Cyber Libel and Online Defamation on Social Media in the Philippines

I. Introduction

Social media has turned defamation from a traditional print or broadcast issue into an everyday legal risk. In the Philippines, a Facebook post, X/Twitter thread, TikTok caption, YouTube video, Instagram story, Reddit comment, group chat screenshot, livestream statement, or shared meme can potentially become the basis of a civil, criminal, or cybercrime-related complaint.

The central legal idea is simple: a person may be held liable when they publicly make a false and damaging statement that injures another person’s reputation. When this is done through the internet or information and communications technology, the issue may become cyber libel.

Philippine law treats reputation as a legally protected interest. At the same time, the Constitution protects freedom of speech, freedom of expression, freedom of the press, and the people’s right to comment on public issues. Cyber libel cases therefore often involve a tension between two interests: protection of reputation and protection of free expression.


II. Core Laws Governing Cyber Libel and Online Defamation

The main legal sources are:

  1. The Revised Penal Code, especially Articles 353 to 362 on libel, slander, and related offenses.
  2. Republic Act No. 10175, the Cybercrime Prevention Act of 2012, particularly Section 4(c)(4), which penalizes cyber libel.
  3. Civil Code provisions on damages, abuse of rights, privacy, and injury to reputation.
  4. The 1987 Constitution, especially provisions protecting free speech, free expression, press freedom, due process, and privacy.
  5. Supreme Court jurisprudence, especially cases interpreting libel, actual malice, fair comment, public figures, privileged communication, and the validity of cyber libel.

III. What Is Defamation?

Defamation is the general term for a false statement that harms another person’s reputation.

In Philippine law, defamation may take several forms:

1. Libel

Libel is defamation committed through writing, printing, publication, broadcast, or similar means.

Under Article 353 of the Revised Penal Code, libel is generally understood as a public and malicious imputation of a crime, vice, defect, act, omission, condition, status, or circumstance that tends to cause dishonor, discredit, or contempt against a person.

2. Slander or Oral Defamation

Slander, also called oral defamation, is defamation spoken orally. It is covered by Article 358 of the Revised Penal Code.

3. Slander by Deed

Slander by deed occurs when a person performs an act, not merely words, that casts dishonor or contempt upon another person. This is covered by Article 359.

4. Cyber Libel

Cyber libel is libel committed through a computer system or similar means. This includes social media platforms, websites, blogs, messaging platforms, email, online forums, and other digital communication channels.


IV. What Is Cyber Libel?

Cyber libel is essentially traditional libel committed online.

Section 4(c)(4) of the Cybercrime Prevention Act punishes:

Libel, as defined in Article 355 of the Revised Penal Code, committed through a computer system or any similar means which may be devised in the future.

This means cyber libel is not a completely new kind of defamation. It borrows the definition of libel from the Revised Penal Code but applies it to online or digital publication.

Examples of platforms where cyber libel may occur include:

  • Facebook posts, comments, stories, reels, or shared posts
  • X/Twitter posts and replies
  • TikTok videos, captions, comments, or livestreams
  • YouTube videos, community posts, and comments
  • Instagram captions, stories, reels, and comments
  • Blogs and personal websites
  • Reddit posts and comments
  • Online forums
  • Messaging apps, depending on publication and audience
  • Email blasts
  • Online petitions
  • Digital newsletters
  • Screenshots reposted online
  • Group chats, depending on circumstances

V. Essential Elements of Libel and Cyber Libel

For libel or cyber libel to exist, the following elements are generally required:

  1. There must be an imputation.
  2. The imputation must be defamatory.
  3. The imputation must be malicious.
  4. The imputation must be public.
  5. The victim must be identifiable.

For cyber libel, there is an additional practical requirement:

  1. The defamatory publication must be made through a computer system or similar digital means.

VI. First Element: Imputation

An imputation is an allegation or statement about a person.

It may accuse someone of:

  • A crime
  • Corruption
  • Fraud
  • Dishonesty
  • Immorality
  • Professional incompetence
  • Sexual misconduct
  • Abuse
  • Scamming
  • Theft
  • Adultery or concubinage
  • Drug use or trafficking
  • Being a “criminal,” “thief,” “rapist,” “estafador,” “swindler,” or similar label
  • Having a disease or condition that causes social contempt
  • Any act, omission, status, or circumstance that harms reputation

The statement may be direct or indirect. It may be made through words, images, memes, edited photos, videos, captions, hashtags, emojis, insinuations, or sarcastic phrasing.

For example, a post saying:

“Alam na ng lahat kung sino ang magnanakaw sa opisina.”

may become legally risky if the context clearly points to a specific person.


VII. Second Element: Defamatory Character

A statement is defamatory if it tends to dishonor, discredit, or cause contempt against another person.

The court does not look only at the literal words. It considers the ordinary meaning, context, audience, tone, and surrounding circumstances.

A statement may be defamatory even if phrased as a question, joke, blind item, meme, or “opinion,” if the ordinary reader would understand it as making a factual accusation.

Examples of potentially defamatory statements:

  • “Si A ay scammer.”
  • “Nagnakaw ng pera sa kumpanya si B.”
  • “Fake lawyer si C.”
  • “Manyak at predator si D.”
  • “Drug pusher yang si E.”
  • “Corrupt ang mayor na iyan; may ninakaw na pondo.”
  • “This doctor killed my mother because of negligence,” if stated as fact without basis.
  • “This teacher abuses students,” if false or unsupported.

Not every insult is libel. Some words may be treated as mere vulgarity, anger, hyperbole, or opinion. However, when the language contains a factual accusation that damages reputation, liability becomes more likely.


VIII. Third Element: Malice

Malice is one of the most important concepts in libel law.

There are two kinds:

1. Malice in Law

Malice in law is presumed from the defamatory nature of the publication. If the statement is defamatory, the law may presume malice unless the accused can show that the statement was privileged or justified.

2. Malice in Fact

Malice in fact means actual ill will, spite, intent to injure, or reckless disregard of whether the statement is false.

In cases involving public officials, public figures, or matters of public concern, courts often examine whether the speaker acted with actual malice, especially where constitutional free speech principles are involved.

Actual malice generally means the statement was made:

  • With knowledge that it was false; or
  • With reckless disregard of whether it was false or not.

Mere criticism, harsh language, or honest commentary on public conduct is not automatically libelous.


IX. Fourth Element: Publication

Publication means that the defamatory statement was communicated to at least one person other than the person defamed.

