Cyber Libel for Old Facebook Posts in the Philippines

A Philippine Legal Article

I. Introduction

Cyber libel has become one of the most important legal risks arising from social media use in the Philippines. A Facebook post written years ago may suddenly become the subject of a complaint when it is rediscovered, reshared, screenshotted, commented on, or used in a later dispute.

The central question is whether an old Facebook post can still give rise to a cyber libel case.

The answer is: yes, possibly, but it depends on several issues, including:

  1. whether the post is actually libelous;
  2. whether it identifies or is understood to refer to the complainant;
  3. whether it was published online;
  4. whether malice is present;
  5. whether the post was made after the Cybercrime Prevention Act took effect;
  6. whether the criminal action has prescribed;
  7. whether the post is treated as a continuing publication or only as a single publication;
  8. whether later reposts, shares, edits, comments, or renewed circulation create a new publication;
  9. whether the accused is the author, sharer, commenter, page administrator, or merely tagged;
  10. whether defenses such as truth, fair comment, privileged communication, lack of identification, or lack of malice apply.

An old post is not automatically safe merely because time has passed. But age matters because criminal offenses are subject to prescription, and because evidence, context, intent, and publication may become harder to prove over time.


II. What Is Cyber Libel?

Cyber libel is libel committed through a computer system or similar means. It is essentially traditional libel under the Revised Penal Code, committed through online or digital publication.

In the Philippine setting, cyber libel generally involves a defamatory imputation made online, such as through:

  • Facebook posts;
  • Facebook comments;
  • Facebook shares with captions;
  • Messenger group posts in some situations;
  • public pages;
  • blogs;
  • online articles;
  • tweets or X posts;
  • TikTok captions;
  • YouTube descriptions or comments;
  • Instagram posts;
  • online forums;
  • websites;
  • emails or group chats, depending on publication;
  • other digital platforms.

A Facebook post may therefore be a medium for cyber libel if the legal elements are present.


III. Elements of Libel

For libel to exist, the usual elements are:

  1. Defamatory imputation;
  2. Publication;
  3. Identification of the person defamed;
  4. Malice.

Cyber libel adds the digital or online medium.

Each element must be examined. A complainant cannot simply say, “I was offended by an old Facebook post.” The post must satisfy the legal requirements.


IV. Defamatory Imputation

A statement is defamatory if it tends to dishonor, discredit, or put a person in contempt, ridicule, or public hatred.

Defamatory imputations may include accusations that a person is:

  • a thief;
  • scammer;
  • adulterer;
  • corrupt official;
  • criminal;
  • prostitute;
  • drug user;
  • abusive spouse;
  • fake professional;
  • dishonest businessperson;
  • negligent doctor;
  • immoral teacher;
  • fraudulent seller;
  • abusive employer;
  • sexual predator;
  • tax evader;
  • swindler;
  • violent person.

The statement may be defamatory even if phrased indirectly, through sarcasm, insinuation, blind items, memes, screenshots, emojis, hashtags, or coded references, if readers reasonably understand the meaning.


V. Opinion vs. Defamatory Fact

Not every negative Facebook post is libelous. The law distinguishes between statements of fact and protected opinion or fair comment.

A. Statement of fact

A factual accusation may be libelous if false and defamatory.

Examples:

  • “Juan stole company funds.”
  • “Maria forged documents.”
  • “This seller is a scammer.”
  • “He molested a student.”
  • “She accepted bribes.”

B. Opinion

Pure opinion is generally less likely to be libelous.

Examples:

  • “I think his service was terrible.”
  • “In my opinion, the product is overpriced.”
  • “I felt disrespected by the staff.”
  • “I would not recommend this business.”

However, calling something an opinion does not automatically protect it. If the post implies undisclosed defamatory facts, it may still be actionable.

Example:

  • “In my opinion, she is a thief because everyone knows what she did with the funds.”

This may imply a factual accusation.


VI. Publication on Facebook

Publication means that the defamatory statement was communicated to a third person.

A Facebook post is usually publication if it is visible to anyone other than the person defamed and the author.

Publication may occur through:

  • public post;
  • friends-only post;
  • private group post;
  • page post;
  • comment thread;
  • shared post;
  • story;
  • reel caption;
  • live video;
  • image text;
  • meme;
  • screenshot uploaded as a post.

Even a “friends only” post can be publication because third persons can read it.

A purely private message sent only to the person complained about may not satisfy publication, although it may raise other legal issues. But if the message is sent to a group chat or multiple recipients, publication may be argued.


VII. Identification of the Person Defamed

The complainant must be identifiable.

Identification may be direct or indirect.

A. Direct identification

The post names the person.

Example:

  • “Juan Dela Cruz is a scammer.”

B. Indirect identification

The post does not name the person, but the person can be identified from context.

Example:

  • “The owner of that café beside the barangay hall is a fraud.”
  • “My former boss at XYZ Corp who fired me last month is corrupt.”
  • “The teacher who handled Grade 10 section A last year is abusive.”
  • A photo, tag, screenshot, initials, nickname, location, or unique reference points to a specific person.

A post may be actionable even without a full name if readers know who is being referred to.

C. Blind items

Blind items can be libelous if the subject is identifiable.

If the post gives enough clues for readers to identify the person, the lack of a name may not save the author.


VIII. Group Defamation

A post attacking a large group may not always identify a specific individual. But if the group is small or the words clearly refer to identifiable members, a libel claim may be possible.

Example:

  • “All employees of Branch X stole money” may identify members of a small branch.
  • “The three officers of ABC Association are corrupt” may identify each officer.
  • “Everyone in that family is a thief” may identify family members.

The smaller and more identifiable the group, the stronger the identification element.


IX. Malice

Malice is an essential element.

There are two common concepts:

  1. Malice in law — presumed from defamatory publication, unless privileged;
  2. Malice in fact — actual ill will, spite, intent to harm, reckless disregard, or knowledge of falsity.

In ordinary libel, malice may be presumed from a defamatory imputation. But if the statement is privileged, the complainant may need to prove actual malice.

For public officers, public figures, or matters of public concern, malice issues become especially important.


X. Cyber Libel Under the Cybercrime Prevention Act

Cyber libel is libel committed through a computer system.

Facebook posts fall within this environment because Facebook is an online platform accessed through computers, phones, tablets, and internet systems.

The law treats online publication more seriously because digital content can spread widely, remain searchable, be screenshotted, and be shared repeatedly.

However, the same core libel elements still matter. The online nature of the post does not eliminate the need to prove defamatory imputation, publication, identification, and malice.


XI. Old Facebook Posts: Why Timing Matters

Old Facebook posts raise several timing questions:

  1. When was the post originally made?
  2. Was the post made before or after the cybercrime law took effect?
  3. Was the post later edited, reshared, reposted, or commented on?
  4. Was the post continuously accessible?
  5. When did the complainant discover it?
  6. When did the complainant file the complaint?
  7. Has the offense prescribed?
  8. Is there a fresh publication?

