Cyber Libel Without Directly Naming the Person in the Philippines

I. Introduction

Cyber libel in the Philippines does not require that the offended person be named outright. A person may be held liable for libelous online statements even if the post uses initials, nicknames, job titles, descriptions, photographs, screenshots, contextual clues, or “blind item” language, so long as the person referred to is identifiable.

This is especially important in the Philippine social media environment, where posts often avoid naming a target but still make the identity obvious to friends, co-workers, neighbors, schoolmates, clients, voters, or members of a specific community. A post may say “yung corrupt na barangay official,” “si Attorney na mahilig manloko ng kliyente,” “the CEO of that local company,” “the teacher from Grade 10,” or “the doctor in our town who falsifies documents.” Even without a full legal name, such statements may expose the author to cyber libel liability if the elements of libel are present.

Cyber libel is essentially traditional libel committed through a computer system or similar digital means. In the Philippines, it is governed by the Revised Penal Code provisions on libel, in relation to the Cybercrime Prevention Act of 2012.


II. Basic Legal Framework

A. Libel under the Revised Penal Code

Traditional libel is defined under Article 353 of the Revised Penal Code as a public and malicious imputation of a crime, vice, defect, act, omission, condition, status, or circumstance that tends to cause dishonor, discredit, or contempt of a natural or juridical person, or to blacken the memory of one who is dead.

Libel may be committed through writing, printing, lithography, engraving, radio, phonograph, painting, theatrical or cinematographic exhibition, or any similar means.

B. Cyber libel under the Cybercrime Prevention Act

Republic Act No. 10175, or the Cybercrime Prevention Act of 2012, includes libel as a cybercrime when committed through a computer system or similar means.

In practical terms, cyber libel may arise from defamatory content posted, uploaded, shared, published, or transmitted through:

  • Facebook posts, comments, stories, reels, and pages;
  • X/Twitter posts;
  • TikTok captions or videos;
  • YouTube videos, comments, livestreams, or community posts;
  • blogs and websites;
  • online forums;
  • email newsletters;
  • messaging platforms, depending on publication to third persons;
  • screenshots or reposts;
  • digital posters, memes, infographics, or edited images;
  • public group chats or channels;
  • other internet-based communications.

The key point is that the defamatory statement is published through a computer system.


III. Elements of Cyber Libel

To establish cyber libel, the prosecution or complainant generally must show the same basic elements of libel, plus the use of a computer system.

The core elements are:

  1. There is an imputation. The statement attributes to a person a crime, vice, defect, act, omission, condition, status, or circumstance.

  2. The imputation is defamatory. It tends to dishonor, discredit, or cause contempt toward the person.

  3. The imputation is malicious. Malice may be presumed from the defamatory nature of the statement, although this presumption may be overcome. In some cases, actual malice must be shown, especially where public officers, public figures, or matters of public concern are involved.

  4. The imputation is published. It is communicated to a third person, not merely kept private between the speaker and the subject.

  5. The person defamed is identifiable. The offended person must be named or otherwise identifiable.

  6. The defamatory statement is made through a computer system. This is what makes the offense cyber libel.

The fifth element is central to this article: identification does not require direct naming.


IV. The Identification Requirement

A person claiming to be defamed must show that the allegedly libelous statement referred to him or her. However, the law does not require that the person be expressly named.

It is enough that the person is identifiable from the words used, surrounding circumstances, context, accompanying images, timing, relationship of the parties, location, occupation, or knowledge of those who read or viewed the statement.

In other words, the question is not simply: “Was the person named?”

The better question is: “Would reasonable readers, viewers, or listeners understand that the statement referred to that person?”

If the answer is yes, then the identification element may be satisfied.


V. Cyber Libel Without Directly Naming the Person

A cyber libel case may proceed even where the post does not mention the complainant’s full name. Identification may arise through several methods.

A. Use of Initials

A post may refer to someone only as “A.B.,” “Attorney R,” “Doc M,” “Ma’am L,” or “Kapitan S.” Initials can still identify a person if readers know who is being referred to.

Example:

“Yung teacher na si Ma’am L sa school natin, nagnanakaw ng funds.”

