I. Introduction
In the Philippines, a person may still face liability for cyber libel even if the original post has already been deleted. Deletion does not automatically erase publication, prevent investigation, or extinguish criminal or civil liability. This is especially true when the post was widely shared, screenshotted, reposted, archived, quoted, or circulated through social media, messaging apps, blogs, websites, or other online platforms.
Cyber libel cases involving deleted posts raise difficult questions: Was there publication? Can screenshots prove the post existed? Does every share create a new offense? Who may be liable—the original poster, the person who shared it, or both? Does deletion show good faith, remorse, or consciousness of guilt? When does prescription begin? Can a person still sue if the defamatory statement is no longer online?
This article discusses cyber libel for deleted posts shared widely under Philippine law, including the elements of the offense, evidentiary issues, liability of sharers, defenses, remedies, and practical steps for complainants and respondents.
II. Legal Framework
A. Libel under the Revised Penal Code
Traditional libel is punished under Article 353 of the Revised Penal Code. Libel is generally defined as a public and malicious imputation of a crime, vice, defect, act, omission, condition, status, or circumstance tending to dishonor, discredit, or contempt a person, or blacken the memory of one who is dead.
Article 355 punishes libel committed by writing, printing, lithography, engraving, radio, phonograph, painting, theatrical exhibition, cinematographic exhibition, or any similar means.
The essential idea is that a defamatory statement is communicated to another person in a way that damages the reputation of the person defamed.
B. Cyber Libel under the Cybercrime Prevention Act
Republic Act No. 10175, or the Cybercrime Prevention Act of 2012, recognizes libel committed through a computer system or similar means. Cyber libel is essentially libel committed through information and communications technology.
Online posts may fall within cyber libel when defamatory statements are made through:
- Facebook posts;
- X/Twitter posts;
- TikTok captions or videos;
- Instagram posts or stories;
- YouTube videos or descriptions;
- Blogs;
- Online forums;
- Websites;
- Emails;
- Group chats;
- Messaging platforms;
- Online comment sections;
- Digital documents or files circulated online.
The law increases the seriousness of libel when committed through digital means because online content can spread rapidly, remain accessible, and cause reputational harm beyond a limited physical audience.
III. Elements of Cyber Libel
For cyber libel to prosper, the usual elements of libel must generally be present, with the added fact that the statement was made through a computer system or similar electronic means.
The key elements are:
- Defamatory imputation;
- Publication;
- Identification of the person defamed;
- Malice;
- Use of a computer system or electronic means.
Each element is important.
IV. Defamatory Imputation
A statement may be defamatory if it tends to dishonor, discredit, or put a person in contempt. It may involve an accusation of:
- Criminal conduct;
- Dishonesty;
- Immorality;
- Professional incompetence;
- Corruption;
- Fraud;
- Sexual misconduct;
- Disease or disgraceful condition;
- Unfitness for office, trade, profession, or business;
- Other conduct that injures reputation.
Examples may include statements such as:
- “He stole company funds.”
- “She is a scammer.”
- “This lawyer falsifies documents.”
- “This doctor kills patients.”
- “This business is a fraud.”
- “That teacher abuses students.”
- “He is a corrupt official.”
Whether a statement is defamatory depends on the words used, their context, the audience, and the natural meaning understood by ordinary readers.
A statement need not use technical legal words to be defamatory. Insinuations, edited images, memes, captions, hashtags, and sarcastic comments may be considered, depending on the totality of the publication.
V. Publication: Why Deleted Posts May Still Matter
Publication means communication of the defamatory statement to a third person. In cyber libel, publication occurs when the defamatory content is posted, sent, uploaded, shared, or otherwise made accessible to someone other than the complainant.
A deleted post may still satisfy publication if it was seen by others before deletion. The law does not require the post to remain online permanently. It is enough that it was communicated to at least one third person.
Therefore, deletion after posting does not necessarily defeat a cyber libel complaint.
A. Examples of Publication Despite Deletion
Publication may be proven if:
- Other users saw the post before it was deleted;
- The post received comments, likes, reactions, or shares;
- Someone took screenshots;
- The content was reposted by others;
- The statement was quoted in another post;
- The post appeared in group chats;
- The content was captured by screen recording;
- Platform logs or notifications show the post existed;
- Witnesses can testify that they saw the post;
- The respondent admitted posting it;
- The complainant received messages from people who saw it.
