I. Introduction
Cyberbullying through a dummy Facebook account is a common modern legal problem in the Philippines. It may involve fake profiles, anonymous pages, impersonation accounts, troll accounts, edited photos, defamatory posts, threatening messages, private-image leaks, harassment in comment sections, group chat attacks, and repeated online humiliation.
Although “cyberbullying” is often used as a general term, Philippine law treats different online acts under different legal categories. A single dummy Facebook account may create liability for cyberlibel, grave threats, unjust vexation, identity theft, child abuse-related cyberbullying, violence against women, anti-photo and video voyeurism violations, data privacy violations, stalking-type harassment, or other offenses depending on the facts.
The key legal issue is not merely that the Facebook account is fake. The legal issue is what the account did, what content was posted or sent, who was targeted, what harm was caused, and whether the person behind the account can be identified and linked to the unlawful act.
II. Meaning of Cyberbullying in the Philippine Context
“Cyberbullying” generally refers to the use of digital platforms to harass, threaten, shame, ridicule, intimidate, exclude, impersonate, or attack another person.
It may happen through:
- Facebook posts;
- Facebook comments;
- Messenger messages;
- group chats;
- dummy accounts;
- fake pages;
- edited photos or videos;
- memes;
- screenshots of private conversations;
- TikTok, Instagram, X, YouTube, or other social platforms;
- anonymous confession pages;
- online forums;
- school group pages;
- workplace chat groups;
- coordinated reporting or mass harassment.
In ordinary speech, victims may call all of these “cyberbullying.” Legally, each act must be matched with the correct offense or civil remedy.
III. What Is a Dummy Facebook Account?
A dummy Facebook account is a Facebook profile, page, or account that hides the real identity of the person using it. It may use:
- a fake name;
- stolen photos;
- no profile photo;
- a cartoon or celebrity picture;
- another person’s identity;
- newly created details;
- fabricated school, work, or residence information;
- disposable email or number;
- fake mutual friends;
- false location.
Using a dummy account is not always automatically criminal. Some people use anonymous accounts for privacy, whistleblowing, advocacy, or safety. But a dummy account becomes legally problematic when it is used to commit unlawful acts, such as defamation, threats, harassment, identity theft, scams, extortion, blackmail, doxxing, or sexual exploitation.
IV. Common Forms of Cyberbullying Through Dummy Facebook Accounts
Cyberbullying using a dummy account may include:
A. Defamatory Posts
Examples:
- accusing someone of being a thief, scammer, prostitute, drug user, adulterer, corrupt official, or criminal;
- posting edited screenshots to destroy reputation;
- making false allegations about work, school, family, or private life;
- spreading rumors in community groups.
This may amount to cyberlibel if the legal elements are present.
B. Threatening Messages
Examples:
- “Papatayin kita.”
- “Abangan kita.”
- “Ipapahiya kita.”
- “Ikakalat ko pictures mo.”
- “Pupuntahan kita sa bahay.”
- “Damay pamilya mo.”
Depending on severity, this may constitute grave threats, light threats, coercion, unjust vexation, or other offenses.
C. Impersonation
Examples:
- creating a fake account using the victim’s name and photos;
- pretending to be the victim and posting sexual, offensive, or humiliating content;
- messaging others as if the victim sent the messages;
- using the victim’s identity to solicit money or damage reputation.
This may involve identity theft, computer-related fraud, cyberlibel, unjust vexation, or data privacy issues.
D. Doxxing or Disclosure of Personal Information
Examples:
- posting home address;
- revealing phone number;
- publishing school or workplace details;
- posting family members’ names;
- sharing private messages;
- exposing medical, sexual, or financial information.
This may raise data privacy, harassment, or safety concerns.
E. Sexual Harassment and Image-Based Abuse
Examples:
- posting intimate photos;
- threatening to leak private images;
- creating fake nude edits;
- sending sexual insults;
- spreading sexual rumors;
- forcing someone to send images.
These may involve cybercrime, anti-photo and video voyeurism laws, violence against women laws, child protection laws, or sexual harassment rules depending on the facts.
F. Repeated Harassment
Examples:
- daily insults;
- tagging the victim repeatedly;
- messaging the victim’s friends;
- creating new dummy accounts after being blocked;
- mass commenting on posts;
- coordinated attacks by several accounts.