Even without a surname, students, parents, faculty, and staff may know exactly who “Ma’am L” is. If the allegation is false and defamatory, cyber libel may arise.

B. Use of Nicknames or Aliases

Many people are more commonly known by nicknames than formal names. A post using a nickname may sufficiently identify the subject.

Example:

“Si ‘Bong’ na contractor dito sa subdivision, scammer yan.”

If only one contractor in the relevant community is commonly called Bong, the identification requirement may be met.

C. Use of Position or Title

A person may be identified by office, title, or role.

Examples:

“The treasurer of our homeowners’ association pocketed the money.”

“The principal of our school falsified documents.”

“The HR manager in our company accepts bribes.”

Even without a name, the statement may point unmistakably to one person.

D. Use of Location and Circumstances

A statement may identify someone through location, timing, or community-specific details.

Example:

“Yung dentist sa kanto ng Rizal Street na mahilig maningil kahit palpak ang gawa, fraud yan.”

If there is only one dentist at that location, the person may be identifiable.

E. Use of Photos, Screenshots, or Visual Clues

A post may avoid naming a person but include a photograph, blurred image, uniform, house, car, workplace, logo, ID, profile picture, or screenshot that reveals identity.

Even partial visual clues may be enough if they allow others to identify the person.

Example:

A Facebook post says, “Beware of this thief,” and attaches a blurred screenshot of a person’s profile, but the profile photo, workplace, mutual friends, or username remains recognizable.

The absence of a written name does not necessarily protect the poster.

F. Use of Tags, Mentions, or Comments

Sometimes the original post does not name anyone, but the comments identify the person. If the author encourages, confirms, “likes,” replies to, or participates in identifying the target, this may strengthen the argument that the post referred to the complainant.

Example:

Post:

“May isang empleyado dito na magnanakaw.”

Commenter:

“Si Carlo ba ito?”

Poster:

“Alam mo na.”

That exchange may help prove identification.

G. Use of “Blind Item” Posts

Blind items are common in Philippine online discourse. They attempt to avoid liability by omitting names while providing clues.

Example:

“Clue: former city official, mahilig magpa-presscon, may anak na councilor, at may kaso sa lupa. Corrupt yan.”

A blind item may still be libelous if the clues reasonably identify the person.

H. Use of Small-Community Context

Identification is easier to prove in a small group, workplace, barangay, classroom, church, association, or professional circle. A statement that appears vague to outsiders may be obvious to insiders.

Example:

“Yung accountant sa office natin na kakakasal lang, nagnanakaw ng petty cash.”

Even if the general public would not know who this is, co-workers might.

I. Reposting Another Person’s Defamatory Post

A person who reposts, shares, captions, or republishes defamatory content may face liability depending on the circumstances. Adding affirming comments such as “Totoo ito,” “Kalat niyo,” “Expose natin,” or “Beware of this criminal” may increase risk.

However, mere passive interaction, such as clicking “like,” has been treated differently from authorship or republication. Liability is stronger where the person creates, posts, reposts, comments on, or meaningfully endorses defamatory content.


VI. What Counts as a Defamatory Imputation?

A statement may be defamatory if it accuses someone of conduct that lowers reputation or exposes the person to public hatred, contempt, ridicule, or distrust.

Common examples include accusations that a person is:

  • a thief;
  • a scammer;
  • corrupt;
  • a drug user or drug pusher;
  • an adulterer or mistress;
  • a sexual predator;
  • a fraudster;
  • a liar in a professional capacity;
  • incompetent in a way that attacks professional reputation;
  • involved in falsification;
  • guilty of estafa, bribery, theft, or other crimes;
  • immoral, dishonest, or abusive in a serious way.

However, not all negative statements are libelous. The law distinguishes among factual assertions, opinions, insults, fair comments, rhetorical exaggeration, satire, and privileged communications.


VII. Statement of Fact vs. Opinion

Cyber libel generally involves a defamatory imputation of fact. A statement framed as an opinion may still be actionable if it implies undisclosed defamatory facts.

A. Potentially Non-Actionable Opinion

Example:

“I think the service of that restaurant was terrible.”

This is likely opinion or consumer criticism, depending on context.