The more widely the post was shared, the easier it may be to prove publication, even if the original post is gone.
B. Deleted Does Not Mean Nonexistent
A common misconception is that deletion destroys liability. In reality, deletion only removes the post from ordinary public view, depending on the platform. It does not erase the fact of publication if publication already occurred.
Deletion may affect evidence, damages, intent, or mitigation, but it does not automatically erase the offense.
VI. Wide Sharing and Its Legal Significance
When a deleted post was shared widely, the complainant may argue that the reputational harm was greater. Wide sharing may be relevant to:
- Proof that publication occurred;
- Extent of reputational damage;
- Number of people who saw the defamatory content;
- Possible malice or intent to harm;
- Public impact;
- Damages in a civil action;
- Gravity of the offense;
- Practical need for takedown or correction.
However, wide sharing also creates legal complexity. The original poster may not control every later share, repost, screenshot, or discussion. Liability may depend on what each person did and whether each act itself was defamatory, malicious, and unlawful.
VII. Liability of the Original Poster
The original poster is the person who created or first published the allegedly defamatory content.
If the original post contained defamatory imputations, identified the complainant, was published online, and was made with malice, the original poster may be liable for cyber libel even if the post was later deleted.
A. Does Deletion Help the Original Poster?
Deletion may help in some ways, but it is not a complete defense.
Deletion may be argued as:
- Evidence of remorse;
- An attempt to reduce harm;
- A mitigating circumstance in practical settlement discussions;
- Support for good faith if the deletion was immediate after realizing error;
- Evidence that the respondent did not intend prolonged harm.
But deletion may also be argued against the respondent as:
- Consciousness that the post was wrongful;
- Attempt to destroy evidence;
- Proof that the post existed;
- Indication that the respondent knew the post was damaging.
The effect of deletion depends on the surrounding facts.
B. Prompt Correction or Apology
A prompt correction, clarification, apology, or retraction may reduce conflict and damages, but it does not automatically extinguish criminal liability once the offense has been committed. It may, however, influence settlement, prosecutorial evaluation, or the complainant’s willingness to proceed.
VIII. Liability of Persons Who Shared the Deleted Post
One of the most important issues is whether people who shared, reposted, quoted, or circulated the deleted post may also be liable.
The answer depends on what they did.
A. Mere Receipt or Viewing
A person who merely viewed or received the post is generally not liable for cyber libel. Liability usually requires an act of publication or republication, not mere passive receipt.
B. Sharing Without Comment
Sharing a defamatory post without comment may still amount to republication if the act communicates the defamatory content to a new audience.
However, liability may depend on:
- Whether the sharer knew or should have known the content was defamatory;
- Whether the sharer intended to endorse or spread the accusation;
- Whether the content was shared to inform, report, criticize, warn, or harass;
- Whether malice can be inferred;
- Whether the complainant was identified;
- Whether the share reached third persons.
Sharing is not automatically safe merely because the sharer did not write the original words.
C. Sharing With Agreement or Added Insult
Liability risk increases when the sharer adds comments such as:
- “This is true.”
- “Everyone should know this criminal.”
- “Don’t trust this scammer.”
- “Finally exposed.”
- “Share until this person is punished.”
Such added statements may constitute a separate defamatory publication or show adoption of the defamatory imputation.
D. Sharing for News, Warning, or Public Interest
A person may argue that sharing was done in good faith for legitimate public interest, warning, complaint, or fair comment. This may be relevant as a defense, especially where the issue involves public officials, public figures, consumer protection, or matters of public concern.
Still, a person should be careful. Republishing accusations without verification can create liability.
E. Screenshots in Group Chats
Forwarding screenshots of a defamatory deleted post to a group chat may also be publication. Even if the original post is gone, the screenshot may continue the defamatory circulation.
A screenshot sent to a private group may still be published if at least one third person sees it.
F. Influencers, Pages, and Administrators
Pages, influencers, group administrators, and content creators may face greater risk when they amplify defamatory material to a large audience. Their reach may increase harm and support claims for damages.