Timing may decide whether a complaint can still proceed.


XII. Posts Made Before the Cybercrime Law Took Effect

Cyber libel cannot generally be applied retroactively to punish an online post made before the cybercrime law became effective.

The Constitution prohibits ex post facto criminal laws. A person cannot be criminally punished under a law for an act that was not punishable under that law when committed.

Thus, if a Facebook post was made before cyber libel became legally punishable, cyber libel liability becomes problematic.

However, if the post was later republished, edited, shared, reposted, or newly circulated after the law took effect, the complainant may argue that a new punishable publication occurred. Whether that argument succeeds depends on facts.


XIII. Prescription of Cyber Libel

Prescription refers to the period within which a criminal case must be filed. If the prescriptive period has expired, prosecution may be barred.

For cyber libel, the prescriptive period has been treated as longer than ordinary libel because of the penalty classification under the cybercrime law. The exact computation can be legally contested depending on the applicable view, offense classification, and procedural history.

In practical terms, the accused should always examine prescription when the complained-of Facebook post is old.

Important questions include:

  • date of original posting;
  • date of discovery by complainant;
  • date of complaint filing;
  • whether any preliminary investigation interrupted prescription;
  • whether a new publication occurred;
  • whether the post was reposted or reshared;
  • whether the accused edited or revived the post.

Prescription is a technical but powerful defense.


XIV. When Does Prescription Begin?

A key issue is when the prescriptive period starts.

Possible reference points include:

  1. the date the post was first published;
  2. the date the complainant discovered the post;
  3. the date authorities discovered the offense;
  4. the date of republication or resharing, if any.

In criminal law, prescription often begins from discovery of the offense by the offended party, authorities, or their agents, depending on the offense and applicable rules. But online publication creates complicated issues because a post may remain accessible for years.

The defense may argue that prescription began upon original publication or early discovery. The complainant may argue later discovery or republication.

Evidence of when the complainant first knew of the post can matter.


XV. Single Publication Rule vs. Continuing Publication

One of the most important issues for old Facebook posts is whether every day that a post remains online counts as a new publication.

A strict “continuing publication” approach would mean old posts may never prescribe as long as they remain online. This would create indefinite criminal exposure.

A “single publication” approach treats the original upload as one publication, with prescription generally tied to that publication, unless there is a new act of republication.

Philippine cyber libel cases have raised this issue, and courts have been cautious about treating online availability as endless republication. The safer legal view for defense is that mere continued accessibility should not automatically create a new offense every day. But new acts, such as reposting, sharing, editing, boosting, or recirculating, may create fresh legal risk.


XVI. Mere Continued Availability of Old Post

If a person posted something years ago and did nothing else, the post may still be visible on Facebook. Is that enough for a new cyber libel case?

The complainant may argue that the defamatory content remains published because people can still read it.

The defense may argue that the actionable publication occurred when it was first posted and that mere passive online availability should not restart prescription indefinitely.

This issue is fact-sensitive. The risk increases if the accused recently interacted with the post, such as by editing, resharing, pinning, commenting to revive it, or changing privacy settings to expose it to a new audience.


XVII. Editing an Old Post

Editing an old post may be legally significant.

If the accused edits a Facebook post years later, especially to add or modify defamatory content, that may be treated as a new publication.

Examples:

  • adding the complainant’s name;
  • adding a new accusation;
  • changing a vague statement into a specific accusation;
  • adding photos or tags;
  • making a private post public;
  • adding hashtags to increase visibility;
  • correcting spelling only may be less significant, but context matters.

A substantial edit may restart legal risk.


XVIII. Resharing an Old Post

Resharing an old post can create a new publication.

If a person shares their old post again with a new caption, the new share may be independently actionable.

Examples:

  • “Posting this again so people remember that Juan is a scammer.”
  • “Three years later, still true: she stole from us.”
  • “For those asking, here is my old post about that corrupt officer.”

The reshared post and the new caption may both be examined.


XIX. Reposting Screenshots of Old Posts

If someone screenshots an old post and uploads it again, that can be a new publication.

Even if the original post is old, the new upload is recent.

Liability may attach to:

  • original author;
  • person who reposted;
  • page administrator who uploaded it;
  • person who added defamatory caption;
  • person who edited the screenshot;
  • person who used the screenshot to renew the accusation.

A person cannot avoid liability by saying, “It was only a screenshot of an old post,” if the new post republishes defamatory matter.


XX. Sharing Another Person’s Old Libelous Post

A person who shares another person’s libelous old post may face liability if the sharing communicates or endorses the defamatory imputation.

The risk depends on the share’s context.

A. High-risk share

  • Sharing with caption: “This is true. He is really a thief.”
  • Sharing to attack the complainant again.
  • Sharing to a new audience with defamatory commentary.

B. Lower-risk share

  • Sharing for neutral reporting, legal complaint, or evidence preservation may be less risky if done carefully and without endorsing the defamatory accusation.

A share can be publication. A person should not casually share defamatory content.


XXI. Commenting on an Old Post

Commenting on an old post may revive attention to it and may create a new defamatory statement.

If the comment itself is defamatory, it may be separately actionable.

Examples:

  • “Yes, she really stole the money.”
  • “He is still a scammer until now.”
  • “That criminal should be jailed.”

Even if the original post has prescribed, the new comment may be fresh.


XXII. Reacting to an Old Post

A mere reaction such as “like,” “haha,” “angry,” or “care” is less likely to be treated the same as authoring or sharing a defamatory statement. However, in extreme situations, reactions may be used as context.

A reaction alone usually does not clearly communicate a defamatory imputation. But a reaction combined with comments, shares, or coordinated harassment may be relevant evidence.


XXIII. Tagging a Person in an Old Post

Tagging someone may increase identification or publication.

If an old post was vague but later the accused tags the complainant, the tag may help identify the person and may create new publication.

Example:

Old post:

  • “This fake seller fooled many people.”

Later edit or comment tags:

  • “@MariaSantos explain this.”

The tag may strengthen the complainant’s case.


XXIV. Changing Privacy Settings

Changing a post from private or friends-only to public may create new publication issues because it exposes the content to a new audience.

If an old defamatory post was originally visible only to a small group but later made public, the complainant may argue renewed publication.

The legal risk depends on whether the accused intentionally changed visibility and whether the audience materially expanded.


XXV. Pinning or Featuring an Old Post

Pinning an old post to a profile or page, featuring it, or placing it in a highlight may be argued as republication or renewed publication.

The accused is not merely leaving it buried in an archive; the accused is actively presenting it again to viewers.


XXVI. Facebook Memories and Algorithmic Resurfacing

Facebook may resurface old posts through “memories,” notifications, or algorithmic recommendations.

If the user does nothing, passive algorithmic resurfacing may be harder to treat as the user’s new publication.