In social media, publication is often easy to prove because posts, comments, shares, videos, and screenshots are usually visible to others.

Examples of publication:

  • Posting on a public Facebook profile
  • Commenting on a public page
  • Uploading a TikTok video
  • Posting a YouTube video
  • Sending a defamatory email to multiple people
  • Sharing a defamatory screenshot in a group chat
  • Publishing a blog post
  • Posting a blind item where readers can identify the target

Private one-on-one communication only to the person being insulted may not satisfy publication for libel, though it may raise other legal issues. But if a third person sees or receives the statement, publication may be present.


X. Fifth Element: Identifiability of the Victim

The allegedly defamed person must be identifiable.

The person does not always need to be named directly. Identification may arise from:

  • Initials
  • Photos
  • Nicknames
  • Job titles
  • School or workplace references
  • Tags
  • Screenshots
  • Context
  • Comments from readers identifying the person
  • “Blind item” clues
  • Hashtags
  • Prior disputes known to the audience

For example:

“Yung manager sa accounting na kakalipat lang last month, alam n’yo na kung sino, siya ang nagnakaw.”

Even without a name, the person may be identifiable if readers can determine who is being referred to.


XI. The Online Requirement in Cyber Libel

Cyber libel requires that libel be committed through a computer system or similar digital means.

The Cybercrime Prevention Act defines computer-related concepts broadly. In practice, social media posts, online comments, electronic messages, websites, blogs, and digital publications may fall within this requirement.

The online nature of the act matters because cyber libel carries a higher penalty than ordinary libel.


XII. Penalty for Cyber Libel

Cyber libel is generally punished more severely than ordinary libel because the Cybercrime Prevention Act provides that covered cybercrimes may be punished by a penalty one degree higher than that provided under the Revised Penal Code, where applicable.

Ordinary libel under the Revised Penal Code is punishable by imprisonment or fine, or both. Cyber libel, because of the one-degree-higher rule, may expose the accused to a heavier penalty.

The exact penalty depends on the charge, applicable law, court interpretation, and circumstances of the case.


XIII. Is Cyber Libel a Criminal Case?

Yes. Cyber libel is a criminal offense.

A person accused of cyber libel may face:

  • Criminal prosecution
  • Arrest or preliminary investigation
  • Bail proceedings
  • Arraignment
  • Trial
  • Possible conviction
  • Fine
  • Imprisonment
  • Civil damages

A complainant may also pursue civil damages arising from the same defamatory act.


XIV. Civil Liability for Online Defamation

Even when criminal liability is not pursued or does not prosper, a person may still face civil liability.

Civil actions may be based on:

  • Damages under the Civil Code
  • Abuse of rights
  • Unjust injury to reputation
  • Violation of privacy
  • Mental anguish, social humiliation, wounded feelings, or similar harm
  • Business losses caused by defamatory statements

Possible damages include:

  • Actual damages
  • Moral damages
  • Exemplary damages
  • Attorney’s fees
  • Litigation expenses

A business, professional, public official, private individual, influencer, teacher, doctor, lawyer, student, employee, or ordinary citizen may sue if reputational harm can be shown.


XV. Cyber Libel Versus Ordinary Libel

The main difference is the medium.

Issue Ordinary Libel Cyber Libel
Medium Print, writing, traditional publication, broadcast, similar means Internet, social media, computer systems, digital platforms
Legal source Revised Penal Code Revised Penal Code plus Cybercrime Prevention Act
Penalty RPC penalty Generally one degree higher
Examples Newspaper article, printed pamphlet, letter circulated to others Facebook post, TikTok video, blog, online comment, tweet, group chat publication

XVI. Cyber Libel Versus Slander

Cyber libel is usually written, posted, uploaded, or digitally published.

Slander is oral.

However, online video and livestream situations may blur the line. A spoken defamatory statement in a livestream, uploaded video, podcast, or online broadcast may still be treated as libelous if it is embodied in a digital publication or recording. The exact classification may depend on how prosecutors and courts view the medium.


XVII. Social Media Posts That Commonly Lead to Cyber Libel Complaints

Common examples include:

1. Scam Accusations

Calling someone a scammer, fraudster, estafador, or fake seller can be defamatory if false or unsupported.

2. Criminal Accusations

Accusing someone of theft, rape, corruption, drug dealing, falsification, assault, or child abuse is highly risky unless supported by established facts.

3. Workplace Allegations

Posts accusing a co-worker, employer, employee, teacher, or supervisor of misconduct may lead to complaints, especially if the person is identifiable.

4. Business Reviews

Negative reviews are allowed, but false factual claims may become defamatory. Saying “I had a bad experience” is different from saying “this restaurant steals from customers” without basis.

5. Relationship Disputes

Posts involving cheating, abuse, sexually transmitted infections, pregnancy, intimate photos, or personal secrets can lead not only to cyber libel but also privacy, harassment, or gender-based online abuse issues.

6. Political Posts

Criticism of public officials is protected to a wider extent, especially on matters of public concern. But knowingly false accusations of specific crimes may still create liability.

7. Influencer and Content Creator Disputes

Callout posts, exposé videos, reaction videos, and online “tea” content may become cyber libel if they present false factual allegations.

8. School and Student Conflicts

Posts accusing classmates, teachers, administrators, or students of misconduct may create legal exposure, even for minors, though special rules may apply to children in conflict with the law.


XVIII. Is Sharing or Reposting Defamatory Content Cyber Libel?

It can be.

A person who creates the defamatory post is the primary publisher. But a person who shares, reposts, quote-posts, stitches, duets, or republishes defamatory material may also create a new publication.

The legal risk depends on the circumstances, including:

  • Whether the sharer adopted or endorsed the defamatory statement
  • Whether they added defamatory captions
  • Whether they merely shared neutrally
  • Whether the repost increased circulation
  • Whether the person knew or should have known the statement was false
  • Whether the post was made with malice

The Supreme Court in discussions of cyber libel has been careful about overextending liability to every passive online interaction. For example, mere “liking” or reacting to a post should not automatically be treated the same as authoring a defamatory publication. But active republication or endorsement can still be risky.


XIX. Are Comments on a Post Separately Libelous?

Yes. A comment can be a separate publication.

For example, if the original post says:

“Beware of this person.”

and a commenter writes:

“Oo, magnanakaw talaga yan. Nagnakaw sa amin dati.”

the commenter may be separately liable if the accusation is defamatory and false.