Repeated conduct can strengthen the case by showing intent, pattern, and emotional harm.
V. Relevant Philippine Laws
There is no single law that covers every form of cyberbullying by a dummy Facebook account. The proper legal basis depends on the conduct.
Important laws and legal concepts may include:
- Cybercrime Prevention Act;
- Revised Penal Code;
- Civil Code provisions on damages and human relations;
- Anti-Bullying Act, especially for school-related minors;
- Special Protection of Children Against Abuse, Exploitation and Discrimination Act;
- Anti-Violence Against Women and Their Children Act;
- Safe Spaces Act;
- Anti-Photo and Video Voyeurism Act;
- Data Privacy Act;
- Rules on electronic evidence;
- Facebook or platform reporting mechanisms;
- school, workplace, or administrative disciplinary rules.
The same act may fall under several laws at the same time.
VI. Cyberlibel
Cyberlibel is one of the most common complaints involving dummy Facebook accounts.
A. Meaning of Cyberlibel
Cyberlibel is libel committed through a computer system or similar digital means. Facebook posts, comments, captions, shared posts, Messenger content, and other online statements may potentially be involved.
B. Elements
The usual elements of libel are:
- an imputation of a discreditable act, condition, or circumstance;
- publication;
- identification of the person defamed;
- malice.
When done online through a computer system, it may be treated as cyberlibel.
C. Defamatory Imputation
The post must contain a statement that tends to dishonor, discredit, or contempt a person.
Examples of potentially defamatory imputations:
- accusing someone of a crime;
- alleging sexual immorality;
- accusing someone of professional misconduct;
- calling a person a scammer in a factual context;
- claiming someone has a disease in a humiliating way;
- posting false allegations of corruption, theft, adultery, or fraud.
Mere insults may not always be cyberlibel, but they may still support other remedies depending on context.
D. Publication
Publication means communication to a third person. A Facebook post visible to others satisfies this requirement. A comment in a group may also qualify. A private message sent only to the victim may not be libel because there is no third-party publication, but it may be harassment, threat, or unjust vexation.
E. Identification
The victim must be identifiable. The post does not need to state the full legal name if the audience can reasonably identify the person through initials, photos, workplace, family references, tags, screenshots, or circumstances.
F. Malice
Malice may be presumed in defamatory imputations, subject to defenses. If the statement concerns a public figure or public matter, additional considerations may arise.
G. Sharing, Reacting, and Commenting
The original poster is not the only possible actor. A person who republishes defamatory material, adds defamatory captions, comments confirming the accusation, or spreads the post may face liability depending on participation and intent.
Mere passive reaction may be more difficult to prosecute, but context matters.
VII. Identity Theft and Impersonation
A dummy account may become an identity theft issue when it uses another person’s identity without authority.
Examples:
- using the victim’s name and photo;
- pretending to be the victim;
- sending messages as the victim;
- creating an account designed to make others believe it is the victim;
- using identity details to obtain money, access accounts, or damage reputation.
Identity theft is especially serious when it is connected with fraud, harassment, sexual exploitation, extortion, or reputational injury.
Evidence should show that the account used identifying information and that such use was unauthorized.
VIII. Threats, Coercion, and Intimidation
If the dummy account sends threats, the issue may fall under criminal provisions on threats or coercion.
A. Grave Threats
A grave threat may involve a serious threat to commit a crime, such as killing, injuring, kidnapping, or burning property.
B. Light Threats or Other Threat-Related Offenses
Less serious threats may still be punishable depending on the words used, context, and circumstances.
C. Coercion
If the account forces the victim to do something against the victim’s will by intimidation, such as paying money, deleting a post, resigning, leaving a relationship, or sending photos, coercion or other offenses may be considered.
D. Extortion or Blackmail
If the dummy account demands money, sexual images, silence, or compliance in exchange for not exposing something, the matter becomes more serious.
IX. Unjust Vexation and Other Harassment
Not every cyberbullying act fits neatly into cyberlibel or threats. Some conduct may be prosecuted or complained of as unjust vexation or other related offenses.
Unjust vexation may apply when the conduct causes annoyance, irritation, distress, torment, or disturbance without lawful justification.
Examples:
- repeated insulting messages;
- constant tagging to humiliate;
- sending embarrassing but non-defamatory content;
- creating nuisance accounts;
- repeatedly commenting on the victim’s posts;
- sending offensive memes directly to the victim.