But if the user shares the memory, adds a caption, or reposts it, that is a new act.

Example:

  • Facebook shows a memory privately to the user: lower risk.
  • User clicks “Share” and writes “Still true”: high risk.

XXVII. Comments by Other Users on the Old Post

If other people comment on the old post, the original author’s liability may depend on involvement.

The original author may not automatically be liable for every comment by others. However, risk may arise if the author:

  • encourages defamatory comments;
  • joins the thread;
  • pins or highlights comments;
  • refuses to remove clearly defamatory comments despite control, in some contexts;
  • adds further defamatory statements;
  • manages a page or group where defamatory comments are knowingly amplified.

For page or group administrators, the issue can be more complicated.


XXVIII. Page Administrators and Group Administrators

Administrators of Facebook pages and groups may face risks if defamatory posts are made through accounts or pages they manage.

Questions include:

  • Who authored the post?
  • Who approved the post?
  • Who had admin access?
  • Was the page used as the publishing account?
  • Did the admin knowingly allow defamatory content?
  • Did the admin add captions or comments?
  • Was there moderation control?
  • Was the admin merely passive?
  • Was the content removed after notice?

Liability is not automatic merely because one is an admin, but control, participation, approval, and knowledge matter.


XXIX. Business Pages and Brand Accounts

If a defamatory post appears on a business page, liability may involve:

  • the person who posted;
  • page owner;
  • social media manager;
  • company officers, if involved;
  • business entity for civil liability;
  • advertising agency or contractor, if responsible.

Old business page posts can create problems during disputes between competitors, customers, former employees, or public officials.

Businesses should maintain social media records and access logs.


XXX. Fake Accounts and Identity Issues

A person accused of cyber libel may deny authorship.

The prosecution must prove that the accused made, caused, or participated in the post.

Relevant evidence may include:

  • account ownership;
  • admissions;
  • phone or computer used;
  • email linked to account;
  • IP logs, if available;
  • screenshots;
  • witnesses who saw the post live;
  • metadata;
  • messages admitting authorship;
  • page admin records;
  • writing style;
  • recovery email or number;
  • device seizure, if lawfully obtained.

Screenshots alone may not always conclusively prove authorship, especially if fake accounts or edited images are involved.


XXXI. Screenshots as Evidence

Screenshots are common in cyber libel cases. They may show the post, comments, date, account name, reactions, and URL.

However, screenshots may be challenged.

Issues include:

  • authenticity;
  • completeness;
  • alteration;
  • missing URL;
  • missing date;
  • missing privacy context;
  • cropped content;
  • fake account;
  • edited image;
  • lack of witness who captured it;
  • lack of proof that it was publicly visible;
  • no proof the accused controlled the account.

Better evidence includes screenshots with URL, date, time, account profile, comments, witnesses, and preservation through proper legal means.


XXXII. Deleting an Old Post

Deleting an old post may reduce future harm but does not automatically erase past liability.

If a libelous post was already published and captured, deletion may not prevent a complaint.

However, deletion may help show mitigation, remorse, or lack of continuing publication. It may also prevent further sharing or renewed harm.

A person should preserve evidence before deleting if litigation is likely. Destroying evidence after notice of a legal dispute may create problems.


XXXIII. Apology, Retraction, and Correction

An apology or correction may help resolve disputes, but it does not automatically extinguish criminal liability.

Possible effects:

  • may reduce damages;
  • may support settlement;
  • may show lack of malice;
  • may mitigate penalty or civil liability;
  • may stop further harm;
  • may persuade complainant not to proceed.

But if the complainant already filed a complaint, the public nature of criminal prosecution may continue depending on procedural stage and prosecutorial action.


XXXIV. Settlement and Desistance

Cyber libel cases may be settled in practice, but settlement has limits.

The complainant may execute an affidavit of desistance, but prosecutors and courts are not always bound by it. The offense is public in nature once criminal proceedings are initiated.

Still, desistance may influence probable cause, civil liability, or settlement of damages.

A settlement should be carefully drafted and should address:

  • takedown of posts;
  • apology or non-admission clause;
  • damages, if any;
  • non-repetition;
  • confidentiality;
  • waiver of civil claims;
  • cooperation in dismissal, where legally allowed;
  • return or deletion of screenshots, where appropriate.

XXXV. Truth as a Defense

Truth may be a defense in libel cases, but it is not always simple.

For truth to help, the accused must generally prove that the defamatory imputation is true and that publication was made with good motives and for justifiable ends.

Example:

If the post says, “He was convicted of estafa,” the accused should be able to prove an actual conviction, not merely suspicion or rumor.

Truth is risky as a defense if the accused lacks solid proof.

A person should not post accusations based only on hearsay, gossip, or incomplete documents.


XXXVI. Fair Comment on Matters of Public Interest

Fair comment may protect opinions on matters of public interest, especially involving public officials, public figures, public services, consumer issues, or community concerns.

Examples:

  • criticism of government action;
  • review of public services;
  • comment on official conduct;
  • consumer complaint about a business transaction;
  • political commentary;
  • public safety warnings.

However, fair comment does not protect knowingly false factual accusations or malicious personal attacks unrelated to public interest.

A statement like “I disagree with the mayor’s policy” is different from “The mayor stole funds” without proof.


XXXVII. Privileged Communication

Some communications are privileged.

Privileged communications may include certain statements made:

  • in official proceedings;
  • in judicial pleadings, if relevant;
  • in complaints to proper authorities;
  • in good-faith reports to agencies;
  • in performance evaluations or internal reports under proper circumstances;
  • in fair and true reports of official proceedings.

Privilege may be absolute or qualified.

Qualified privilege can be defeated by proof of actual malice.

A Facebook rant is usually less likely to be privileged than a formal complaint filed with the proper agency.


XXXVIII. Complaints to Authorities vs. Facebook Accusations

If a person believes someone committed a crime or misconduct, the safer legal route is to file a complaint with proper authorities, not to accuse the person publicly on Facebook.

Example:

Safer:

  • filing a complaint with police, barangay, school, employer, professional board, or court.

Riskier:

  • posting “This person is a thief and should be jailed” on Facebook before any adjudication.

A good-faith complaint to the proper authority may be privileged. A public social media accusation may expose the author to libel.


XXXIX. Consumer Reviews and Cyber Libel

Many old Facebook posts involve complaints about sellers, restaurants, contractors, clinics, schools, or services.

Consumers may post honest reviews, but they should stick to verifiable facts and personal experience.

Safer review:

  • “I paid on June 1. The item was not delivered as of June 20. I requested a refund but have not received one.”

Riskier review:

  • “This seller is a scammer and criminal. Do not deal with this thief.”

A consumer review becomes more dangerous when it accuses a person or business of a crime without proof.


XL. Public Officials and Public Figures

Posts about public officials may receive more protection when they involve official conduct and matters of public concern.