Each post, comment, caption, or republication may be evaluated individually.


XX. Are Memes, Emojis, and Hashtags Covered?

Potentially, yes.

Defamation is not limited to formal sentences. Courts may consider the total message conveyed.

Examples:

  • Posting someone’s photo with a thief emoji
  • Tagging someone with “#scammer”
  • Creating a meme implying someone is corrupt
  • Using a snake emoji to imply betrayal or fraud
  • Posting a person’s image beside words like “wanted,” “magnanakaw,” or “manyac”
  • Using edited screenshots to imply misconduct

Humor is not an automatic defense. A joke can still be defamatory if it conveys a false factual accusation.


XXI. Are Private Group Chats Covered?

They may be.

A defamatory statement in a group chat may satisfy the publication requirement because it is communicated to persons other than the target.

Relevant considerations include:

  • Number of group chat members
  • Whether the group is private or large
  • Whether members personally know the target
  • Whether the target is identifiable
  • Whether screenshots were later circulated
  • Whether the statement caused actual reputational harm

A small private conversation may reduce some risks, but it does not automatically eliminate liability.


XXII. Anonymous Accounts and Fake Profiles

Using a fake account does not necessarily prevent liability.

Investigators may attempt to identify the user through:

  • Account records
  • IP addresses
  • Device data
  • Email or phone number links
  • Witness testimony
  • Screenshots
  • Metadata
  • Admissions
  • Circumstantial evidence
  • Platform records, when legally obtainable

However, proving identity can be challenging. A complainant must connect the accused to the publication.


XXIII. The Importance of Screenshots and Digital Evidence

In cyber libel cases, evidence often includes:

  • Screenshots
  • URLs
  • Screen recordings
  • Archived pages
  • Witness affidavits
  • Certified printouts
  • Platform records
  • Metadata
  • Chat exports
  • Device forensic reports
  • Notarized or authenticated copies, where appropriate
  • Preservation requests, where available

A screenshot alone may not always be enough if authenticity is disputed. The party relying on it may need to prove that the screenshot accurately reflects the original post and that the accused authored, controlled, or published it.

Important evidentiary issues include:

  • Who captured the screenshot
  • When it was captured
  • Whether the post was public or private
  • Whether the post was edited or deleted
  • Whether the account belongs to the accused
  • Whether the image was manipulated
  • Whether the chain of custody is reliable

XXIV. Deleting the Post

Deleting a defamatory post does not automatically erase liability.

Deletion may help reduce damage, but the offense may already have been committed once the post was published.

However, deletion may matter in:

  • Showing remorse
  • Mitigating damages
  • Settlement discussions
  • Injunction or takedown requests
  • Assessing continuing harm
  • Evaluating intent

A public apology may also help in settlement but may not automatically extinguish criminal liability unless the complainant and prosecution process allow termination through lawful means.


XXV. Common Defenses in Cyber Libel

1. Truth

Truth may be a defense, especially when the statement was made with good motives and for justifiable ends.

However, truth is not always a complete defense by itself in Philippine criminal libel. The law traditionally also considers whether the publication was made with good motives and justifiable purpose.

2. Fair Comment

Fair comment protects opinions or criticism on matters of public interest, especially concerning public officials, public figures, public institutions, public conduct, consumer issues, and public controversies.

A fair comment should be based on facts and should not knowingly assert false facts.

3. Privileged Communication

Some communications are privileged.

Privileged communication may be:

Absolutely privileged

Examples include certain statements made in official proceedings, legislative proceedings, judicial pleadings, or other contexts where public policy gives complete protection.

Qualifiedly privileged

Examples may include good-faith reports to authorities, complaints to proper agencies, or communications made in performance of a legal, moral, or social duty.

Qualified privilege can be defeated by proof of actual malice.

4. Lack of Identifiability

There may be no libel if the complainant cannot prove that the statement referred to them.

A vague rant may not be actionable if no reasonable reader can identify the target.

5. Lack of Publication

There may be no libel if the statement was not communicated to a third person.

6. Opinion

Pure opinion is generally protected. But calling something an “opinion” does not automatically protect it.

For example:

  • Protected opinion: “I think the service was terrible.”
  • Risky factual accusation: “The owner steals customers’ money.”

7. Absence of Malice

The accused may argue that there was no malice, especially if the statement was made in good faith, based on available facts, in a proper forum, or as part of a legitimate complaint.

8. Public Figure or Public Concern Defense

Public officials and public figures are subject to wider criticism. Statements about matters of public concern receive stronger constitutional protection.

However, knowingly false statements or reckless accusations may still be actionable.

9. No Authorship or No Control of the Account

An accused may deny authorship or control of the account used to publish the statement.

This may be relevant in cases involving hacked accounts, fake profiles, shared devices, or fabricated screenshots.

10. Prescription

The accused may argue that the case was filed beyond the legally allowed period. Prescription in cyber libel has been a contested legal issue because different laws may affect the applicable period.


XXVI. Public Officials, Public Figures, and Criticism

Philippine law recognizes that public officials must tolerate a higher degree of criticism. The public has a legitimate interest in discussing the conduct of government officials, candidates, police officers, elected leaders, and other persons exercising public power.

Statements about public officials may be protected when they are:

  • Comments on official conduct
  • Based on facts
  • Made in good faith
  • Related to public interest
  • Not knowingly false
  • Not made with reckless disregard of truth

However, private lives of public officials are not automatically open to defamatory attack. The more unrelated the statement is to public duty, the weaker the public-interest defense becomes.


XXVII. Public Figures and Influencers

Influencers, celebrities, online personalities, vloggers, journalists, streamers, activists, and prominent business figures may be considered public figures in certain contexts.

They may be subject to wider commentary, especially on matters connected to their public role. But they are not without protection. False factual accusations can still be defamatory.

For example:

  • Criticizing a vlogger’s content is generally protected.
  • Saying the vlogger committed a specific crime without basis may be defamatory.
  • Reviewing a public business transaction may be protected.
  • Fabricating allegations of fraud may create liability.

XXVIII. Private Individuals Receive Stronger Protection

Private individuals generally receive greater protection because they have not voluntarily exposed themselves to public scrutiny.

A defamatory post about a private citizen’s personal life, family, workplace, sexuality, illness, finances, or alleged misconduct may be more likely to create liability, especially if the matter is not of public concern.