Unjust vexation is fact-sensitive and should be evaluated carefully.
X. Cyberbullying Involving Minors
When the victim, offender, or both are minors, special rules may apply.
A. School-Related Cyberbullying
The Anti-Bullying Act covers bullying in schools, including cyberbullying when connected to school, students, or school activities.
School-related cyberbullying may include:
- online harassment by classmates;
- fake accounts targeting a student;
- humiliation in school group chats;
- circulation of embarrassing photos among students;
- threats or exclusion through online platforms;
- anonymous pages attacking students.
Schools have obligations to adopt anti-bullying policies, investigate complaints, protect students, and impose disciplinary measures consistent with law and due process.
B. Child Abuse or Exploitation
If the cyberbullying involves cruelty, humiliation, sexual content, exploitation, coercion, or abuse of a child, child protection laws may apply.
C. Role of Parents and Guardians
Parents should preserve evidence, report to the school, coordinate with child protection officers, and seek legal remedies if necessary.
D. Child in Conflict With the Law
If the offender is a minor, criminal accountability depends on age, discernment, and juvenile justice rules. The case may involve diversion, intervention, or social welfare processes rather than ordinary punishment.
XI. Cyberbullying Involving Women and Intimate Relationships
If the victim is a woman and the harassment is connected to a current or former dating, sexual, or marital relationship, the Anti-Violence Against Women and Their Children Act may be relevant.
Examples:
- ex-partner creates dummy account to shame the woman;
- threats to release intimate photos;
- stalking through fake accounts;
- humiliating posts about sexuality;
- harassment intended to control or punish the woman;
- threats affecting the woman’s child;
- psychological abuse through online attacks.
This may support criminal, civil, and protection order remedies.
XII. Safe Spaces and Gender-Based Online Harassment
Online sexual harassment or gender-based harassment may fall under safe spaces protections.
Examples:
- misogynistic, homophobic, transphobic, or sexist attacks;
- sexual comments sent repeatedly;
- unwanted sexual messages;
- public sexual shaming;
- threats of sexual violence;
- targeted attacks because of gender identity or sexual orientation.
Depending on the facts, remedies may be administrative, criminal, civil, or platform-based.
XIII. Anti-Photo and Video Voyeurism Issues
If the dummy account posts, shares, threatens to share, or uses intimate images or videos, the Anti-Photo and Video Voyeurism Act may apply.
This may involve:
- intimate photos taken with consent but shared without consent;
- intimate videos recorded secretly;
- screenshots from private calls;
- edited sexual images;
- threats to upload or forward private images;
- sharing in group chats.
Consent to take or send a private image is not necessarily consent to distribute it. Distribution without consent may be unlawful.
If the person in the image is a minor, the matter becomes even more serious.
XIV. Data Privacy Issues
A dummy account may violate privacy rights if it collects, uses, discloses, or posts personal information without authority.
Examples:
- posting address, phone number, or ID documents;
- sharing school or workplace information;
- publishing medical records;
- leaking private messages;
- revealing financial information;
- posting family details to expose the victim to danger.
The Data Privacy Act may be relevant, especially where personal information is processed, disclosed, or used maliciously. However, not every personal dispute automatically becomes a data privacy case. The context and role of the actor matter.
XV. Civil Liability and Damages
Even if a criminal case is difficult, the victim may pursue civil remedies.
Possible civil claims include:
- damages for injury to reputation;
- moral damages for mental anguish, humiliation, anxiety, or social shame;
- actual damages for lost income, therapy, relocation, or medical expenses;
- exemplary damages in serious cases;
- attorney’s fees where justified;
- injunction or takedown-related relief where appropriate;
- protection of privacy and dignity under civil law principles.
Civil claims require proof of wrongful act, damage, and causal connection.
XVI. Administrative, School, or Workplace Complaints
Cyberbullying may also be addressed through non-criminal processes.
A. School Complaint
If students are involved, the victim may file a complaint with the school. The school may investigate, impose discipline, require counseling, protect the victim, and coordinate with parents.
B. Workplace Complaint
If the offender is a co-worker or the cyberbullying affects employment, the victim may file a complaint with HR, management, or relevant administrative bodies.
Examples:
- employee posts defamatory claims about a co-worker;
- workplace group chat harassment;
- fake account targeting a supervisor;
- sexual harassment online;
- reputational attack affecting employment.