Group administrators are not automatically liable for every post made by members, but they may incur risk if they actively approve, pin, endorse, repost, encourage, or refuse to remove defamatory content despite knowledge and control, depending on the facts.
IX. Identification of the Person Defamed
A complainant must be identifiable. The post need not state the person’s full legal name if readers can reasonably determine who is being referred to.
Identification may arise from:
- Name;
- Photo;
- Username;
- Nickname;
- Workplace;
- Address;
- Business name;
- Tagging;
- Family relationship;
- Position or title;
- Context known to the audience;
- Comments identifying the person;
- Attached screenshots or documents;
- Use of initials where the person is still recognizable.
Even a “blind item” may be actionable if the intended audience can identify the person.
For deleted posts, identification may be proven by screenshots, witness testimony, comments, tags, and surrounding circumstances.
X. Malice in Cyber Libel
Malice is a central element of libel. Under Philippine libel law, malice may be presumed from defamatory imputation, but this presumption may be overcome.
There are two common forms:
A. Malice in Law
Malice in law may be presumed when a defamatory statement is published. The complainant may not always need to prove personal ill will at the outset.
B. Malice in Fact
Malice in fact refers to actual ill will, spite, bad motive, or reckless disregard of truth. It may be shown by:
- Personal grudge;
- Repeated attacks;
- Refusal to verify;
- Fabrication;
- Use of fake accounts;
- Selective editing;
- Ignoring contrary evidence;
- Posting after being warned of falsity;
- Coordinated harassment;
- Threats;
- Statements showing intent to destroy reputation.
In cases involving public officials, public figures, or matters of public concern, actual malice may become especially important.
XI. Truth as a Defense
Truth may be a defense, but it is not always enough by itself. In Philippine libel law, truth is strongest when combined with good motives and justifiable ends.
A respondent should be prepared to prove the truth of the imputation, not merely say that they believed it. Serious accusations require serious proof.
For example, calling someone a “thief,” “rapist,” “scammer,” or “corrupt official” requires evidence. Rumors, anonymous messages, edited screenshots, or assumptions may not be enough.
Even if facts are partly true, exaggeration or false conclusions may still be defamatory.
XII. Fair Comment and Opinion
Not every negative online statement is cyber libel. Fair comment, criticism, satire, and opinion may be protected in appropriate cases.
Statements such as:
- “I had a bad experience with this seller.”
- “In my opinion, the service was poor.”
- “I do not recommend this business.”
- “The public should ask questions about this policy.”
may be less risky than direct accusations of crime or dishonesty, provided they are based on disclosed facts and made in good faith.
However, labeling something as “opinion” does not automatically protect it. If the statement implies undisclosed defamatory facts, it may still be actionable.
Example:
- “In my opinion, she stole the funds.”
This still imputes a crime and may be defamatory.
XIII. Privileged Communication
Some communications may be privileged.
A. Absolutely Privileged Communication
Certain statements made in official proceedings may be absolutely privileged, such as statements in pleadings or judicial proceedings, if relevant. These are generally protected even if damaging, subject to rules on relevance and abuse.
B. Qualifiedly Privileged Communication
Some communications may be qualifiedly privileged, such as fair and true reports of official proceedings, complaints made to proper authorities, or statements made in the performance of a legal, moral, or social duty.
However, qualified privilege can be defeated by proof of actual malice.
A person who has a complaint against someone should generally file it with the proper authority rather than publicly accusing the person online.
XIV. Deleted Posts and Evidence
Evidence is often the most contested part of a cyber libel case involving deleted posts.
A. Screenshots
Screenshots are commonly used, but their reliability may be challenged. A screenshot is stronger if it shows:
- Full post;
- Date and time;
- Username or profile name;
- URL or platform indicator;
- Comments, reactions, or shares;
- Profile photo;
- Context;
- Device time;
- Uncropped view;
- Sequence of related posts.
Screenshots should be preserved in original form. Edited, cropped, or annotated images should be separate from original screenshots.
B. Screen Recordings
Screen recordings can be stronger than screenshots because they show navigation, profile links, comments, and context. They may still be challenged, but they help establish authenticity.
C. Witness Testimony
People who saw the post before deletion may execute affidavits stating:
- When they saw it;
- Where they saw it;
- What it said;
- How they knew it referred to the complainant;
- Whether they shared or discussed it;
- What reactions it caused.