Public officials are expected to tolerate criticism to some extent.

However, false statements of fact made with actual malice may still be actionable.

Examples:

Protected or safer:

  • “I disagree with Councilor X’s project.”
  • “The procurement process should be investigated.”
  • “The mayor should explain the budget.”

Risky:

  • “Councilor X stole the funds,” without proof.
  • “The mayor is a drug lord,” without proof.

Criticism is not a license to make false criminal accusations.


XLI. Private Persons

Private individuals generally receive stronger protection from defamatory statements than public officials or public figures.

An old Facebook post attacking a private person’s morality, honesty, business, family, or profession may be more likely to generate liability if false and malicious.

Private disputes should be handled carefully because public shaming can become cyber libel.


XLII. Workplace Posts

Old Facebook posts about employers, managers, co-workers, or employees may become cyber libel issues.

Examples of risky posts:

  • “My manager steals from the company.”
  • “HR falsifies payroll.”
  • “My co-worker is a drug addict.”
  • “The owner is a tax evader.”
  • “This employee is a prostitute.”
  • “My boss is a predator.”

Workplace grievances should ideally be raised through HR, grievance mechanisms, DOLE, union channels, or legal counsel.

Workers may criticize unfair practices, but factual accusations should be provable and made in proper forums.


XLIII. School and Student Posts

Students, parents, teachers, and school administrators may be involved in cyber libel disputes over old Facebook posts.

Risky accusations include:

  • teacher abuses students;
  • student is a thief;
  • parent is a scammer;
  • school official is corrupt;
  • classmate is immoral;
  • coach is a predator.

Because minors may be involved, privacy, child protection, school discipline, and cyberbullying issues may also arise.


XLIV. Family Disputes

Family conflicts often produce Facebook posts later used in cyber libel complaints.

Examples:

  • accusations of adultery;
  • inheritance theft;
  • abuse;
  • abandonment;
  • fraud;
  • illegitimacy;
  • domestic violence;
  • drug use;
  • gambling;
  • mental illness.

Family posts are risky because they often include names, photos, and emotional language.

A truthful legal complaint filed in the proper forum is safer than a public Facebook attack.


XLV. Business Rivalry and Cyber Libel

Businesses may use old posts in disputes involving competition, customer complaints, former partners, or franchise conflicts.

Risky business statements include:

  • “This company is a scam.”
  • “They sell fake products.”
  • “Their owner is a criminal.”
  • “They do illegal business.”
  • “They cheat customers.”

Businesses may file cyber libel, civil damages, unfair competition, or other claims depending on facts.

Corporate entities may be defamed in relation to business reputation, although criminal libel rules often focus on persons responsible and identifiable subjects.


XLVI. Memes, Emojis, Hashtags, and Images

Cyber libel is not limited to plain text.

A defamatory imputation may be conveyed through:

  • memes;
  • edited photos;
  • captions;
  • hashtags;
  • emojis;
  • GIFs;
  • videos;
  • voiceovers;
  • screenshots;
  • side-by-side images;
  • reaction images;
  • sarcastic posts.

Example:

Posting a person’s photo with a thief emoji, money bag emoji, and caption “ingat kayo dito” may imply a defamatory accusation depending on context.

Hashtags can matter:

  • #Scammer
  • #Magnanakaw
  • #Corrupt
  • #Kabitan
  • #FakeDoctor

Context determines meaning.


XLVII. Humor and Satire

Humor and satire may be protected in some contexts, especially political commentary. But satire does not automatically defeat libel if readers reasonably understand it as a factual defamatory accusation.

A joke that falsely accuses a private person of a crime may still be risky.

The more absurd and clearly fictional the statement, the safer it may be. The more specific and believable the accusation, the greater the risk.


XLVIII. Hyperbole and Insults

Mere insults or vulgar language may not always be libel if they do not assert a specific defamatory fact.

Examples that may be treated as insult rather than factual accusation, depending on context:

  • “ang pangit ng ugali”
  • “walang kwenta”
  • “toxic”
  • “trapo”
  • “basura ang serbisyo”

But insults can become defamatory if they imply criminal, immoral, or professionally damaging facts.

Example:

  • “Magnanakaw ka” is more than a mere insult because it imputes theft.

XLIX. “Scammer” Posts

Calling someone a “scammer” is especially risky because it implies fraud or criminal dishonesty.

A safer approach is to state facts:

  • “I paid ₱5,000 on March 3. I have not received the item. Seller has not replied since March 10.”

Riskier:

  • “Scammer si Maria. Magnanakaw siya.”

If a person has proof of a scam, the better route is to file a complaint and post carefully worded factual warnings if necessary.


L. “Kabitan,” Adultery, and Sexual Morality Posts

Posts accusing someone of being a mistress, adulterer, immoral person, or homewrecker can be defamatory.

Examples:

  • “Kabitenya siya.”
  • “She sleeps with married men.”
  • “Adulterer ang babaeng ito.”
  • “This man keeps a mistress.”

Even if emotions are high, public accusations about sexual conduct can lead to cyber libel claims unless properly proven and legally defensible.


LI. Accusations of Crime

Accusing someone of committing a crime is among the clearest forms of defamatory imputation.

Examples:

  • theft;
  • estafa;
  • rape;
  • corruption;
  • drug dealing;
  • falsification;
  • bribery;
  • child abuse;
  • human trafficking;
  • tax evasion.

Unless the person has been convicted or there is strong proof and a privileged context, public Facebook accusations are risky.

It is safer to say:

  • “I filed a complaint against X for alleged estafa.”

than:

  • “X is an estafador.”

LII. Accusations Affecting Profession or Business

Posts may be defamatory if they attack a person’s profession, trade, or business.

Examples:

  • “This doctor kills patients.”
  • “This lawyer bribes judges.”
  • “This accountant falsifies books.”
  • “This contractor uses substandard materials.”
  • “This teacher abuses children.”
  • “This engineer is fake.”

Professional criticism should be factual, fair, and made through proper channels when possible.


LIII. Republication by News Pages or Influencers

If an old post is picked up by news pages, vloggers, influencers, or community pages, the reach expands dramatically.

Each republication may create separate liability for the person who republishes or adds defamatory commentary.

The original author may also face renewed attention, but whether the original author is liable for third-party republication depends on participation, foreseeability, and legal theory.

Influencers should verify before reposting accusations.


LIV. Viral Old Posts

An old post may go viral years later.

If it goes viral because others found and shared it, the original author may argue they did not republish it. But if the original author participates in the viral spread, comments, shares, pins, or encourages it, liability risk increases.

A person who notices an old potentially defamatory post going viral should consider deleting, correcting, or clarifying it promptly.


LV. Private Facebook Groups

Posts in private groups can still be publication because group members are third persons.

A private group is not a legal shield.

However, the size, purpose, and privacy of the group may affect damages, malice, and context.