XXIX. Online Reviews and Consumer Complaints

Consumers have the right to express honest opinions and experiences. A negative review is not automatically libel.

Safer examples:

  • “The delivery was late.”
  • “I did not like the food.”
  • “The seller did not respond to my messages.”
  • “In my experience, the service was poor.”
  • “I paid on March 1 and have not received the item.”

Riskier examples:

  • “This seller is a scammer.”
  • “They steal money from customers.”
  • “The owner is a criminal.”
  • “Fake products lahat dito,” if unverified.
  • “This doctor kills patients,” if unsupported.

A good rule is to state verifiable facts and avoid unnecessary criminal labels.


XXX. Workplace Posts and Employment Disputes

Employees sometimes post about employers, managers, co-workers, or workplace incidents. These posts may raise cyber libel risks and may also violate company policies.

Examples of risky posts:

  • Accusing a manager of stealing company funds
  • Calling a co-worker a sexual predator without pursuing proper procedures
  • Posting internal documents with accusations
  • Publicly identifying an employee as corrupt or incompetent
  • Publishing private HR matters

Safer alternatives include:

  • Filing a complaint with HR
  • Reporting to DOLE, NLRC, CSC, PRC, or the proper agency
  • Keeping statements factual
  • Avoiding public accusations before investigation
  • Consulting counsel before posting

XXXI. Student, School, and Campus Context

Cyber libel issues commonly arise from:

  • Class group chats
  • Anonymous confession pages
  • School meme pages
  • Teacher callouts
  • Bullying accusations
  • Cheating allegations
  • Harassment claims
  • Screenshots of private conversations

Students may face not only legal consequences but also school disciplinary action. If minors are involved, child protection laws, juvenile justice rules, school regulations, and privacy laws may also become relevant.


XXXII. Sexual Misconduct Allegations Online

Online allegations of harassment, assault, abuse, or sexual misconduct are legally sensitive.

Victims have the right to seek help and report abuse. However, publicly naming a person as an abuser, rapist, predator, or harasser may lead to cyber libel exposure if the accusation cannot be proven or if made with malice.

Safer channels may include:

  • Police authorities
  • Prosecutor’s office
  • Barangay mechanisms where appropriate
  • School offices
  • HR or administrative offices
  • CHR, PCW-related mechanisms, or other proper agencies
  • Courts
  • Legal counsel
  • Trusted support organizations

Public callouts may have social value in some cases, but they also carry serious legal risk.


XXXIII. Cyber Libel and Online Gender-Based Abuse

Some online defamation disputes overlap with gender-based online abuse.

Depending on the facts, other laws may become relevant, such as:

  • Safe Spaces Act
  • Anti-Photo and Video Voyeurism Act
  • Violence Against Women and Children laws
  • Data Privacy Act
  • Anti-Bullying rules
  • Child protection laws
  • Special Protection of Children Against Abuse laws

For example, posting false sexual allegations may be cyber libel. Posting real but private intimate images may involve privacy, voyeurism, or gender-based online abuse, even if no false statement is made.


XXXIV. Data Privacy and Doxxing

Cyber libel may overlap with data privacy violations when posts include personal information such as:

  • Home address
  • Phone number
  • Government IDs
  • Medical records
  • School records
  • Financial information
  • Private photos
  • Chat screenshots
  • Workplace records
  • Family details

Even if a post is not defamatory, it may still violate privacy rights. Conversely, a defamatory post that includes private personal data may create multiple causes of action.


XXXV. Liability of Page Admins, Group Admins, and Moderators

Admins may face risk depending on their role.

Relevant questions include:

  • Did the admin create the post?
  • Did the admin approve the post?
  • Did the admin add defamatory captions?
  • Did the admin refuse to remove defamatory content after notice?
  • Did the admin encourage defamatory comments?
  • Is the page designed to publish accusations?
  • Was the admin merely a passive platform manager?

Philippine law does not automatically make every admin liable for every user comment. But active participation, approval, endorsement, or republication can increase risk.


XXXVI. Liability of Platforms

Large social media platforms are usually not the direct defendants in ordinary cyber libel complaints between private persons. The complainant usually proceeds against the author, poster, uploader, or person behind the account.

However, platforms may become involved through:

  • Takedown requests
  • Preservation requests
  • Law enforcement requests
  • Court orders
  • Reporting mechanisms
  • Account information requests, subject to law and platform policies

XXXVII. Jurisdiction and Venue

Cyber libel cases may involve difficult jurisdiction and venue issues because online content can be accessed anywhere.

Relevant factors may include:

  • Where the complainant resides
  • Where the post was accessed
  • Where the defamatory article was first published
  • Where the accused resides
  • Where the damage was felt
  • Where the offended party holds office, for public officers
  • Rules on venue under criminal procedure and cybercrime rules

Venue is important because filing in the wrong place may cause procedural problems.


XXXVIII. Prescription Period

Prescription refers to the period within which a case must be filed.

For ordinary libel, prescription has traditionally been shorter. For cyber libel, the applicable prescriptive period has been the subject of legal debate because the Cybercrime Prevention Act and related laws may affect computation.

Because this issue has been contested and may depend on the specific charge and controlling jurisprudence, parties should be careful in assessing when the cause of action accrued, when the post was published, whether it was republished, and when the complaint was filed.


XXXIX. Republication and Continuing Availability

One difficult issue in online defamation is whether a post that remains online is a continuing offense.

Generally, publication occurs when the defamatory material is made available to third persons. However, reposting, editing, resharing, reuploading, pinning, quoting, or circulating screenshots may create separate acts of publication.

A complainant may argue that later reposts caused new harm. An accused may argue that the original publication date controls.

This issue matters for prescription, venue, and damages.


XL. Criminal Procedure: How a Cyber Libel Complaint Usually Proceeds

A typical cyber libel complaint may involve the following stages:

1. Evidence Gathering

The complainant gathers screenshots, URLs, witness statements, and proof of identity of the poster.

2. Complaint-Affidavit

The complainant prepares a complaint-affidavit describing the defamatory statement, publication, identity of the accused, and harm suffered.

3. Filing Before the Prosecutor

The complaint is usually filed for preliminary investigation.

4. Counter-Affidavit

The respondent is required to answer the accusation.

5. Reply and Rejoinder

The parties may submit additional affidavits.

6. Prosecutor’s Resolution

The prosecutor determines whether probable cause exists.