Witnesses are especially useful when the original post is gone.
D. Platform Records
In some cases, law enforcement or the court may require platform records, logs, account information, or preservation of data. This can be difficult because many platforms are foreign-based and have their own procedures.
E. Admissions
The respondent’s admission may be powerful evidence. Admissions may appear in:
- Apology messages;
- Comments;
- Private chats;
- Demand letter responses;
- Public explanations;
- “I deleted it already” statements;
- Settlement communications, depending on admissibility issues.
F. Digital Forensics
For serious cases, digital forensic examination may help verify files, metadata, device records, or account access. This may be relevant when a respondent claims hacking, fabrication, or impersonation.
XV. Preservation of Evidence
Because deleted posts can disappear quickly, the complainant should act immediately.
Practical evidence-preservation steps include:
- Take full screenshots.
- Record the screen showing the post, profile, URL, comments, reactions, and shares.
- Save the link or URL.
- Ask witnesses to preserve what they saw.
- Save notifications and emails related to the post.
- Save reposts and shares.
- Keep copies of messages from people who saw the post.
- Avoid editing original evidence.
- Back up files securely.
- Consider reporting to law enforcement for proper preservation requests.
Evidence should be organized chronologically.
XVI. Does Every Share Restart Liability or Prescription?
This is a complex legal issue. In online defamation, repeated sharing or reposting may be argued as separate publications, particularly when a new person actively republishes the content to a new audience.
For the original poster, the key act is usually the original publication. However, if the original poster reposts, reuploads, edits, pins, comments on, or re-circulates the defamatory content, those acts may be treated as additional publication.
If third parties independently share screenshots after deletion, their own acts may be analyzed separately. The original poster may argue that they should not be liable for independent republications they did not authorize or encourage. The complainant may argue otherwise if the original poster intended virality, invited sharing, or coordinated circulation.
Prescription and continuing publication issues can be technical and fact-specific. Legal advice is important where filing deadlines are at issue.
XVII. Prescription of Cyber Libel
Prescription refers to the period within which a criminal action must be filed. Cyber libel prescription has been the subject of legal debate and court interpretation because cybercrime laws interact with older penal rules.
Because prescription can determine whether a case may still be filed, a complainant should not delay. The safest practical approach is to file as soon as possible after discovery of the post and preservation of evidence.
For respondents, prescription may be a defense if the complaint was filed too late, but the exact computation may depend on the date of publication, date of discovery, nature of the act, and applicable legal doctrine.
XVIII. Jurisdiction and Venue
Cyber libel cases may raise venue questions because the poster, complainant, viewers, platform, and servers may be in different places.
Venue may potentially be connected to:
- Place where the complainant accessed or viewed the post;
- Place where the defamatory post was uploaded;
- Place where the complainant resides or suffered damage;
- Place where the server or system is accessed;
- Rules applicable to cybercrime cases.
Improper venue can delay or weaken a complaint. The complainant should prepare facts showing where the post was accessed, where the complainant is located, where reputational harm occurred, and where the respondent may be found.
XIX. Criminal Complaint Process
A cyber libel complaint may be filed through law enforcement or directly before the prosecutor, depending on circumstances.
A. Filing with Cybercrime Authorities
A complainant may report to cybercrime units for investigation, preservation, and case buildup. The complaint should include screenshots, links, witness statements, and identity information of the respondent.
B. Complaint-Affidavit
A complaint-affidavit should narrate:
- The complainant’s identity;
- The respondent’s identity or account details;
- The defamatory statement;
- When and where it was posted;
- How it identified the complainant;
- Who saw it;
- How it was shared widely;
- How and when it was deleted;
- The damage caused;
- Evidence attached;
- Prayer for prosecution.
C. Preliminary Investigation
The prosecutor evaluates whether probable cause exists. The respondent may file a counter-affidavit. The complainant may submit a reply.
The prosecutor may dismiss the complaint or file an Information in court.
XX. Civil Liability and Damages
Cyber libel may also give rise to civil liability. A complainant may seek damages for:
- Injury to reputation;
- Mental anguish;
- Social humiliation;
- Lost business;
- Lost employment opportunity;
- Professional harm;
- Attorney’s fees;
- Litigation expenses;
- Moral damages;
- Exemplary damages, in proper cases.