B. Potentially Actionable Statement

Example:

“The owner of that restaurant steals from customers by charging fake fees.”

This is a factual accusation of dishonest conduct.

C. “Opinion” as a Disguise

Adding “in my opinion,” “for me,” “allegedly,” “chismis lang,” “just saying,” or “no names mentioned” does not automatically avoid liability.

Example:

“Opinion ko lang, pero yung mayor natin tumatanggap ng suhol.”

This may still be understood as an accusation of bribery.


VIII. “No Names Mentioned” Is Not a Complete Defense

Many online posts include disclaimers such as:

“No names mentioned.”

“Kung tinamaan ka, guilty ka.”

“Hindi ko sinabing ikaw.”

“Clue lang.”

“This is just a blind item.”

These disclaimers do not automatically prevent cyber libel. Courts look at substance, not merely form. If the target is identifiable, the lack of direct naming may not matter.

A person cannot avoid liability by deliberately giving enough clues to identify someone while pretending not to identify them.


IX. Requirement of Publication

Publication means communication to at least one person other than the person defamed.

In cyber libel, publication may occur when defamatory content is posted online or sent digitally to a third person. Public visibility is strong evidence of publication, but even limited distribution may be enough.

Examples of publication:

  • posting on a public Facebook profile;
  • posting in a Facebook group;
  • uploading a TikTok video;
  • sending a defamatory email to several recipients;
  • posting in a workplace group chat;
  • sharing screenshots to a group;
  • publishing a blog article;
  • commenting on a public page.

A purely private message sent only to the person accused may lack the publication element. But if it is sent to others, forwarded, posted, or placed in a group chat, publication may exist.


X. Malice in Cyber Libel

Malice is a central issue.

A. Presumed Malice

In ordinary libel, malice may be presumed when the statement is defamatory. This means the complainant may not initially need to prove hatred, ill will, or spite.

B. Actual Malice

Actual malice means the statement was made with knowledge that it was false or with reckless disregard of whether it was false.

Actual malice becomes especially important in cases involving public officers, public figures, or matters of public interest. Criticism of public officials receives broader constitutional protection, especially where the criticism concerns official conduct.

C. Evidence of Malice

Evidence that may support malice includes:

  • knowingly posting false accusations;
  • refusing to verify serious allegations;
  • fabricating screenshots or evidence;
  • posting after being corrected;
  • using insulting or excessive language;
  • targeting a person repeatedly;
  • threatening to destroy someone’s reputation;
  • encouraging others to harass the person;
  • posting out of revenge;
  • selectively omitting facts to create a false impression.

D. Evidence Negating Malice

Evidence that may help negate malice includes:

  • good-faith belief in truth;
  • reliance on official records;
  • fair comment on public conduct;
  • lack of intent to identify the complainant;
  • prompt correction or retraction;
  • limited publication;
  • absence of defamatory meaning;
  • privileged occasion;
  • reasonable verification before posting.

XI. Public Officials, Public Figures, and Matters of Public Concern

Philippine law recognizes the importance of free speech, especially on matters of public concern. Criticism of public officers, candidates, government agencies, and public figures is given wider latitude.

However, this does not mean people may freely post false accusations of crimes or corruption without basis.

A. Public Officers

Public officers may be criticized for official acts. Strong language, harsh commentary, and political criticism may be protected when directed at official conduct.

Example of generally protected criticism:

“The mayor’s flood-control project is wasteful and poorly managed.”

Example of higher-risk accusation:

“The mayor stole the flood-control funds and used them for his house.”

The second statement accuses the mayor of a crime and may require proof or sufficient factual basis.

B. Public Figures

Public figures may include celebrities, influencers, prominent businesspersons, candidates, activists, or persons who voluntarily inject themselves into public controversies.

They have a heavier burden in defamation cases involving public issues, particularly in proving actual malice.

C. Private Persons

Private persons enjoy greater protection from defamatory attacks. Accusations against ordinary individuals, employees, students, neighbors, or private professionals may more easily support liability if defamatory, false, malicious, and published.


XII. Group Libel and Identification

A defamatory statement against a group does not automatically give every member a cause of action. The issue is whether the statement specifically identifies or reasonably refers to a particular person or sufficiently small group.