7. Filing of Information

If probable cause is found, an Information may be filed in court.

8. Court Proceedings

The accused may be arraigned and the case proceeds to pre-trial and trial.

9. Judgment

The court may acquit or convict. Civil liability may also be awarded.


XLI. Remedies for Victims

A person who believes they were defamed online may consider:

  • Preserving screenshots and URLs
  • Recording dates and times of publication
  • Identifying witnesses who saw the post
  • Avoiding emotional public retaliation
  • Sending a demand letter, where appropriate
  • Reporting the content to the platform
  • Requesting takedown
  • Filing a complaint with proper authorities
  • Seeking civil damages
  • Consulting a lawyer for criminal and civil options

The victim should preserve evidence before the post is deleted.


XLII. Risks for Accused Persons

A person accused of cyber libel should avoid:

  • Posting further attacks
  • Deleting evidence without legal advice
  • Contacting the complainant in a threatening way
  • Creating new accounts to continue posting
  • Encouraging friends to harass the complainant
  • Publishing “receipts” that contain private or defamatory material
  • Ignoring subpoenas or prosecutor notices

A proper response usually involves reviewing the exact post, context, evidence of truth, possible privilege, lack of malice, and procedural defenses.


XLIII. Demand Letters and Retractions

Many cyber libel disputes begin with a demand letter asking the poster to:

  • Delete the post
  • Publish an apology
  • Stop further publication
  • Pay damages
  • Identify other persons involved
  • Preserve evidence
  • Undertake not to repeat the accusation

A retraction or apology may help resolve the matter, but it should be carefully worded. A poorly drafted apology may be treated as an admission.


XLIV. Settlement

Cyber libel cases may be settled, depending on the stage and nature of the case.

Settlement may involve:

  • Public apology
  • Private apology
  • Deletion or correction
  • Undertaking not to repost
  • Payment of damages
  • Mutual non-disparagement
  • Withdrawal of complaint where legally allowed
  • Affidavit of desistance

An affidavit of desistance does not automatically bind the prosecutor or court, especially in criminal cases, but it may influence proceedings.


XLV. Free Speech Considerations

The constitutional right to free speech protects strong, critical, unpopular, and even offensive speech. It is especially important in political discussion, consumer advocacy, journalism, academic debate, labor issues, and public-interest commentary.

However, free speech is not unlimited. It does not generally protect knowingly false factual accusations that unjustly destroy another person’s reputation.

The legal boundary often depends on whether the statement is:

  • Fact or opinion
  • True or false
  • Public concern or private dispute
  • Good faith or malicious
  • Fair comment or personal attack
  • Proper complaint or public shaming
  • Criticism or accusation of crime

XLVI. Journalism and Media

Journalists and media organizations may face libel or cyber libel complaints for online articles, headlines, social media captions, and uploaded reports.

Important protections include:

  • Fair and true reporting
  • Privileged reports of official proceedings
  • Absence of actual malice
  • Public interest
  • Verification
  • Balanced reporting
  • Opportunity to comment
  • Reliance on official records

However, sensationalized headlines, unverified allegations, misleading captions, and one-sided accusations may increase legal risk.


XLVII. Bloggers, Vloggers, and Content Creators

Content creators should understand that informal online content can have formal legal consequences.

Risky formats include:

  • “Exposé” videos
  • Blind items
  • Reaction videos
  • Callout posts
  • Livestream rants
  • Screenshotted conversations
  • “Story time” accusations
  • Anonymous tips
  • Drama content
  • Edited clips implying misconduct

Content creators may reduce risk by:

  • Verifying facts
  • Distinguishing fact from opinion
  • Avoiding criminal labels
  • Giving context
  • Avoiding misleading edits
  • Seeking comment from the person accused
  • Avoiding private information
  • Using careful language
  • Keeping records of sources

XLVIII. Truth, Receipts, and Screenshots

Many people believe that having “receipts” is enough. It is not always that simple.

Screenshots may help prove factual basis, but they may also raise issues:

  • Were the screenshots complete?
  • Were they edited?
  • Were they taken out of context?
  • Were they lawfully obtained?
  • Do they prove the accusation?
  • Do they contain private information?
  • Are they admissible?
  • Do they show the accused person actually committed the alleged act?

A screenshot showing a disagreement does not necessarily prove fraud. A delayed delivery does not automatically prove estafa. A bad breakup does not automatically prove abuse. A rude message does not automatically prove criminal harassment.


XLIX. Opinion Versus Fact

This distinction is crucial.

Generally safer opinion:

  • “I think the service was bad.”
  • “In my view, the explanation was not credible.”
  • “I would not recommend this seller based on my experience.”
  • “The policy seems unfair.”
  • “I disagree with the mayor’s decision.”

Risky factual accusation:

  • “The seller is a scammer.”
  • “The mayor stole public funds.”
  • “The doctor committed malpractice.”
  • “The teacher is a predator.”
  • “The employee falsified documents.”

A statement framed as “I think” may still be defamatory if it implies undisclosed defamatory facts.


L. Hyperbole and Rhetorical Exaggeration

Some statements are too exaggerated to be taken literally.

For example:

  • “This traffic policy is killing us.”
  • “That service was a nightmare.”
  • “This restaurant robbed me with those prices.”

These may be treated as hyperbole depending on context. But saying “the owner robbed me by stealing my wallet” is a factual accusation.


LI. Blind Items

Blind items can be defamatory if the person is identifiable.

Even without naming the target, liability may arise if readers can determine the person through clues.

Common identifying clues include:

  • Workplace
  • City
  • Initials
  • Relationship history
  • Photos with blurred faces
  • Unique events
  • Nicknames
  • Mutual friends
  • Comment section confirmations
  • Hashtags
  • Timing

A blind item is not safe merely because the name is omitted.


LII. Tagging and Mentioning

Tagging a person directly makes identification easier. Tagging a workplace, school, relatives, or friends may also increase publication and damage.

Mentioning someone’s employer or business can increase reputational harm and may support claims for damages if employment, clients, or business relationships are affected.


LIII. Group Defamation

Defamation generally requires an identifiable person. Statements against a large group may be harder to prosecute unless a specific person is identifiable.

For example:

  • “All politicians are corrupt” is usually too broad.
  • “The treasurer of Barangay X stole funds” identifies a specific person.
  • “The three officers of ABC Corp. falsified records” may identify the members of a small group.