C. Professional or Government Employee Discipline
If the offender is a licensed professional, teacher, public official, or employee, administrative remedies may be available before the appropriate agency or employer.
XVII. Evidence in Dummy Facebook Account Cases
Evidence is the heart of any cyberbullying complaint.
A. Preserve the Account Evidence
The victim should preserve:
- account URL;
- profile name;
- profile photo;
- screenshots of profile page;
- screenshots of posts;
- comments;
- Messenger messages;
- timestamps;
- reactions and shares;
- names of people who saw the post;
- group or page name;
- links to posts;
- video recordings of screen navigation;
- notification emails;
- message requests;
- blocked account details;
- previous usernames, if visible.
B. Screenshots
Screenshots are useful but should be complete. Good screenshots show:
- date and time;
- profile name;
- account URL or identifying details;
- full post or message;
- comments and replies;
- visible audience or group;
- device date and time if possible.
Avoid editing, cropping excessively, or adding markings that obscure content. Keep original files.
C. Screen Recording
A screen recording may show that the account, post, or message existed at a certain time and how it was accessed.
D. Witnesses
Witnesses may include:
- people who saw the post;
- group members;
- recipients of defamatory messages;
- schoolmates or co-workers;
- friends who received screenshots from the dummy account;
- persons who can connect the dummy account to a real person.
E. Admissions
Sometimes the person behind the dummy account admits ownership, apologizes, uses the same writing style, reuses photos, or accidentally reveals identity.
Admissions may appear in:
- chats;
- texts;
- calls;
- emails;
- apology messages;
- settlement talks;
- posts from another account;
- shared phone numbers;
- recovery emails;
- linked accounts.
F. Technical Evidence
Technical evidence may include IP logs, platform records, device information, email addresses, phone numbers, and login records. These usually require lawful process and cooperation from platforms or service providers.
A private person should not hack, phish, or illegally access an account to prove identity. Illegally obtained evidence can create liability.
XVIII. Identifying the Person Behind the Dummy Account
One of the hardest parts of a dummy account complaint is attribution.
The complainant must show that a particular person controlled or used the account. Suspicion alone is usually not enough.
Possible indicators include:
- unique knowledge of private facts;
- writing style;
- timing of posts;
- matching threats from known accounts;
- use of photos only a certain person had;
- linked phone number or email;
- common friends;
- reuse of usernames;
- admissions;
- witness testimony;
- digital forensics;
- platform records obtained by authorities;
- connection to prior disputes;
- payment or extortion trail.
The stronger the link between the account and the suspect, the stronger the complaint.
XIX. Reporting to Facebook
A victim should report the account or content through Facebook’s reporting tools. Possible categories include:
- fake account;
- pretending to be someone;
- harassment;
- bullying;
- hate speech;
- nudity or sexual content;
- violence or threats;
- sharing private images;
- scam or fraud;
- intellectual property misuse;
- privacy violation.
Reporting may lead to takedown, account restriction, or preservation of platform records. However, platform action is separate from legal action. A Facebook takedown does not automatically create a criminal case, and failure of Facebook to remove content does not mean the post is legal.
Before reporting, the victim should preserve evidence because the content may disappear.
XX. Reporting to Authorities
A victim may report to:
- local police station;
- Philippine National Police Anti-Cybercrime Group;
- National Bureau of Investigation Cybercrime Division;
- prosecutor’s office;
- barangay, for certain disputes;
- school authorities, if school-related;
- employer or HR, if workplace-related;
- women and children protection desks, if VAWC or child-related;
- local social welfare office, for minors or vulnerable victims;
- National Privacy Commission, for privacy-related complaints where appropriate.
The proper office depends on the facts and urgency.
XXI. What to Bring When Filing a Complaint
A complainant should prepare:
- valid ID;
- printed screenshots;
- digital copies of screenshots;
- URLs of the account and posts;
- screen recordings;
- list of witnesses;
- written timeline;
- explanation of how the victim is identified;
- proof of harm;
- medical or psychological records, if any;
- school or workplace records, if relevant;
- prior demand or warning, if any;
- proof connecting the dummy account to a suspect;
- copies of related messages from real accounts;
- notarized affidavits, if required.
A clear timeline helps investigators understand the case.