Example:

  • A post in a group of five family members may have different impact from a public post shared 10,000 times.
  • A post in an official homeowners’ group may affect reputation in a community.
  • A post in a workplace group may affect employment and professional standing.

LVI. Messenger Group Chats

Messenger group chats may create publication if defamatory statements are sent to multiple people.

A one-on-one insult sent only to the person insulted may not be libel because there is no third-person publication, though other remedies may exist.

A group chat accusation can be libelous if third persons read it.

Screenshots of group chats can become evidence, but authenticity and privacy issues may arise.


LVII. Deactivated Accounts

If an account is deactivated, old posts may become inaccessible. That may reduce ongoing harm, but it does not automatically erase past publication.

If screenshots exist, a complaint may still be filed subject to prescription and evidence.

If the account is reactivated and the posts become visible again, the complainant may argue renewed availability, though whether that is a new publication depends on facts.


LVIII. Deleted Accounts and Evidence Problems

If the post is deleted and only screenshots remain, the complainant may still pursue a case, but proof may be harder.

The accused may challenge:

  • authenticity of screenshot;
  • authorship;
  • date;
  • completeness;
  • context;
  • whether it was visible to third persons;
  • whether the account was fake or hacked.

Good evidence preservation matters for both sides.


LIX. Hacked Accounts

If a defamatory post came from a hacked Facebook account, the account owner may deny liability.

The owner should gather evidence:

  • login alerts;
  • password reset emails;
  • reports to Facebook;
  • police or cybercrime report;
  • messages to friends warning of hack;
  • device logs;
  • timeline of unauthorized access;
  • proof of location elsewhere;
  • two-factor authentication records.

The prosecution must prove authorship or participation beyond reasonable doubt in a criminal case.


LX. Parody or Fake Accounts Using Another Person’s Name

Fake accounts may be used to post defamatory content. The person impersonated may be both a victim of identity misuse and defamation.

Remedies may include:

  • reporting the fake account to Facebook;
  • cybercrime complaint;
  • identity theft complaint;
  • libel complaint if defamatory content is posted;
  • data privacy remedies if personal information is misused;
  • civil action for damages.

A fake account can also complicate attribution if someone falsely accuses the real person of making the post.


LXI. Minors and Old Facebook Posts

If the author or complainant was a minor when the post was made, additional considerations arise.

Possible issues include:

  • juvenile justice principles;
  • school discipline;
  • parental responsibility;
  • cyberbullying;
  • child protection;
  • privacy of minors;
  • emotional harm;
  • capacity and discernment;
  • diversion or intervention programs.

Minors’ posts should be handled carefully. Public shaming of minors may create separate legal problems.


LXII. Public Apology Demands

Complainants often demand public apology, deletion, and payment.

A public apology may help, but wording matters.

An accused should avoid posting an apology that admits more than intended or creates new defamatory statements.

Possible neutral wording:

  • “I regret my previous post and its effects. I have taken it down and will refrain from further comments.”

Riskier wording:

  • “I lied when I called him a thief because I was angry.”

This may be used as admission. Legal advice is useful before issuing written apologies in serious cases.


LXIII. Demand Letters for Old Posts

A complainant may send a demand letter asking for:

  • deletion;
  • apology;
  • damages;
  • undertaking not to repost;
  • identification of sharers;
  • preservation of evidence;
  • settlement meeting.

The recipient should not ignore the letter, but should also not panic.

A response may raise:

  • denial of authorship;
  • prescription;
  • lack of identification;
  • truth;
  • fair comment;
  • privilege;
  • absence of malice;
  • willingness to remove without admission;
  • settlement proposal.

LXIV. Barangay Conciliation

Some disputes may require or benefit from barangay conciliation if the parties are individuals residing in the same city or municipality and the offense or claim falls within barangay conciliation rules.

However, not all cyber libel disputes are suitable for barangay conciliation, especially where penalties, residence, public officers, corporations, urgency, or other exceptions apply.

Even when barangay proceedings occur, parties should be careful about admissions and settlement wording.


LXV. Filing a Cyber Libel Complaint

A complainant usually needs evidence and affidavits.

Typical evidence may include:

  • screenshots of the post;
  • URL;
  • date and time captured;
  • account name and profile link;
  • comments and shares;
  • witnesses who saw the post;
  • proof that the complainant is identifiable;
  • proof of damage or reputation harm;
  • proof of malice, if needed;
  • demand letter, if any;
  • certification or technical evidence, if available;
  • proof linking the accused to the account.

The complaint may be filed with appropriate law enforcement or prosecution offices depending on procedure.


LXVI. Preliminary Investigation

Cyber libel cases usually go through preliminary investigation if the penalty requires it.

During preliminary investigation, the prosecutor determines probable cause.

The respondent may file a counter-affidavit raising defenses such as:

  • no defamatory imputation;
  • no identification;
  • no publication;
  • no malice;
  • privileged communication;
  • truth;
  • fair comment;
  • prescription;
  • lack of authorship;
  • fake screenshot;
  • hacked account;
  • post predates law;
  • improper venue;
  • lack of jurisdiction;
  • settlement or desistance.

If probable cause is found, an Information may be filed in court.


LXVII. Venue

Cyber libel venue can be complicated because online content may be accessed in many places. Criminal procedure and cybercrime rules may affect where the complaint or case may be filed.

Possible venue considerations include:

  • where the offended party actually resided or held office at the time;
  • where the post was first accessed;
  • where the accused made the post;
  • where the publication was downloaded or viewed;
  • special cybercrime venue rules;
  • where damage occurred.

Improper venue may be a defense.

Because venue affects jurisdiction and convenience, it should be examined early.


LXVIII. Jurisdiction

Cyber libel cases are handled by courts with jurisdiction over cybercrime offenses. The exact court assignment may depend on current procedural rules and designated cybercrime courts.

Jurisdiction should not be assumed. The complaint must be filed and prosecuted in the proper forum.


LXIX. Penalty

Cyber libel carries a higher penalty than traditional libel because the offense is committed through information and communication technology.

The penalty affects:

  • prescription arguments;
  • bail;
  • plea bargaining;
  • sentencing;
  • civil liability;
  • settlement pressure;
  • seriousness of the case.

The possibility of imprisonment, fine, and damages makes cyber libel a serious legal matter even if the post was old or made casually.


LXX. Civil Liability

A criminal cyber libel case may include civil liability.

The complainant may claim:

  • moral damages;
  • actual damages;
  • exemplary damages;
  • attorney’s fees;
  • costs;
  • other relief.

Damages depend on proof of injury, reach of publication, seriousness of imputation, social standing, malice, and consequences.

An old post with limited visibility may have lower damages than a viral defamatory campaign, but the content and context matter.


LXXI. Separate Civil Action

A person defamed by an old Facebook post may also consider civil remedies for damages, depending on facts.