The smaller and more definite the group, the higher the risk.


LIV. Defaming Corporations and Businesses

Corporations, partnerships, schools, clinics, restaurants, shops, and other entities may be defamed.

Statements that injure business reputation may lead to civil claims and, depending on the circumstances, criminal complaints by responsible persons.

Examples:

  • “This clinic uses fake doctors.”
  • “This restaurant serves spoiled meat.”
  • “This school sells diplomas.”
  • “This company is a scam.”
  • “This seller steals customer payments.”

Truthful reviews based on actual experience are generally safer than broad accusations of criminal conduct.


LV. Defamation of Deceased Persons

Libel law may protect the memory of a deceased person when the defamatory imputation tends to blacken the memory of one who is dead or injure the reputation of living relatives.

This may arise in posts accusing a deceased person of crimes, immoral acts, or dishonorable conduct.


LVI. Cyber Libel and Political Speech

Political speech receives strong protection because public debate is essential in a democracy.

Protected political speech may include:

  • Criticism of officials
  • Criticism of policies
  • Satire
  • Opinion on governance
  • Commentary on public spending
  • Discussion of public records
  • Calls for accountability

But political speech may become actionable if it contains knowingly false factual allegations, such as accusing a person of a specific crime without basis.

A safer formulation focuses on facts:

  • “The COA report flagged these transactions.”
  • “The mayor should explain this contract.”
  • “I disagree with the procurement process.”
  • “The public deserves transparency.”

Riskier formulation:

  • “The mayor stole the funds,” if not proven.

LVII. Satire and Parody

Satire and parody may be protected, especially in political commentary. But they can still become risky if reasonable readers would interpret them as asserting actual false facts.

A clearly absurd joke is safer than a realistic fake news-style post.

For example, a cartoon exaggerating a politician’s greed may be satire. A fake document claiming the politician was convicted of plunder may be defamatory if false and believed by readers.


LVIII. Fake News and Defamation

Not all fake news is cyber libel. It becomes cyber libel when it defames an identifiable person or entity.

A false post about a disaster may be misinformation but not necessarily libel. A false post accusing a named person of causing the disaster through criminal negligence may be libelous.


LIX. Interaction With the Data Privacy Act

The Data Privacy Act may apply where personal information is processed, posted, exposed, or misused.

Examples:

  • Posting someone’s ID to accuse them of scamming
  • Publishing private chat screenshots
  • Revealing someone’s medical diagnosis
  • Posting home address and phone number
  • Uploading private employment records

A person can commit privacy violations even when the statement is true. Truth is not always a defense to privacy invasion.


LX. Interaction With Anti-Bullying and School Rules

In school settings, online defamation may also be cyberbullying.

Students may face:

  • School disciplinary proceedings
  • Guidance intervention
  • Suspension or other sanctions
  • Civil liability
  • Criminal issues, depending on age and offense
  • Parent or guardian involvement

Schools may also have duties to address bullying and protect students.


LXI. Minors and Cyber Libel

When minors are involved, the Juvenile Justice and Welfare Act and child protection principles may apply.

A minor may still face legal processes, but the treatment differs depending on age, discernment, and applicable child justice rules.

Parents or guardians may also become involved in civil or school-related consequences.


LXII. Overseas Posters and OFWs

Cyber libel issues can involve Filipinos abroad.

Potential complications include:

  • Whether Philippine courts have jurisdiction
  • Where the post was made
  • Where it was accessed
  • Where the complainant resides
  • Whether the accused can be served or prosecuted
  • Whether the platform data is obtainable
  • Immigration or employment consequences

A Filipino abroad who posts defamatory content targeting a person in the Philippines may still face legal risk depending on jurisdictional facts.


LXIII. Foreign Victims or Foreign Platforms

The internet crosses borders, but criminal enforcement remains territorial. A post made on a foreign platform may still be relevant if accessed in the Philippines and if Philippine jurisdictional requirements are satisfied.

However, obtaining records from foreign platforms may require formal legal processes and may be difficult.


LXIV. Takedown of Defamatory Content

A complainant may seek takedown through:

  • Platform reporting tools
  • Demand letters
  • Court orders
  • Law enforcement processes
  • Settlement agreements
  • Administrative complaints, where applicable

Platforms apply their own community standards. A post may violate platform rules even if no court has found it defamatory.


LXV. Injunctions and Prior Restraint

Courts are generally cautious with orders that restrain speech before final adjudication because of constitutional concerns about prior restraint.

However, courts may issue certain orders in appropriate cases, especially where content is clearly unlawful, harmful, private, or subject to other legal protections. The availability of injunctive relief depends heavily on the facts.


LXVI. Moral Damages

Moral damages may be awarded when the defamatory publication causes:

  • Mental anguish
  • Serious anxiety
  • Social humiliation
  • Wounded feelings
  • Sleepless nights
  • Damage to family relations
  • Harm to professional standing
  • Public ridicule

The complainant must present evidence supporting the claim.


LXVII. Actual Damages

Actual damages require proof of measurable loss.

Examples:

  • Lost clients
  • Lost employment
  • Canceled contracts
  • Reduced sales
  • Medical or therapy expenses
  • Business losses
  • Costs directly caused by the defamatory post

Receipts, contracts, financial records, testimony, and other evidence may be necessary.


LXVIII. Exemplary Damages

Exemplary damages may be awarded in some cases to set an example or deter similar conduct, especially if the defendant acted in a wanton, fraudulent, reckless, oppressive, or malevolent manner.


LXIX. Attorney’s Fees

Attorney’s fees may be awarded in proper cases, but they are not automatic. The court must have a legal and factual basis for awarding them.


LXX. Criminal Fine and Imprisonment

Cyber libel may result in criminal penalties. The exact penalty depends on the charge and applicable law.

Courts may consider circumstances such as:

  • Nature of the statement
  • Extent of publication
  • Damage caused
  • Whether the accused apologized
  • Prior acts
  • Malice
  • Conduct during proceedings
  • Applicable mitigating or aggravating circumstances

LXXI. The Role of Intent

A person does not always need to admit intent to defame. Intent may be inferred from the words used, context, timing, repetition, refusal to correct, and surrounding facts.

For example, repeated posts accusing someone of a crime, tagging their employer and family, and encouraging harassment may support a finding of malice.


LXXII. Good Faith Complaints to Authorities

A person who has a legitimate grievance should generally report to the proper authority rather than immediately posting accusations online.