XXII. Sample Timeline Structure
A useful timeline may include:
| Date | Incident | Evidence | Witnesses |
|---|---|---|---|
| January 5 | Dummy account created post accusing victim of theft | Screenshot, URL | Three group members |
| January 6 | Account messaged victim with threat | Messenger screenshot | Victim |
| January 7 | Post shared in barangay group | Screenshot, group link | Group members |
| January 8 | Suspect admitted in text that account was his | SMS screenshot | Victim |
| January 10 | Victim reported account to Facebook | Report confirmation | None |
The timeline should be factual and avoid speculation.
XXIII. Barangay Proceedings
Some disputes may be brought first to the barangay if the parties are known, live in the same city or municipality, and the matter is covered by barangay conciliation rules.
However, cybercrime, offenses punishable beyond barangay jurisdiction, urgent threats, violence, child abuse, VAWC, or cases requiring immediate police action may need direct reporting to authorities.
If the offender is unknown because the account is a dummy account, barangay conciliation may not be practical until the person is identified.
XXIV. Demand Letter or Cease-and-Desist Notice
A victim may send a demand letter if the offender is known. The letter may demand:
- takedown of posts;
- cessation of harassment;
- public or private apology;
- preservation of evidence;
- payment of damages;
- non-contact undertaking;
- disclosure or accounting if impersonation was used for fraud.
A demand letter should be factual and calm. It should not contain unlawful threats.
However, in serious cases involving threats, sexual images, minors, extortion, or safety risks, immediate reporting may be better than warning the offender, because advance warning may cause deletion of evidence.
XXV. Takedown vs. Evidence Preservation
Victims often want the post removed immediately. This is understandable, but removal can destroy evidence if not preserved first.
Best practice:
- capture screenshots;
- record the screen;
- copy links;
- identify witnesses;
- download visible media;
- report to authorities if urgent;
- report to Facebook for takedown.
In cases involving intimate images, minors, or threats, urgent takedown may be necessary for safety, but evidence should still be preserved as much as possible.
XXVI. If the Victim Is a Minor
When the victim is a minor, parents or guardians should act quickly.
Steps may include:
- preserve evidence;
- report to school authorities;
- request protective measures;
- report to the Women and Children Protection Desk where appropriate;
- seek assistance from social welfare authorities;
- avoid exposing the child further by reposting the harmful content;
- consider counseling or psychological support;
- pursue legal remedies if the acts are serious.
Parents should avoid retaliatory posting because it may worsen the harm and create separate liability.
XXVII. If the Offender Is a Minor
When the suspected offender is a minor, the legal process may involve juvenile justice rules.
Possible responses include:
- school discipline;
- parental conference;
- counseling;
- diversion;
- intervention programs;
- social welfare assessment;
- criminal proceedings only where legally allowed and appropriate.
The victim’s rights remain important, but the law also treats children in conflict with the law differently from adults.
XXVIII. If the Dummy Account Uses the Victim’s Photos
Unauthorized use of photos may support several claims depending on context.
Possible issues include:
- identity theft;
- privacy violation;
- cyberlibel if captions are defamatory;
- unjust vexation;
- intellectual property concerns if the victim owns the photo;
- sexual harassment if the photo is sexualized;
- anti-photo and video voyeurism if intimate images are involved.
The victim should preserve the original photo and proof that the dummy account copied or misused it.
XXIX. If the Dummy Account Posts Edited or Fake Images
Edited images, fake screenshots, deepfakes, and manipulated content can be legally serious.
Possible liabilities include:
- cyberlibel;
- falsification-related issues;
- identity theft;
- unjust vexation;
- sexual harassment;
- anti-photo and video voyeurism if intimate or sexual;
- child protection offenses if a minor is involved;
- civil damages.
The victim should preserve the edited content and, if possible, the original image or conversation that was manipulated.
XXX. If the Dummy Account Is Used for Scams
If a fake account uses the victim’s name or photo to ask for money, sell products, solicit donations, or borrow from friends, the issue may involve fraud.
Possible evidence includes:
- fake account profile;
- messages to victims;
- payment details used by the scammer;
- e-wallet or bank account numbers;
- names of persons who sent money;
- transaction receipts;
- delivery records;
- admissions or links to the suspect.
The victim whose identity was used should also warn contacts carefully, while avoiding defamatory statements against unverified suspects.
