,
  • confusing insult with libel,
  • failing to show identifiability,
  • ignoring possible privilege defenses,
  • or not organizing proof of falsity and damage.

A cyber libel case must be built methodically.


44. Common mistakes made by posters

People who spread false information online often make these mistakes:

  • posting in anger,
  • assuming deletion solves everything,
  • thinking “share only” avoids liability,
  • adding “allegedly” and thinking they are safe,
  • relying on rumors,
  • posting first before filing a proper complaint,
  • exposing private accusations to thousands of people,
  • confusing moral certainty with legal proof,
  • using fake accounts and thinking that ends the matter,
  • escalating in comment threads after being warned.

Most cyber libel cases begin with impulsive publication, not careful malice planning.


45. Criminal complaint versus administrative complaint versus proper reporting

A person with a real grievance should distinguish among:

  • proper complaint to authorities,
  • proper administrative report,
  • civil demand,
  • and public shaming online.

For example:

  • If you believe a lawyer committed misconduct, go to the proper body.
  • If you believe an employee stole, report to police or HR.
  • If you believe a teacher abused a child, report to the school and authorities.
  • If you believe a seller scammed you, gather records and report properly.

Jumping straight to a public accusation online can turn the accuser into a cyber libel respondent if the facts are false or unprovable.


46. Spreading false information during elections, community fights, or business disputes

Cyber libel risk rises sharply in:

  • election seasons,
  • HOA disputes,
  • barangay conflicts,
  • breakup disputes,
  • employment termination fights,
  • family property battles,
  • online selling disputes,
  • school-parent conflicts.

These settings combine anger, rumor, and public audience. False accusations in these contexts often become criminal complaints because people post before thinking.


47. A practical legal distinction: accusation versus process

The law is more tolerant of this:

  • “I am filing a complaint because I believe X happened.”

It is far less tolerant of this:

  • “This person is definitely a criminal/scammer/abuser,” when the speaker cannot prove it and publishes it widely online.

The first points toward process. The second points toward reputational destruction.

That distinction often determines whether the statement looks defensible or reckless.


48. Final legal takeaway

In the Philippines, cyber libel is a serious form of defamation committed through digital means. Spreading false information online can create criminal and civil liability when the publication contains a defamatory imputation, identifies the victim, is communicated to third persons, and is not protected by privilege or other valid defenses.

The most important principles are these:

  • not every false statement is automatically cyber libel, but serious false defamatory accusations are highly dangerous;
  • online publication through social media, group chats, comments, screenshots, and reposts can satisfy the publication element;
  • naming the victim is not always necessary if the person is identifiable;
  • saying “opinion,” “allegedly,” or “I just shared it” does not automatically protect the speaker;
  • truth, fair comment, and privileged communication can matter, but they must be properly grounded;
  • deleting the post does not necessarily erase liability; and
  • proper reporting to authorities is far safer than public online accusation when the facts are disputed.

In practical terms, the safest rule is simple: if the statement accuses someone of crime, fraud, immorality, abuse, or other disgraceful conduct, and you cannot firmly prove it in the proper forum, posting it online is legally dangerous.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.