Good-faith complaints may be privileged when made to the proper office or person with authority to act.

Examples:

  • Filing a police report
  • Filing a complaint with a school
  • Reporting to HR
  • Reporting to a licensing board
  • Reporting to a regulator
  • Filing a case in court
  • Reporting consumer issues to proper agencies

Publicly posting the same accusation to shame the person may lose protection.


LXXIII. What Makes a Post More Legally Dangerous?

A post becomes more dangerous when it:

  • Accuses someone of a crime
  • Names or tags the person
  • Includes their photo
  • Tags their employer, school, relatives, or clients
  • Uses words like “scammer,” “rapist,” “thief,” “corrupt,” “fake,” or “criminal”
  • Encourages others to attack or boycott them
  • Contains private information
  • Is repeated multiple times
  • Is shared to many groups
  • Is boosted by ads
  • Is made by an influencer with a large following
  • Is false or unverified
  • Refuses correction after notice
  • Uses fake documents or misleading screenshots

LXXIV. What Makes a Post Safer?

A post is generally safer when it:

  • States only personal experience
  • Avoids criminal labels
  • Uses accurate dates and facts
  • Provides context
  • Avoids exaggeration
  • Does not reveal private information
  • Does not tag unrelated people
  • Distinguishes fact from opinion
  • Is made in good faith
  • Is addressed to proper authorities
  • Is supported by documents
  • Avoids unnecessary insults
  • Corrects mistakes promptly

Safer example:

“I paid ₱5,000 to Seller X on March 3. As of March 20, I have not received the item or a refund despite my messages. I am posting to ask for assistance and to document my experience.”

Riskier example:

“Seller X is a criminal scammer and thief. I hope everyone destroys their business.”


LXXV. “PM Sent” and Private Accusations

Even if a public post only says “PM me for details,” defamatory statements sent privately to multiple persons may still create publication.

A person can be liable for defamatory private messages if they are sent to third persons and harm the target’s reputation.


LXXVI. Reaction Videos, Stitches, and Duets

A person who reacts to defamatory content may be liable if they repeat, endorse, or expand the defamatory accusation.

Safer reaction:

“These are allegations. I cannot verify them. The parties should address this through the proper process.”

Riskier reaction:

“Confirmed scammer talaga siya. Dapat ipakulong.”


LXXVII. Livestreams

Livestreams can be especially risky because statements are spontaneous, recorded, shared, clipped, and reposted.

A defamatory livestream statement may create evidence through:

  • Screen recordings
  • Platform replay
  • Viewer testimony
  • Clips
  • Comments
  • Transcripts
  • Reuploads

Deleting the livestream does not necessarily remove liability if others recorded it.


LXXVIII. AI-Generated Defamation

AI-generated posts, fake images, synthetic voice clips, deepfakes, and fabricated screenshots may create liability if they defame an identifiable person.

A person who uses AI to create or distribute a false accusation may still be responsible. The fact that a tool generated the content is not a complete defense if the person knowingly published it.

Possible related issues include:

  • Cyber libel
  • Identity misuse
  • Privacy violation
  • Harassment
  • Falsification-like concerns, depending on context
  • Election-related offenses, if political
  • Platform policy violations

LXXIX. Employers and Employee Social Media Policies

Employers may discipline employees for defamatory or harmful posts, especially if the post affects the company, co-workers, clients, or workplace reputation.

However, discipline must still comply with labor standards, due process, company policy, and proportionality.

Employees also retain rights to lawful speech, labor organizing, whistleblowing, and legitimate complaints.


LXXX. Whistleblowing

Whistleblowing can be protected when done through proper channels and in good faith.

However, publicly accusing someone online without sufficient basis can expose the whistleblower to cyber libel.

The safer path is to report to:

  • Internal compliance office
  • Government regulator
  • Ombudsman, where applicable
  • COA, where applicable
  • Law enforcement
  • Prosecutor
  • Counsel
  • Proper administrative agency

LXXXI. Cyber Libel and Elections

Election periods intensify online defamation risks.

Posts about candidates, parties, campaign staff, public officials, and supporters may involve:

  • Cyber libel
  • Election law
  • Disinformation rules
  • Platform takedowns
  • Campaign regulations
  • Political speech protections

Political criticism is protected, but fabricated accusations of crimes, corruption, or immoral conduct may still lead to liability.


LXXXII. Business Competitors

Businesses sometimes use anonymous pages or fake reviews to attack competitors. This may result in:

  • Cyber libel
  • Unfair competition issues
  • Civil damages
  • Injunctions
  • Platform penalties
  • Possible criminal exposure

False reviews and coordinated smear campaigns are legally dangerous.


LXXXIII. Elements Applied to a Sample Scenario

Suppose a person posts on Facebook:

“Do not buy from Juan Dela Cruz of ABC Gadgets. He is a scammer and stole ₱20,000 from me.”

Legal analysis:

  1. Imputation: Juan is accused of scamming and theft.
  2. Defamatory nature: The statement harms reputation.
  3. Publication: Posted on Facebook.
  4. Identification: Juan and ABC Gadgets are named.
  5. Malice: May be presumed if defamatory, unless rebutted.
  6. Cyber element: Facebook is an online platform.

Possible defense:

  • The poster may show proof of payment, non-delivery, demand, and fraudulent intent.
  • But even then, using the word “scammer” may be riskier than stating documented facts.

LXXXIV. Another Sample: Public Official

Post:

“The mayor approved a questionable contract with Company X. The public should demand disclosure of bidding documents.”

This is likely safer because it comments on public conduct and asks for transparency.

Post:

“The mayor stole ₱10 million from the project,” without proof.

This is much riskier because it alleges a specific crime.


LXXXV. Another Sample: Restaurant Review

Post:

“We waited one hour, the food was cold, and the staff ignored our complaint. I do not recommend this restaurant.”

Generally safer.

Post:

“This restaurant poisons customers and uses rotten meat,” without proof.

Potentially defamatory and harmful to business reputation.


LXXXVI. Another Sample: Relationship Dispute

Post:

“My ex is a cheater and abuser. He has a disease. Girls, beware.”

This may raise cyber libel, privacy, harassment, and gender-related legal issues depending on truth, proof, intent, and context.

A safer approach would be to seek protection, report abuse through proper channels, and avoid unnecessary public disclosure of private medical or sexual information.