XXXI. If the Dummy Account Is Used to Harass a Public Figure or Official
Public officials and public figures may still have rights against cyberbullying, threats, and false statements. However, criticism of public conduct may be treated differently from purely private defamation.
Relevant factors include:
- whether the statement concerns public duties or private life;
- whether the statement is opinion or factual accusation;
- whether there is actual malice;
- whether the content is fair comment or malicious falsehood;
- whether threats or harassment are involved.
Freedom of expression protects criticism, but it does not protect true threats, malicious false factual accusations, identity theft, extortion, or unlawful harassment.
XXXII. Freedom of Speech vs. Cyberbullying
Not every negative post is illegal. Philippine law also protects speech, criticism, opinion, satire, and fair comment.
A post may be legally defensible if it is:
- true and made with good motives and justifiable ends;
- fair comment on matters of public interest;
- opinion rather than false factual assertion;
- made in good faith;
- not identifying a private person;
- not threatening or harassing;
- not invading privacy;
- not using stolen intimate content.
However, hiding behind a dummy account does not automatically convert unlawful conduct into protected speech.
XXXIII. Defenses in Cyberbullying or Cyberlibel Complaints
A respondent may raise defenses such as:
A. Truth
Truth may be a defense in defamation, especially if published with good motives and for justifiable ends.
B. Fair Comment
Statements of opinion on matters of public concern may be protected, provided they are not malicious false statements of fact.
C. Lack of Identification
The respondent may argue that the post did not identify the complainant.
D. No Publication
For libel, a purely private message sent only to the victim may lack publication, though other offenses may still apply.
E. No Malice
The respondent may argue good faith, lack of malice, or privileged communication.
F. Not the Account Owner
In dummy account cases, the respondent may deny control or authorship of the account.
G. Fabricated or Altered Evidence
The respondent may challenge screenshots, metadata, or authenticity.
H. Prescription
The respondent may argue that the complaint was filed too late.
XXXIV. Risks for Complainants
A complainant should avoid mistakes that weaken the case or create liability.
Avoid:
- hacking the dummy account;
- threatening the suspect;
- publicly naming a suspect without proof;
- posting revenge insults;
- editing screenshots;
- deleting relevant messages;
- creating a counter-dummy account;
- sending mobs to harass the suspect;
- fabricating evidence;
- spreading the offending content further;
- ignoring urgent safety threats.
A legally strong complaint is evidence-based, not revenge-based.
XXXV. Risks for Accused Persons
A person accused of operating a dummy account should not destroy evidence or threaten the complainant.
A respondent should:
- preserve devices and accounts;
- avoid contacting the complainant if advised not to;
- avoid deleting posts if preservation orders or complaints exist;
- gather proof of non-involvement;
- identify alibi or device access evidence;
- avoid admitting liability without advice;
- avoid retaliatory posts;
- seek legal assistance if criminal accusations are made.
Deleting content does not necessarily erase platform records and may be viewed negatively in some contexts.
XXXVI. Cyberbullying and Mental Health Harm
Cyberbullying can cause serious psychological harm, including anxiety, depression, panic attacks, social withdrawal, school avoidance, work disruption, and self-harm risk.
Victims should consider:
- telling trusted family or friends;
- consulting a counselor or mental health professional;
- informing school or workplace authorities;
- documenting emotional and practical effects;
- limiting exposure to harmful content;
- blocking accounts after preserving evidence;
- seeking urgent help if there is danger.
Psychological records may also support claims for damages, but the victim’s safety comes first.
XXXVII. Protection Orders and Urgent Safety Measures
In cases involving intimate partners, women, children, threats, stalking, or violence, a victim may need protection measures.
Possible remedies may include:
- barangay protection order in proper VAWC cases;
- temporary or permanent protection orders through court;
- school protective measures;
- workplace no-contact directives;
- police assistance;
- social welfare intervention;
- platform blocking and takedown;
- emergency relocation or safety planning.
The appropriate remedy depends on the relationship between parties and the nature of the threat.
XXXVIII. Remedies Sought in a Complaint
A cyberbullying or dummy account complaint may seek:
- identification of the account user;
- investigation;
- takedown or disabling of account;
- criminal prosecution;
- civil damages;
- protection order;
- school discipline;
- workplace discipline;
- apology or correction;
- non-contact undertaking;
- preservation of platform records;
- return or deletion of private images;
- injunction against further posting.