A. Large Group

Example:

“All politicians are thieves.”

This is usually too broad to identify one specific person.

B. Small Group

Example:

“The three officers of ABC Homeowners’ Association stole the funds.”

If the group has only three officers, each may be identifiable.

C. Class or Category with Context

Example:

“One of the two Grade 8 advisers at this school is selling grades.”

If the context points to a small, identifiable group, liability risk increases.


XIII. Juridical Persons May Be Defamed

Libel may be committed against a natural person or a juridical person, such as a corporation, association, school, or business entity, if the statement tends to damage its reputation.

Examples:

“ABC Clinic falsifies all its medical results.”

“XYZ Lending is a scam company.”

“That school sells diplomas.”

A company may complain if the statement harms its reputation. Individual officers may also complain if the post identifies them personally.


XIV. Dead Persons and Their Memory

The Revised Penal Code also protects the memory of one who is dead. A defamatory imputation may be actionable if it blackens the memory of a deceased person, subject to the proper party’s standing and the circumstances of the case.


XV. Cyber Libel and Private Messages

A private message can become cyber libel if it is sent to a third person and contains defamatory imputations about someone identifiable.

Examples:

  • sending a defamatory accusation to a group chat;
  • emailing defamatory statements to an employer;
  • sending screenshots to clients;
  • messaging a person’s spouse, co-workers, or business partners with defamatory allegations.

A one-on-one message sent only to the person accused may not satisfy publication, but it may raise other legal issues depending on threats, harassment, coercion, or data privacy violations.


XVI. Cyber Libel in Group Chats

Group chats are legally risky. People often assume group chats are private, but publication may exist because the statement is communicated to multiple people.

A defamatory message in a family group chat, office chat, school chat, homeowners’ chat, church chat, or professional association chat may satisfy publication.

The size and nature of the group may also affect identification. In a small group, vague clues may be enough to identify the subject.


XVII. Screenshots as Evidence

Cyber libel cases often rely on screenshots, but screenshots should ideally be supported by authentication.

Useful evidence may include:

  • screenshots showing the post, comments, date, time, URL, and account name;
  • screen recordings;
  • archived links;
  • witnesses who saw the post;
  • metadata, if available;
  • admissions by the poster;
  • account ownership evidence;
  • device records;
  • platform records, where obtainable;
  • notarized affidavits from viewers;
  • barangay, workplace, or community members who understood who was being referred to.

Because digital content can be edited, deleted, or faked, authentication is important.


XVIII. Account Ownership and Identity of the Poster

In cyber libel, it is not enough to show that a defamatory post exists. The complainant must also connect the accused to the post.

Evidence may include:

  • the account name and profile;
  • admissions;
  • linked phone number or email;
  • prior use of the account;
  • recognizable photos;
  • testimony of persons familiar with the account;
  • device or IP-related evidence, where lawfully obtained;
  • consistent writing style or pattern;
  • recovery information;
  • messages from the same account;
  • circumstances showing control over the account.

A defense may argue that the account was hacked, fake, impersonated, or not controlled by the accused. The strength of such a defense depends on evidence.


XIX. Deleting the Post Does Not Automatically Erase Liability

Deleting a defamatory post may reduce harm, but it does not necessarily erase liability if publication already occurred. Screenshots, cached copies, witnesses, and reposts may preserve evidence.

However, prompt deletion, apology, correction, or retraction may be relevant to damages, malice, settlement, or prosecutorial discretion.


XX. Liability for Comments and Replies

A person may be liable not only for original posts but also for defamatory comments or replies.

Example:

Original post:

“May kilala akong scammer na real estate agent.”

Comment by poster:

“Siya yung agent sa Greenview na si Liza.”

The comment may complete the identification element.

Likewise, a comment on someone else’s post may itself be cyber libel if it contains a defamatory imputation against an identifiable person.


XXI. Memes, Edited Images, and Satire

Memes and edited images may also be defamatory if they convey a false factual accusation.

Satire, parody, and humor receive some protection, but they are not immune. The issue is whether a reasonable viewer would understand the content as joke, exaggeration, opinion, or factual accusation.