Wide sharing may support a claim of greater reputational harm, especially if the post reached employers, clients, customers, family members, community groups, or professional networks.
XXI. Takedown, Retraction, and Injunctive Relief
Even after deletion of the original post, copies may remain online. The complainant may request:
- Takedown of reposts;
- Removal of screenshots;
- Platform reports;
- Corrections;
- Public apology;
- Retraction;
- Agreement not to repost;
- Preservation of evidence before takedown;
- Court relief in appropriate cases.
A complainant should preserve evidence before asking for removal, because once content disappears, proof may become harder.
XXII. Demand Letters
A demand letter may be sent before filing a case. It may demand:
- Deletion of the post;
- Takedown of shares;
- Retraction;
- Public apology;
- Cessation of further publication;
- Damages;
- Preservation of evidence;
- Identification of persons involved in coordinated sharing.
A demand letter may help settle the dispute or establish that the respondent was informed of the defamatory nature of the post.
However, if evidence may be destroyed, it may be better to preserve evidence first before sending a demand letter.
XXIII. Defenses of the Respondent
A respondent accused of cyber libel over a deleted post may raise several defenses.
1. Denial of Authorship
The respondent may deny making the post. They may claim:
- The account was hacked;
- Someone else used the device;
- The screenshot is fabricated;
- The account is fake;
- The post was edited;
- The alleged statement was never made.
This defense requires factual support. The respondent should preserve login records, hacking reports, device records, and platform notices.
2. No Defamatory Meaning
The respondent may argue that the statement was not defamatory, was harmless, was rhetorical, or was not understood as an accusation.
3. No Identification
The respondent may argue that the complainant was not named or reasonably identifiable.
4. No Publication
The respondent may argue that no third person saw the post before deletion. This may be difficult if there are screenshots, comments, reactions, or witnesses.
5. Truth
The respondent may prove the truth of the statement, ideally with documents, official records, or reliable evidence.
6. Good Motives and Justifiable Ends
The respondent may argue that the statement was made in good faith to protect public interest, warn others, report wrongdoing, or assert a legitimate concern.
7. Fair Comment
The respondent may argue that the post was opinion or fair criticism based on facts.
8. Privileged Communication
The respondent may argue that the statement was made in a privileged context, such as a complaint to proper authorities.
9. Lack of Malice
The respondent may argue absence of malice, especially if they acted reasonably, verified facts, corrected errors, deleted promptly, and did not intend to harm.
10. Prescription
The respondent may argue that the complaint was filed beyond the legal period.
XXIV. Public Officials, Public Figures, and Matters of Public Concern
Cyber libel involving public officials or public figures requires careful analysis. Public officials are subject to criticism, especially regarding official conduct. Citizens may comment on governance, corruption allegations, policy decisions, and public accountability.
However, criticism is not unlimited. False accusations of crime or dishonesty, especially made maliciously and without basis, may still be actionable.
Statements about public matters are more defensible when they are:
- Based on verifiable facts;
- Fair comment rather than false factual accusation;
- Made in good faith;
- Connected to official conduct or public interest;
- Not driven by personal spite;
- Not knowingly false or recklessly made.
XXV. Private Individuals
Private individuals generally have stronger protection from reputational attacks. A defamatory accusation against a private person, especially involving crime, immorality, or dishonesty, may be actionable even if posted in a personal dispute.
Examples include disputes involving:
- Neighbors;
- Former partners;
- Employees;
- Employers;
- Students;
- Teachers;
- Small businesses;
- Online sellers;
- Family members;
- Community members.
Private disputes should not be converted into public online accusations without proof.
XXVI. Group Chats and Private Online Spaces
Cyber libel does not necessarily require a fully public post. Publication may occur in group chats, closed groups, private forums, or limited online circles if the statement is communicated to third persons.
Examples:
- Posting in a homeowners’ group;
- Sending accusations in a workplace chat;
- Sharing screenshots in a family group;
- Posting in a private Facebook group;
- Uploading defamatory content to a members-only forum.
A “private” group is not necessarily legally private if multiple people receive the defamatory statement.