Civil claims may involve defamation, abuse of rights, privacy, or other causes of action.

Civil cases have different standards and prescription periods from criminal cases.


LXXII. Cyber Libel vs. Grave Oral Defamation vs. Slander

A spoken defamatory statement may be oral defamation or slander. A written or online defamatory statement may be libel or cyber libel.

If the accusation is made in a Facebook video or livestream, the classification may depend on whether the defamatory matter is oral, written, recorded, captioned, or published through digital means.

A Facebook livestream with spoken defamatory accusations may raise complex issues involving oral defamation, cyber libel, or other cyber-related offenses depending on how the content is published and preserved.


LXXIII. Cyber Libel vs. Unjust Vexation, Threats, or Harassment

Not every offensive Facebook post is cyber libel. Some posts may involve:

  • unjust vexation;
  • threats;
  • coercion;
  • cyber harassment;
  • privacy violation;
  • gender-based online sexual harassment;
  • child protection violations;
  • stalking-like conduct;
  • data privacy violations.

The correct legal remedy depends on the exact content and conduct.

Example:

  • “I will expose your private photos” may involve threats or privacy violations.
  • Posting false criminal accusations may be cyber libel.
  • Repeated abusive messages may involve harassment or unjust vexation.
  • Posting intimate images may involve separate special laws.

LXXIV. Gender-Based Online Harassment

Some old Facebook posts involve sexualized attacks, misogynistic insults, non-consensual images, or gender-based harassment.

These may trigger laws beyond cyber libel.

Examples:

  • sexual slurs;
  • threats to release intimate photos;
  • posting private sexual information;
  • repeated gender-based insults;
  • misogynistic attacks;
  • outing someone’s sexual history;
  • sharing intimate images.

A complainant may pursue other remedies even if cyber libel is unavailable or prescribed.


LXXV. Data Privacy Issues

Old Facebook posts may contain personal information, such as:

  • home address;
  • phone number;
  • ID number;
  • passport details;
  • school records;
  • medical information;
  • workplace records;
  • private messages;
  • photos of children;
  • bank details.

Even if the post is not libelous, unauthorized disclosure of personal data may create data privacy issues.

Example:

  • Posting someone’s address and calling for harassment may be dangerous even if no defamatory accusation is made.

LXXVI. Doxxing

Doxxing means exposing private personal information online, often to harass or endanger someone.

A Facebook post may combine libel and doxxing.

Example:

  • “This scammer lives at [address], call her at [number].”

Legal risks may include cyber libel, privacy violations, harassment, threats, or other offenses.


LXXVII. Cyber Libel and Online Reviews of Public Services

People often post complaints about barangay officials, police, hospitals, schools, airlines, restaurants, or utilities.

The safest approach is to state facts, attach proof carefully, avoid unnecessary personal attacks, and avoid declaring criminal guilt unless established.

Safer:

  • “I experienced a delay in processing my document on May 3. I was told to return three times. I am requesting an explanation.”

Risky:

  • “The staff are all corrupt criminals who extort money.”

Public accountability is important, but false accusations can be actionable.


LXXVIII. Presumption of Innocence in Facebook Accusations

Calling someone guilty of a crime before conviction may be risky.

A person may say:

  • “A complaint has been filed.”
  • “The matter is under investigation.”
  • “I am seeking legal remedies.”
  • “I allege that this happened.”

But saying:

  • “He is a rapist.”
  • “She is an estafadora.”
  • “They are thieves.”

can be defamatory if not legally proven.

The distinction between allegation and declaration matters.


LXXIX. Good Faith Warning Posts

Sometimes people post warnings to protect others.

A warning may be defensible if made in good faith, based on facts, and for justifiable ends. But the wording should be careful.

Safer:

  • “I had a transaction with this seller. I paid on this date and have not received the item. I am posting to ask for help locating the seller and to warn others to be cautious.”

Riskier:

  • “This person is a professional scammer and criminal.”

Good faith does not protect reckless or exaggerated accusations.


LXXX. Burden of Proof in Criminal Cyber Libel

In a criminal case, the prosecution must prove guilt beyond reasonable doubt.

This includes proving:

  • the accused authored or published the post;
  • the post was defamatory;
  • the complainant was identifiable;
  • the post was published to third persons;
  • malice;
  • cyber medium;
  • venue and jurisdiction;
  • timely prosecution.

The accused does not have to prove innocence. But raising evidence-based defenses is important.


LXXXI. Probable Cause vs. Conviction

A prosecutor finding probable cause does not mean the accused is guilty.

Probable cause means there is enough basis to charge the person in court. Conviction requires proof beyond reasonable doubt.

Old Facebook posts may survive preliminary investigation but still fail at trial if evidence is weak, prescription applies, or defenses are proven.


LXXXII. Defense: No Defamatory Meaning

The accused may argue that the post is not defamatory.

Examples:

  • the post was vague;
  • it expressed frustration;
  • it was rhetorical hyperbole;
  • it did not accuse a crime or dishonorable conduct;
  • it was a fair opinion;
  • it was a joke not reasonably taken as fact;
  • it criticized service, not character.

Context matters.


LXXXIII. Defense: No Identification

The accused may argue that the complainant was not identifiable.

This may work if:

  • no name was used;
  • no photo or tag was used;
  • references were too vague;
  • many people fit the description;
  • readers could not reasonably identify the complainant;
  • the complainant assumed the post referred to them without proof.

However, if commenters clearly identified the complainant or the context points to them, the defense weakens.


LXXXIV. Defense: No Publication

The accused may argue there was no publication to a third person.

This may apply if:

  • the post was never actually visible;
  • the message was sent only to the complainant;
  • the screenshot is fabricated;
  • privacy setting prevented third-party access;
  • no witness saw it;
  • it remained in drafts;
  • the account was not public and no third person viewed it.

A Facebook post usually implies publication, but evidence still matters.


LXXXV. Defense: Privileged Communication

If the statement was made in a privileged context, the accused may argue privilege.

Examples:

  • complaint filed with proper authority;
  • relevant statement in judicial proceeding;
  • official report;
  • good-faith communication to a person with duty or interest.

A public Facebook post is usually not the best vehicle for privileged communication, but some posts reporting official proceedings may have defenses if fair, true, and made without malice.


LXXXVI. Defense: Truth and Good Motives

Truth may be raised if the accused can prove the imputation and justify publication.

This defense requires caution. If the accused cannot prove the accusation, the defense may backfire.

Documents, court records, admissions, receipts, official findings, and direct evidence matter.


LXXXVII. Defense: Fair Comment

The accused may argue the post was fair comment on a matter of public interest.

This is stronger when:

  • the subject is public official conduct;
  • the issue affects community welfare;
  • the post is based on disclosed facts;
  • the language is opinion rather than false factual accusation;
  • there is no actual malice.

LXXXVIII. Defense: Prescription

For old Facebook posts, prescription is often one of the most important defenses.