Example of lower risk:

A clearly absurd meme showing a politician as a cartoon villain, criticizing policy.

Example of higher risk:

An edited image falsely showing a private person being arrested for estafa, captioned “Scammer caught.”


XXII. Truth as a Defense

Truth may be a defense, but it is not always enough by itself. In criminal libel, truth must generally be accompanied by good motives and justifiable ends, especially under the Revised Penal Code framework.

A person posting accusations should be able to show not only that the statement is true, but also that there was a legitimate reason to publish it.

Example:

A consumer warning others about a proven scam may be treated differently from a revenge post meant only to humiliate someone.

Still, truth is a strong defense when properly supported.


XXIII. Fair Comment and Fair Criticism

Fair comment on matters of public interest may be protected, especially when based on true or publicly known facts.

Examples:

“Based on the audit report, the project appears overpriced.”

“The official should explain the missing funds identified by COA.”

These are safer than direct unsupported accusations like:

“He stole the money.”

Fair comment is stronger when the speaker identifies the factual basis and avoids stating unproven accusations as established fact.


XXIV. Privileged Communications

Certain communications may be privileged.

A. Absolutely Privileged Communications

Some statements made in official proceedings, legislative proceedings, judicial pleadings, or similar settings may be absolutely privileged if relevant and made in the proper context.

B. Qualifiedly Privileged Communications

Some communications are protected if made in good faith, on a proper occasion, to persons with a legitimate interest, and without malice.

Examples may include:

  • a complaint to an employer about employee misconduct;
  • a report to proper authorities;
  • a warning to a limited group with a legitimate need to know;
  • a grievance filed through official channels.

But privilege can be lost if the person acts with malice, exaggerates, publishes unnecessarily, or broadcasts the accusation to people with no legitimate interest.


XXV. Complaints to Authorities vs. Social Media Posts

A person who believes someone committed wrongdoing should generally use proper channels: police, prosecutor, employer, school, regulatory agency, barangay, court, or professional board.

A formal complaint made in good faith to the proper authority is different from a public social media post accusing someone of a crime.

Example:

Safer:

Filing a complaint with supporting evidence before the NBI, PNP, prosecutor, school, employer, or professional regulator.

Riskier:

Posting “Magnanakaw itong taong ito” on Facebook before any finding or investigation.

Public shaming often creates cyber libel risk.


XXVI. Cyber Libel and Data Privacy

Cyber libel may overlap with data privacy concerns when the post includes personal information, such as:

  • full name;
  • address;
  • phone number;
  • school or workplace;
  • family details;
  • photos;
  • IDs;
  • medical information;
  • financial information;
  • private messages;
  • screenshots;
  • sensitive personal information.

Even if a person believes the accusation is true, unnecessary disclosure of personal data may create separate legal issues under data privacy law.


XXVII. Cyber Libel and Harassment

Some online conduct may involve not only cyber libel but also harassment, unjust vexation, grave threats, light threats, coercion, stalking-type conduct, gender-based online sexual harassment, or violations of special laws.

Examples:

  • repeated defamatory posts;
  • threats to ruin someone’s reputation;
  • posting private sexual information;
  • doxxing;
  • encouraging mobs to harass the person;
  • threatening to post accusations unless money is paid;
  • using fake accounts to spread defamatory content.

The exact offense depends on the facts.


XXVIII. Prescription Period

The prescriptive period for cyber libel has been treated as significantly longer than ordinary libel. Ordinary libel under the Revised Penal Code has a shorter prescriptive period, while cyber libel under the Cybercrime Prevention Act has been associated with the longer prescriptive period applicable to offenses punished under special laws.

This distinction matters because complainants may still file cyber libel complaints long after a post was made, depending on the applicable rule and facts.

Because prescription can be technical and fact-sensitive, dates are critical: date of posting, date of discovery, republication, reposting, and continuing availability online may all be argued.


XXIX. Venue: Where to File

Venue in cyber libel can be complex. Traditional libel has special venue rules, often connected to where the offended party resides, where the article was printed or first published, or in the case of public officers, where they held office.

Cyber libel complicates this because online publication is accessible in many places. The complainant may file with appropriate law enforcement or prosecutorial offices, often where the complainant resides, where the post was accessed, or where the effects were felt, subject to applicable rules and jurisprudence.