XXVII. Deleted Stories, Reels, and Temporary Posts
Temporary content such as stories, reels, disappearing messages, or timed posts may still support cyber libel if seen by others.
The fact that content disappears automatically does not prevent publication. Evidence may include:
- Screenshots;
- Screen recordings;
- Viewer lists;
- Replies;
- Shares;
- Notifications;
- Witness statements;
- Admissions.
Temporary content may be difficult to prove, so prompt preservation is important.
XXVIII. Memes, Edited Photos, and Hashtags
Cyber libel is not limited to plain text. Defamatory meaning may arise from:
- Memes;
- Edited photos;
- Captions;
- Hashtags;
- Stickers;
- Voiceovers;
- Video edits;
- Side-by-side comparisons;
- Fake posters;
- Mock news cards;
- AI-generated images;
- Deepfakes.
A meme may be defended as satire, but satire is not automatically immune if it falsely imputes serious misconduct to an identifiable person.
Hashtags may also contribute to defamatory meaning, such as hashtags accusing someone of fraud, theft, abuse, or corruption.
XXIX. AI-Generated or Fake Content
If a person uses AI-generated images, fake screenshots, synthetic audio, or manipulated videos to accuse someone of misconduct, cyber libel risk may be high. Other laws may also apply depending on the facts, such as identity theft, data privacy violations, unjust vexation, threats, harassment, or offenses involving obscene or intimate images.
A respondent cannot avoid liability merely by saying “it was AI” if the content was published as if true or intended to damage reputation.
XXX. Employers, Schools, and Professional Harm
Deleted posts shared widely may cause serious harm in professional settings. A defamatory post may reach:
- Employers;
- Clients;
- Patients;
- Students;
- Customers;
- Licensing bodies;
- Business partners;
- Professional associations.
Evidence of actual harm may include:
- Lost job offer;
- Suspension;
- Client cancellation;
- Reduced sales;
- Disciplinary inquiry;
- Messages from concerned contacts;
- Public comments attacking the complainant;
- News coverage;
- Viral reposts.
Such evidence may support damages.
XXXI. Settlement Considerations
Cyber libel disputes are often settled, especially when the parties know each other or when the respondent is willing to correct the harm.
Possible settlement terms include:
- Permanent deletion;
- Public apology;
- Clarificatory post;
- Retraction;
- Undertaking not to repost;
- Cooperation in takedown of shares;
- Payment of damages;
- Confidentiality clause;
- Non-disparagement agreement;
- Withdrawal of complaint, where legally proper;
- Preservation or surrender of relevant evidence, if appropriate.
Settlement should be carefully drafted. Criminal liability is not always automatically erased by private settlement, depending on the stage and nature of the case.
XXXII. Practical Guide for Complainants
A complainant should:
- Preserve evidence before it disappears.
- Take screenshots and screen recordings.
- Save URLs, usernames, dates, and timestamps.
- Identify witnesses who saw the post.
- Document shares, reposts, and comments.
- Record harm suffered.
- Avoid retaliatory posts.
- Send a demand letter only after preserving evidence.
- Report to the platform for takedown.
- Consult counsel or file with cybercrime authorities/prosecutor.
The complaint should focus on facts, not emotional conclusions.
XXXIII. Practical Guide for Respondents
A respondent accused of cyber libel should:
- Do not destroy evidence.
- Preserve account records and context.
- Avoid further posting about the complainant.
- Do not threaten the complainant or witnesses.
- Review whether the post was factual, opinion, privileged, or true.
- Gather proof supporting statements made.
- Consider prompt correction if the statement was inaccurate.
- Avoid admitting legal liability without advice.
- Prepare a counter-affidavit if a complaint is filed.
- Seek legal counsel, especially if a subpoena or prosecutor notice is received.
Deleting a post may reduce ongoing harm, but the respondent should not assume deletion ends the matter.
XXXIV. Sample Complaint-Affidavit Outline
A cyber libel complaint involving a deleted post may follow this structure:
Republic of the Philippines City/Municipality of ________
AFFIDAVIT-COMPLAINT
I, [Name], of legal age, Filipino, and residing at [address], after being duly sworn, state:
I am the complainant in this case.