The accused should reconstruct the timeline:

  • date of original post;
  • date post became visible;
  • date complainant first learned;
  • dates of comments, shares, edits;
  • date of demand letter;
  • date of complaint;
  • date of preliminary investigation filing;
  • date of Information.

If the offense has prescribed, the case should not proceed.


LXXXIX. Defense: Post Was Before Cyber Libel Law

If the post predates the effectivity of the cybercrime law, the accused may argue that cyber libel cannot apply retroactively.

The complainant may try to rely on later republication, so the accused should examine whether any new publication occurred after the law took effect.


XC. Defense: No Authorship or Account Control

The accused may deny posting.

This defense may apply where:

  • account was hacked;
  • fake account was used;
  • multiple admins had access;
  • screenshot is edited;
  • someone else used the device;
  • page access was shared;
  • post was generated by another person;
  • the accused was tagged but did not post.

Evidence of account control becomes crucial.


XCI. Defense: Lack of Malice

The accused may show lack of malice through:

  • good-faith belief;
  • reliance on official records;
  • attempt to resolve dispute privately;
  • immediate deletion;
  • apology;
  • public interest purpose;
  • absence of personal ill will;
  • careful wording;
  • statements framed as opinion or inquiry;
  • privileged context.

Lack of malice is especially important in privileged or public concern contexts.


XCII. Defense: Fair and True Report

If the post fairly and accurately reports an official proceeding or public record, it may be defensible.

Example:

  • “A complaint for estafa was filed against X at the prosecutor’s office,” if true.

But embellishment can create risk.

Risky:

  • “X is definitely an estafador and will go to jail,” when only a complaint was filed.

XCIII. Defense: Consent

If the complainant consented to publication, that may be relevant. But consent is rarely a complete defense in typical Facebook libel disputes unless clear.

Example:

  • A person publicly asks others to repost a controversy, then complains about republication. Context matters.

XCIV. Defense: Retraction or Mitigation

Retraction does not automatically defeat liability but may reduce damages or show lack of malice.

A prompt correction is better than leaving a false accusation online.


XCV. Practical Steps for Someone Accused Over an Old Facebook Post

A person accused should:

  1. avoid posting more about the complainant;
  2. preserve the post, comments, dates, and context;
  3. check whether the post exists;
  4. check whether it was edited, shared, or commented on recently;
  5. document privacy settings;
  6. identify who had access to the account;
  7. gather evidence supporting truth, opinion, or privilege;
  8. check prescription;
  9. check whether the post predates cybercrime law;
  10. avoid admitting liability casually;
  11. consider takedown or correction without admission;
  12. respond carefully to demand letters;
  13. consult counsel if a complaint is threatened or filed.

Do not delete evidence recklessly if formal proceedings are expected. But also do not continue defamatory publication.


XCVI. Practical Steps for a Complainant

A person defamed by an old Facebook post should:

  1. capture screenshots with date, URL, profile, and full context;
  2. preserve comments and shares;
  3. identify witnesses who saw the post;
  4. document how they were identified;
  5. preserve evidence of harm;
  6. check the date of original post;
  7. check whether there was recent republication;
  8. send demand letter if appropriate;
  9. request takedown;
  10. file complaint before prescription issues become fatal;
  11. avoid retaliatory defamatory posts;
  12. consider civil, criminal, data privacy, or other remedies depending on content.

The complainant should act promptly. Delay may weaken the case.


XCVII. Evidence Checklist for Complainants

Useful evidence includes:

  • full screenshot of post;
  • URL;
  • date and time of screenshot;
  • account profile screenshot;
  • comments identifying the complainant;
  • shares;
  • reactions, if relevant;
  • captions;
  • photos or tags;
  • proof of account ownership;
  • witnesses who saw the post;
  • messages from people who asked about it;
  • proof of reputational harm;
  • employment or business consequences;
  • demand letter;
  • response from accused;
  • proof of recent republication if old.

XCVIII. Evidence Checklist for Respondents

Useful evidence includes:

  • original post context;
  • full thread;
  • date of post;
  • edit history, if available;
  • privacy settings;
  • proof of no recent republication;
  • proof of old posting date;
  • proof complainant knew earlier;
  • official records supporting statement;
  • communications showing good faith;
  • evidence of hacking or fake account;
  • account access logs, if available;
  • proof post was opinion;
  • proof no identification;
  • takedown or correction record;
  • settlement communications.

XCIX. Risk of Counterclaims

A complainant should avoid exaggerating or making false accusations in response.

A respondent should also avoid counter-posting defamatory statements.

Cyber libel disputes often escalate when both sides post accusations. Each new post can create a new case.

It is safer to move the dispute to formal legal channels.


C. Effect of Death of Complainant or Accused

Defamation is personal, but procedural effects depend on timing and whether civil liability is involved.

If a complainant dies, heirs may have limited or specific rights depending on the claim and stage. If the accused dies, criminal liability is generally extinguished, though civil issues may have separate treatment depending on circumstances.

Old Facebook posts involving deceased persons may also raise issues of family reputation, privacy, and civil claims.


CI. Corporate and Organizational Complainants

Companies, associations, schools, churches, and organizations may complain if posts defame their business or reputation.

However, identification and defamatory meaning must still be established.

A post attacking a company may also identify officers or owners if the wording points to them personally.


CII. Multiple Accused

Cyber libel may involve multiple accused:

  • author;
  • page admin;
  • person who shared;
  • person who added caption;
  • person who commented defamatory matter;
  • editor;
  • content manager;
  • account owner;
  • influencer who amplified;
  • business entity in civil aspect.

Each person’s participation must be assessed separately.

Being tagged or merely seeing the post is not the same as publishing it.


CIII. Old Posts by Employees or Agents

If an employee posts defamatory content on a company page, the company may face reputational and civil exposure.

Questions include:

  • Was the employee authorized?
  • Was the post within work duties?
  • Did management approve?
  • Was the account official?
  • Did the company benefit?
  • Was the post removed after notice?
  • Was there social media policy?

Employers should control official accounts and maintain records of access.


CIV. Social Media Policies

Businesses, schools, and organizations should adopt social media policies that:

  • prohibit defamatory posts;
  • regulate official pages;
  • define authorized posters;
  • require fact-checking;
  • protect confidential information;
  • provide takedown procedures;
  • preserve evidence;
  • respect labor rights and free expression;
  • provide escalation for complaints.

Old posts should be audited periodically.


CV. Takedown Requests

A complainant may ask the poster, page admin, platform, or hosting service to remove defamatory content.

A takedown request should identify:

  • exact post;
  • URL;
  • defamatory statements;
  • reason for removal;
  • proof of identity;
  • legal basis if necessary.

Platform takedown does not automatically resolve criminal or civil liability, but it may reduce harm.


CVI. Facebook Reporting

Facebook may remove content that violates its policies, but platform removal is separate from Philippine legal liability.