Not all remedies are available in every forum.
XXXIX. Sample Complaint Narrative Structure
A complaint affidavit should usually include:
- personal details of complainant;
- description of the dummy account;
- URLs, names, and screenshots;
- dates and times of incidents;
- exact words posted or sent;
- explanation of why the complainant is identifiable;
- explanation of why the statements are false or harmful;
- evidence of harm;
- identity of suspected offender, if known;
- basis for linking suspect to account;
- witnesses;
- request for investigation and appropriate charges.
The narrative should be chronological and factual.
XL. Practical Checklist for Victims
A victim should:
- do not immediately delete conversations;
- take full screenshots;
- capture URLs;
- make a screen recording;
- list witnesses;
- save the dummy account profile details;
- preserve the device used to receive messages;
- report the account to Facebook after preserving evidence;
- avoid public retaliation;
- seek help if threats involve safety;
- report to school, workplace, or authorities as appropriate;
- prepare a timeline;
- consult counsel for serious cases;
- request takedown for intimate images or minors immediately;
- keep records of emotional, financial, school, or work harm.
XLI. Practical Checklist for Parents
Parents of a cyberbullied child should:
- stay calm and avoid blaming the child;
- preserve evidence;
- avoid reposting harmful content;
- report to the school;
- request written action from school authorities;
- identify whether other students are involved;
- monitor the child’s mental health;
- report threats or sexual content immediately;
- consider counseling;
- preserve devices and accounts;
- coordinate with other parents carefully;
- avoid direct confrontations that may escalate.
XLII. Practical Checklist for Schools
Schools handling cyberbullying should:
- receive complaints seriously;
- preserve submitted evidence;
- protect the victim from retaliation;
- notify parents or guardians;
- conduct a fair investigation;
- identify whether school rules apply;
- impose proportionate discipline;
- provide counseling;
- coordinate with authorities for serious acts;
- respect data privacy;
- document all actions;
- avoid victim-blaming.
XLIII. Practical Checklist for Employers
Employers handling workplace-related cyberbullying should:
- preserve evidence;
- determine whether the conduct affects the workplace;
- apply company policy fairly;
- protect complainants and witnesses;
- avoid premature conclusions;
- conduct due process;
- address sexual harassment or discrimination if present;
- impose appropriate sanctions if proven;
- coordinate with law enforcement if needed;
- prevent retaliation.
XLIV. Common Myths
Myth 1: “A dummy account cannot be traced.”
False. It may be difficult, but not necessarily impossible. Technical records, admissions, writing style, linked accounts, payment trails, and witness evidence may identify the user.
Myth 2: “If it is posted online, it is not serious.”
False. Online posts can create criminal, civil, school, workplace, and administrative liability.
Myth 3: “Only public posts can be complained about.”
False. Private messages may not be libel if only sent to the victim, but they can still be threats, harassment, coercion, sexual harassment, or evidence of abuse.
Myth 4: “Deleting the post solves everything.”
False. Screenshots, witnesses, cached records, and platform data may remain.
Myth 5: “Truth always protects the poster.”
Not always. Truth may be relevant in defamation, but privacy invasion, harassment, threats, sexual image sharing, or malicious exposure can still be unlawful.
Myth 6: “Minors cannot be held responsible.”
False. Minors are treated under special rules, but serious acts may still lead to intervention, discipline, diversion, or legal consequences.
Myth 7: “A victim should immediately post the suspect’s name.”
Risky. Public accusations without sufficient proof may expose the victim to defamation or cyberlibel counterclaims.
XLV. Conclusion
Cyberbullying through a dummy Facebook account in the Philippines is not a single simple offense. It is a factual situation that may involve cyberlibel, identity theft, threats, unjust vexation, child protection laws, violence against women laws, sexual harassment, anti-voyeurism rules, data privacy, civil damages, school discipline, workplace sanctions, or administrative liability.
The strongest complaint is built on careful evidence preservation: screenshots, URLs, screen recordings, witness statements, timelines, and proof connecting the dummy account to the real person behind it. The victim should avoid retaliation, hacking, or public accusations without proof. Serious cases involving threats, minors, sexual images, extortion, or safety risks should be reported promptly.
A dummy account may hide a name, but it does not erase legal responsibility. In Philippine law, the focus remains on the act committed, the harm caused, the evidence preserved, and the ability to prove who was responsible.