LXXXVII. Practical Checklist Before Posting About Someone

Before posting, ask:

  1. Is the person identifiable?
  2. Am I accusing them of a crime or dishonorable conduct?
  3. Can I prove the statement with admissible evidence?
  4. Is the post necessary?
  5. Is there a proper authority I should report to instead?
  6. Am I posting out of anger?
  7. Am I revealing private information?
  8. Am I using exaggerated labels?
  9. Could this harm their job, business, family, or safety?
  10. Would I be comfortable defending this in court?

LXXXVIII. Practical Checklist for Victims

If defamed online:

  1. Take screenshots immediately.
  2. Save the URL.
  3. Record the date and time.
  4. Capture comments, shares, and reactions if relevant.
  5. Identify witnesses who saw the post.
  6. Do not retaliate with another defamatory post.
  7. Report the content to the platform.
  8. Consider sending a demand letter.
  9. Preserve evidence of damage.
  10. Consult counsel before filing.

LXXXIX. Evidence of Damage

Useful proof may include:

  • Messages from people who saw the post
  • Lost clients
  • Employer notices
  • Canceled transactions
  • Medical records for anxiety or distress
  • Business revenue changes
  • Public comments ridiculing the victim
  • Testimony from family, friends, co-workers, or customers
  • Screenshots of shares and engagement

XC. Evidence for the Defense

Useful defense evidence may include:

  • Documents proving truth
  • Official records
  • Complaint filings
  • Receipts
  • Contracts
  • Full conversation context
  • Proof of good faith
  • Proof the post was opinion
  • Proof the complainant was not identifiable
  • Proof of lack of publication
  • Proof the accused did not own or control the account
  • Proof of hacking or impersonation
  • Evidence that the post was privileged

XCI. The Role of Barangay Proceedings

Some disputes may pass through barangay conciliation if the parties reside in the same city or municipality and the offense falls within covered rules. However, not all cyber libel situations are appropriate for barangay conciliation, especially where penalties, locations, parties, or legal exceptions affect jurisdiction.

The barangay process should not be assumed to replace formal legal remedies.


XCII. Prosecutorial Discretion

Even if a complainant files a cyber libel complaint, the prosecutor must determine probable cause.

The prosecutor may dismiss a complaint if:

  • The statement is not defamatory
  • The complainant is not identifiable
  • There is no publication
  • The accused is not shown to be the author
  • The statement is privileged
  • The facts do not support malice
  • The complaint is procedurally defective
  • Prescription has set in
  • Evidence is insufficient

XCIII. Court’s Role

The court ultimately determines guilt or liability based on evidence and law.

In criminal cases, guilt must be proven beyond reasonable doubt. In civil cases, the standard is generally preponderance of evidence.


XCIV. Cyber Libel and Chilling Effect

Cyber libel is controversial because criminalizing online speech may discourage people from speaking about public issues, corruption, abuse, or consumer harm.

Critics argue that cyber libel can be weaponized by powerful people to silence criticism. Supporters argue that online reputational harm spreads rapidly and victims need protection.

Philippine law currently recognizes cyber libel, but courts must apply it consistently with constitutional free speech protections.


XCV. Key Supreme Court Principles

Several broad principles are important in Philippine defamation law:

  1. Reputation is protected by law.
  2. Freedom of expression is constitutionally protected.
  3. Public officials and public figures are subject to wider criticism.
  4. Fair comment on matters of public interest is protected.
  5. Truth and good motives may matter.
  6. Malice is central.
  7. Privileged communication may defeat liability.
  8. Identification and publication are essential.
  9. Context matters.
  10. Online publication may trigger cyber libel liability.

The Supreme Court has upheld the constitutionality of cyber libel, while also limiting overbroad interpretations that would punish passive online behavior too easily.


XCVI. Common Misconceptions

Misconception 1: “It is not libel if I do not name the person.”

False. The person may still be identifiable.

Misconception 2: “It is safe because it is true.”

Not always. Truth helps, but good motives, justifiable purpose, privacy, and proof still matter.

Misconception 3: “It is only my opinion.”

Not if it implies a false factual accusation.

Misconception 4: “Deleting the post removes liability.”

False. Publication may already have occurred.

Misconception 5: “Only public posts count.”

False. Group chats or private messages to third persons may count as publication.

Misconception 6: “I only shared it.”

Sharing can be republication, especially with endorsement.

Misconception 7: “Anonymous accounts are safe.”

False. Identity may be traced or proven circumstantially.

Misconception 8: “Celebrities and politicians cannot sue.”

False. They can sue, though they face higher free-speech barriers in public concern cases.


XCVII. Drafting Safer Social Media Statements

Instead of:

“This person is a scammer.”

Use:

“I paid this person on March 5 for an item. As of March 20, I have not received the item or a refund. I have attached proof of payment and our conversation. I am seeking assistance to resolve this.”

Instead of:

“The mayor stole funds.”

Use:

“The public documents raise questions about how these funds were used. The mayor should explain the transaction.”

Instead of:

“This doctor killed my father.”

Use:

“We have concerns about the treatment provided and are seeking a review through the proper medical and legal channels.”

Instead of:

“My coworker is a sexual predator.”

Use:

“I have filed a formal complaint with HR regarding misconduct. I will let the proper process proceed.”


XCVIII. Importance of Context

Courts examine the entire context, not isolated words alone.

Relevant context includes:

  • Prior disputes
  • Audience understanding
  • Platform used
  • Exact wording
  • Tone
  • Timing
  • Attached images
  • Comments
  • Hashtags
  • Whether the post was public or private
  • Whether the statement was part of a public debate
  • Whether the accused had basis for the statement
  • Whether the accused acted in good faith

XCIX. Conclusion

Cyber libel in the Philippines is traditional libel adapted to the digital age. A defamatory Facebook post, TikTok video, tweet, blog entry, online comment, or group chat message can lead to serious criminal and civil consequences if it publicly and maliciously harms an identifiable person’s reputation.

At the same time, not every harsh statement is cyber libel. Philippine law protects fair comment, truth, privileged communication, public-interest criticism, and constitutionally protected expression. The line is often drawn between fact and opinion, criticism and accusation, good faith and malice, public interest and personal attack, and truthful reporting and reckless defamation.

The safest approach online is to be factual, restrained, evidence-based, and careful with accusations. Social media may feel informal, but under Philippine law, a post can become a publication, a screenshot can become evidence, and a comment can become a criminal complaint.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.