Venue should be carefully evaluated because improper venue can become a defense issue.


XXX. Penalties

Cyber libel carries a heavier penalty than ordinary libel because the Cybercrime Prevention Act generally imposes a penalty one degree higher than that provided under the Revised Penal Code for the corresponding offense.

Traditional libel is punishable by imprisonment or fine under Article 355 of the Revised Penal Code. Cyber libel increases the penalty due to the use of information and communications technology.

The practical result is that cyber libel is treated more seriously than ordinary printed libel.


XXXI. Civil Liability and Damages

A cyber libel case may involve criminal liability and civil liability. The offended party may seek damages for injury to reputation, emotional distress, humiliation, loss of business, loss of employment opportunities, or other harm.

Possible civil claims may include:

  • moral damages;
  • exemplary damages;
  • actual damages, if proven;
  • attorney’s fees, where proper;
  • costs of suit.

A public apology, retraction, settlement, or correction may affect civil consequences but does not automatically terminate criminal liability unless legally implemented through proper procedure.


XXXII. Defenses in Cyber Libel Without Direct Naming

A person accused of cyber libel may raise several defenses depending on the facts.

A. Lack of Identification

The accused may argue that the post did not refer to the complainant and that readers would not reasonably identify the complainant as the subject.

This is especially relevant where the language is broad, vague, fictional, or applicable to many people.

B. Truth

The accused may prove the statement was true and published with good motives and justifiable ends.

C. Good Faith

The accused may show that the statement was made in good faith, based on credible information, without intent to defame.

D. Fair Comment

The accused may argue that the post was fair criticism or opinion on a matter of public interest.

E. Privileged Communication

The accused may argue that the statement was made in a protected setting, such as a complaint to proper authorities or a communication to persons with a legitimate interest.

F. No Malice

The accused may attempt to overcome presumed malice or show absence of actual malice where actual malice is required.

G. No Publication

The accused may argue the statement was not communicated to a third person.

H. No Authorship or Account Control

The accused may argue that he or she did not create, post, send, or control the account that published the statement.

I. Hyperbole or Rhetorical Exaggeration

The accused may argue that the language was obvious exaggeration, not a factual accusation.

J. Lack of Defamatory Meaning

The accused may argue that the statement, read as a whole, was not defamatory.


XXXIII. Common Risky Phrases

The following phrases are often risky when attached to identifiable persons:

  • “Magnanakaw”
  • “Scammer”
  • “Estafador”
  • “Corrupt”
  • “Drug addict”
  • “Drug pusher”
  • “Manyak”
  • “Rapist”
  • “Kabitan”
  • “Homewrecker”
  • “Fraud”
  • “Fake professional”
  • “Nagpepeke ng dokumento”
  • “Tumatanggap ng lagay”
  • “Nagnanakaw ng pondo”
  • “Abusado sa bata”
  • “Sexual predator”
  • “Criminal”
  • “Swindler”

Even if these words are used in Filipino, Taglish, slang, memes, or indirect phrasing, they may be defamatory if understood as factual accusations.


XXXIV. Practical Examples

Example 1: No Name, But Identifiable

Post:

“Yung cashier sa ABC Mart na buntis ngayon, nagnanakaw sa kaha.”

If there is only one pregnant cashier at ABC Mart, she may be identifiable. The accusation of theft is defamatory. If false and malicious, cyber libel may arise.

Example 2: Blind Item About Public Official

Post:

“Clue: city councilor, former basketball player, may initials na R.S. Tumanggap ng suhol sa permit.”

Even without a full name, the clues may identify the official. Because it accuses bribery, the risk is high.

Example 3: Vague Statement

Post:

“Maraming corrupt sa gobyerno.”

This is likely too general to identify one person.

Example 4: Group Chat Accusation

Message in office group chat:

“Yung bagong HR assistant natin, peke ang credentials.”

If the office has only one new HR assistant, identification may be clear.

Example 5: Consumer Review

Post:

“I had a bad experience with this salon. My hair treatment was poorly done, and the staff were rude.”

This is more likely a review or opinion, if limited to personal experience.