Respondent [name/account name] is the owner/user of the online account [account details/link].
On or about [date and time], respondent posted on [platform] the following statement: [quote or describe defamatory statement].
The statement accused me of [crime/vice/defect/dishonorable act], which is false and damaging to my reputation.
I was identified in the post by [name/photo/tag/context].
The post was seen, shared, commented on, and circulated by several persons, including [names/witnesses if available].
Although respondent later deleted the post, copies had already been saved and widely shared. Attached are screenshots, screen recordings, links, and witness statements.
Because of the post, I suffered [humiliation, business loss, employment harm, social damage, etc.].
I am executing this affidavit to request investigation and prosecution for cyber libel and other offenses that may be found applicable.
[Signature] Affiant
Subscribed and sworn to before me this ___ day of _______ 20__ in _______.
This is a general outline and must be tailored to the facts of the case.
XXXV. Sample Retraction Demand
A demand letter may state:
Subject: Demand to Cease Publication, Retract Defamatory Statement, and Preserve Evidence
Dear [Name]:
It has come to my attention that on [date], using the account [account name/link], you published statements accusing me of [describe accusation]. The statements are false, defamatory, and have been shared widely.
Although the original post appears to have been deleted, screenshots and reposts continue to circulate. Your publication has caused damage to my reputation, personal relations, and livelihood.
I demand that you:
- Permanently cease from publishing or republishing the defamatory statements;
- Issue a written/public retraction and apology;
- Assist in removing reposts or shares caused by your publication;
- Preserve all records relating to the post, including drafts, screenshots, messages, and account logs;
- Contact me within [number] days to resolve this matter.
This letter is sent without prejudice to all available civil, criminal, and administrative remedies.
[Name]
This is only a sample and should be adjusted by counsel where necessary.
XXXVI. Common Misconceptions
1. “I deleted it, so there is no case.”
Wrong. If others saw it, publication may already have occurred.
2. “It was only a share.”
Sharing can be republication, especially if it spreads defamatory content to a new audience.
3. “I did not name the person.”
A person may still be identifiable through context, photos, initials, tags, comments, or circumstances.
4. “It was just my opinion.”
Opinion is not a shield if it implies a false defamatory fact.
5. “It was in a private group.”
A private group can still involve publication to third persons.
6. “Screenshots are useless.”
Screenshots may be admissible if authenticated and supported by testimony or other evidence.
7. “Truth always protects me.”
Truth is important, but the respondent may still need to show good motives and justifiable ends.
8. “Only the original poster can be liable.”
Sharers, reposters, and commenters may face liability if their own acts satisfy the elements of cyber libel.
XXXVII. Risk Reduction for Online Speech
To reduce cyber libel risk:
- State facts accurately.
- Avoid accusing someone of a crime unless supported by official records.
- Use neutral language.
- Avoid insults and name-calling.
- Distinguish personal experience from conclusions.
- File complaints with proper authorities instead of trial by social media.
- Do not repost unverified accusations.
- Blur private information when appropriate.
- Keep evidence if making a legitimate complaint.
- Correct mistakes promptly.
A safer consumer complaint might say:
“I paid on this date, but I have not received the item despite follow-ups. I am requesting a refund.”
A riskier statement would be:
“This person is a criminal scammer and thief.”
The first describes verifiable experience. The second imputes criminal conduct.
XXXVIII. Conclusion
A deleted post can still be the basis of a cyber libel complaint in the Philippines if it was published online, identified the complainant, contained a defamatory imputation, and was made with malice. Wide sharing strengthens proof of publication and may increase reputational damage, but it also raises questions about the separate liability of those who shared, reposted, quoted, or circulated the content.
Deletion may reduce ongoing harm and may support remorse or mitigation, but it does not automatically erase liability. Screenshots, screen recordings, witness statements, platform records, and admissions may prove that the post existed and was seen by others.
For complainants, the priority is immediate evidence preservation and careful documentation. For respondents, the priority is to stop further publication, preserve context, avoid retaliation, and evaluate possible defenses such as truth, fair comment, privilege, lack of identification, lack of malice, or prescription.
Online speech can be powerful and permanent even when deleted. In Philippine law, reputational harm caused through digital publication may have serious criminal and civil consequences.