A post may violate Facebook rules without being cyber libel, or be cyber libel even if Facebook does not immediately remove it.

The complainant should preserve evidence before reporting because the post may disappear.


CVII. Archiving and Preservation

Both complainants and respondents should preserve evidence.

Complainants should preserve the defamatory post before takedown.

Respondents should preserve context showing opinion, truth, lack of identification, or prescription.

Preservation may include screenshots, downloads, affidavits of witnesses, and technical records.


CVIII. Public Interest in Free Expression

Cyber libel law must be balanced with freedom of expression.

People should be able to criticize government, businesses, services, institutions, and public conduct. But free expression does not protect knowingly false and malicious defamatory statements.

The best practice is to criticize actions, policies, and documented facts rather than attack personal character with unsupported accusations.


CIX. Chilling Effect

Cyber libel complaints over old posts may chill speech, especially political criticism, consumer complaints, labor complaints, and whistleblowing.

Courts and prosecutors must distinguish between legitimate criticism and defamatory attack.

A complaint should not be used merely to silence fair comment, public accountability, or lawful grievance.


CX. Weaponization of Cyber Libel

Cyber libel may be misused in personal disputes, political conflicts, business rivalry, family disputes, and workplace retaliation.

Signs of weaponization include:

  • complaint filed only after unrelated dispute;
  • old vague post revived strategically;
  • complainant previously ignored the post;
  • demand for excessive settlement;
  • selective prosecution;
  • attempt to silence whistleblowing;
  • no actual reputational harm;
  • post involved public interest or labor complaint.

This does not automatically defeat a case, but it may support defenses of lack of malice, privilege, fair comment, or abuse of process in related proceedings.


CXI. Responsible Posting Guidelines

To avoid cyber libel risk:

  1. state facts, not unsupported conclusions;
  2. avoid calling people criminals unless there is a final judgment or clear lawful basis;
  3. use “alleged” accurately, not as decoration;
  4. avoid naming private persons unnecessarily;
  5. avoid posting addresses, IDs, or private data;
  6. file complaints with proper authorities;
  7. keep proof;
  8. avoid emotional posting;
  9. do not repost old accusations;
  10. delete or correct false posts promptly;
  11. avoid defamatory hashtags;
  12. separate opinion from fact;
  13. avoid edited images that imply criminality;
  14. do not share defamatory content casually;
  15. think before commenting on old posts.

CXII. Safer Wording Examples

A. Transaction dispute

Risky:

  • “Juan is a scammer.”

Safer:

  • “I paid Juan on March 5 for an item. As of April 1, I have not received the item or refund. I am seeking assistance and will file a complaint if unresolved.”

B. Workplace dispute

Risky:

  • “My boss steals our overtime.”

Safer:

  • “My payslip does not reflect overtime for these dates. I have asked HR for clarification and may seek labor advice.”

C. Public official

Risky:

  • “The mayor stole public funds.”

Safer:

  • “I believe the city should explain the spending for this project. I request transparency and audit.”

D. Relationship dispute

Risky:

  • “Maria is a homewrecker and adulteress.”

Safer:

  • No public post. Seek legal advice privately if marital remedies are being considered.

CXIII. Common Misconceptions

1. “It is safe because the post is old.”

Incorrect. Old posts may still create risk if within the prescriptive period or if republished.

2. “It is safe because I did not name the person.”

Incorrect. Identification may be indirect.

3. “It is safe because it was only on Facebook friends.”

Incorrect. Friends are third persons for publication purposes.

4. “It is safe because I only shared someone else’s post.”

Incorrect. Sharing can be publication.

5. “It is safe because I said ‘allegedly.’”

Incorrect. “Allegedly” does not automatically cure defamatory meaning.

6. “It is safe because it is true.”

Not always. Truth must be proven and publication should be for good motives and justifiable ends.

7. “Deleting the post removes liability.”

Incorrect. It may reduce harm but does not erase past publication.

8. “A screenshot is always enough.”

Not always. Screenshots can be challenged for authenticity, completeness, authorship, and context.

9. “Only public posts can be cyber libel.”

Incorrect. Private group posts or group chats may still be publication.

10. “Reacting or liking always makes me liable.”

Usually not by itself, but reactions may be context if combined with other conduct.


CXIV. Practical Summary Table

Situation Legal Risk
Old post merely remains online Depends on prescription and publication theory
Old post reshared today High risk of new publication
Old post edited to add accusation High risk
Old post made public after years Possible renewed publication issue
Screenshot of old post reposted High risk for reposting party
Comment added today repeating accusation New risk for commenter
Friends-only defamatory post Still publication
Private message only to complainant Usually not libel due to no third-party publication, but other issues may arise
Group chat accusation Possible publication
Post before cybercrime law Cyber libel retroactivity defense, unless later republication
Old post with no identifiable person Weaker case
Old post based on official complaint and carefully worded Stronger defense
Old post calling someone a criminal without proof High risk

CXV. Key Takeaways

  1. A Facebook post can be cyber libel if it contains a defamatory imputation, is published, identifies the complainant, and is malicious.
  2. Old posts are not automatically immune.
  3. Prescription is a major issue for old posts.
  4. Posts made before the cybercrime law may raise retroactivity defenses.
  5. Mere continued online availability is different from active republication.
  6. Resharing, editing, commenting, pinning, tagging, or making an old post public may create renewed risk.
  7. Screenshots are useful but may be challenged.
  8. Truth, fair comment, privilege, lack of identification, lack of malice, and prescription may be defenses.
  9. Sharing someone else’s defamatory old post can create liability.
  10. Deleting or apologizing may help mitigate but does not automatically erase liability.
  11. Public complaints should be factual, careful, and preferably directed to proper authorities.
  12. Cyber libel should not be used to silence legitimate criticism, but free speech does not protect malicious false accusations.

CXVI. Conclusion

Cyber libel for old Facebook posts in the Philippines is a legally complex issue. The age of the post matters, but it does not automatically end liability. The key questions are whether the post was defamatory, whether the complainant was identifiable, whether publication occurred, whether malice exists, whether the post was made after cyber libel became punishable, whether the case has prescribed, and whether there was any recent republication.

The greatest danger with old posts comes from renewed activity: resharing, editing, reposting screenshots, tagging, commenting, pinning, or making the post public again. These acts may breathe new legal life into otherwise old content.

For complainants, prompt evidence preservation and timely action are essential. For respondents, prescription, authorship, context, truth, fair comment, privilege, and lack of malice should be carefully examined. For everyone, the safest rule is to avoid public accusations of crime, dishonesty, sexual misconduct, corruption, or professional incompetence unless the statement is true, provable, made in good faith, and expressed in a legally careful manner.

Old Facebook posts may feel like the past, but online publication can preserve and revive words long after they were written. In Philippine law, a careless post can outlive the emotion that produced it.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.