Riskier version:

“The owner of this salon steals from customers and uses fake products.”

This makes a factual accusation of dishonest conduct.


XXXV. Safer Ways to Post Complaints Online

A person who wants to warn others or express dissatisfaction should reduce risk by:

  • sticking to verifiable facts;
  • avoiding accusations of crimes unless supported by official findings or strong evidence;
  • avoiding unnecessary personal details;
  • avoiding insults and name-calling;
  • saying “I experienced” rather than “he is a criminal”;
  • attaching proof carefully and lawfully;
  • avoiding edited or misleading screenshots;
  • avoiding doxxing;
  • filing complaints with proper authorities;
  • limiting disclosure to persons with legitimate interest;
  • using neutral language;
  • correcting errors promptly;
  • avoiding “blind item” clues meant to identify and shame someone.

Safer phrasing:

“I paid for a service on March 1, but as of April 15, the service has not been delivered. I have requested a refund and filed a complaint.”

Riskier phrasing:

“Scammer ito. Magnanakaw. Ikulong dapat.”


XXXVI. Guidance for Complainants

A person who believes he or she was cyber-libeled should preserve evidence immediately.

Helpful steps include:

  1. Take screenshots showing the post, URL, date, time, account name, comments, shares, and reactions.
  2. Record the screen scrolling through the post and profile.
  3. Save links.
  4. Identify witnesses who saw the post and understood it referred to the complainant.
  5. Document harm: lost clients, employer action, anxiety, reputational injury, messages received.
  6. Avoid retaliatory defamatory posts.
  7. Send a demand letter only if strategically appropriate.
  8. Consider reporting to the platform.
  9. Consult counsel on filing with the prosecutor, NBI Cybercrime Division, PNP Anti-Cybercrime Group, or appropriate authority.

For identification, witnesses are especially important. The complainant should be able to show that third persons recognized the complainant as the subject of the post.


XXXVII. Guidance for Accused Posters

A person accused of cyber libel should:

  1. Preserve the full context of the post.
  2. Do not delete evidence without legal advice, though removing harmful content may sometimes reduce continuing damage.
  3. Save proof supporting the truth of the statement.
  4. Identify whether the complainant was actually named or identifiable.
  5. Preserve conversations showing good faith or lack of malice.
  6. Avoid further posts about the complainant.
  7. Avoid contacting witnesses improperly.
  8. Consider apology, clarification, settlement, or retraction if appropriate.
  9. Consult counsel before submitting counter-affidavits.

The counter-affidavit stage is critical because cyber libel complaints often proceed first through preliminary investigation.


XXXVIII. Key Philippine Principles to Remember

  1. Direct naming is not required. A person may be identified through clues, context, titles, initials, photos, locations, or circumstances.

  2. “No names mentioned” is not a shield. The law looks at whether the person is identifiable.

  3. Publication to third persons is essential. Online posting usually satisfies this.

  4. Truth helps, but motive and purpose matter. Truth should be supported by evidence and published for a legitimate reason.

  5. Public officials may be criticized more freely, but false factual accusations remain risky.

  6. Private persons are more protected from reputational attacks.

  7. Group chats can still create liability.

  8. Screenshots matter, but authentication matters too.

  9. Blind items can be libelous.

  10. Cyber libel is treated more severely than ordinary libel.


XXXIX. Conclusion

In the Philippines, cyber libel can exist even when the post does not directly name the person. The decisive question is whether the person is identifiable to others from the post, comments, clues, images, circumstances, or surrounding context.

A social media user cannot safely avoid liability by saying “no names mentioned” while giving enough details for the public, a workplace, a barangay, a school, or a community to know who is being attacked. If the statement imputes a crime, vice, defect, dishonesty, immorality, professional misconduct, or other discreditable condition to an identifiable person, and it is published online with malice, cyber libel may arise.

The safest approach is to distinguish between legitimate criticism and defamatory accusation. Criticize acts, services, policies, and experiences with facts. Avoid unsupported accusations of crimes or dishonesty. Use proper legal, administrative, or regulatory channels when reporting wrongdoing. In Philippine law, anonymity by omission is not enough; identifiability is what matters.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.