Cyberbullying, Doxxing, and Online Threats in the Philippines

I. Introduction

Cyberbullying, doxxing, and online threats are common forms of digital abuse in the Philippines. They may occur through Facebook, TikTok, Instagram, X/Twitter, YouTube, Reddit, messaging apps, group chats, online games, forums, email, livestreams, school platforms, workplace channels, or anonymous accounts.

Although people often treat online abuse as “just internet drama,” Philippine law may treat it as a serious legal wrong. Depending on the facts, the conduct may give rise to criminal liability, civil liability, school or workplace discipline, data privacy complaints, protection orders, platform takedowns, and, in cases involving children, special child protection remedies.

There is no single law called the “Cyberbullying Act” that covers every possible online abuse situation. Instead, cyberbullying, doxxing, and online threats may fall under several laws, including the Cybercrime Prevention Act, the Revised Penal Code, the Data Privacy Act, the Anti-Bullying Act, the Safe Spaces Act, the Anti-Photo and Video Voyeurism Act, the Anti-VAWC Act, child protection laws, and civil law principles on damages.

The correct legal remedy depends on the content of the post or message, the identity of the victim, the identity of the offender, whether the offender is a minor or adult, whether threats were made, whether private information was exposed, whether intimate material was involved, and whether the abuse occurred in a school, workplace, domestic, sexual, political, or commercial context.


II. What Is Cyberbullying?

Cyberbullying is bullying or harassment committed through digital means. It generally involves repeated, targeted, hostile, humiliating, threatening, or abusive conduct online.

Examples include:

  • posting insults about a person;
  • spreading rumors online;
  • creating fake accounts to mock someone;
  • sending repeated abusive messages;
  • posting humiliating photos or videos;
  • excluding or shaming someone in group chats;
  • encouraging others to attack a person;
  • making memes to ridicule a victim;
  • impersonating the victim;
  • sending death threats or rape threats;
  • posting accusations without basis;
  • harassing a student through class group chats;
  • mocking a person’s disability, gender, religion, appearance, or family;
  • livestreaming humiliation;
  • brigading or mass-reporting;
  • encouraging self-harm;
  • blackmailing a person with private information;
  • using anonymous accounts to stalk or threaten.

Cyberbullying may be committed by classmates, strangers, former friends, romantic partners, co-workers, customers, political opponents, trolls, family members, or anonymous users.


III. What Is Doxxing?

Doxxing is the act of publicly exposing or spreading a person’s private or identifying information without consent, usually to shame, intimidate, harass, threaten, or endanger the person.

Doxxing may include publishing:

  • home address;
  • phone number;
  • email address;
  • workplace;
  • school;
  • class schedule;
  • daily routine;
  • government IDs;
  • passport details;
  • bank or e-wallet details;
  • family members’ names;
  • children’s names or school;
  • private photos;
  • medical information;
  • sexual orientation or gender identity;
  • private messages;
  • location data;
  • vehicle plate number;
  • IP address;
  • social media accounts;
  • employer information.

Doxxing is especially dangerous because it can lead to stalking, physical harm, identity theft, financial fraud, job loss, family harassment, or real-world violence.

Not every publication of information is automatically illegal. Some information may already be public, and some disclosures may be justified in official proceedings, journalism, or public interest contexts. But when personal information is disclosed without lawful basis and used to harass, threaten, shame, or endanger a person, legal liability may arise.


IV. What Are Online Threats?

Online threats are statements or conduct made through digital means that communicate an intention to harm a person, their family, property, livelihood, reputation, or safety.

Examples include:

  • “I will kill you.”
  • “I know where you live.”
  • “I will rape you.”
  • “I will burn your house.”
  • “I will post your private photos.”
  • “I will tell your employer lies about you.”
  • “I will send people to your house.”
  • “I will expose your address so people can deal with you.”
  • “I will hurt your child.”
  • sending photos of weapons;
  • sending the victim’s address with a threatening caption;
  • posting a bounty or encouraging others to attack;
  • threatening to publish intimate images;
  • threatening to hack accounts;
  • threatening to ruin someone’s business or job unless they comply.

Online threats may be punishable even if sent through private messages. A threat does not need to be carried out before it becomes legally relevant.


V. Applicable Philippine Laws

Cyberbullying, doxxing, and online threats may involve several laws at the same time.

A. Cybercrime Prevention Act

The Cybercrime Prevention Act of 2012, Republic Act No. 10175, is central because it applies when crimes are committed through a computer system or information and communications technology.

It may apply to:

  • cyber libel;
  • computer-related identity theft;
  • illegal access;
  • computer-related fraud;
  • unlawful interference with systems or data;
  • online threats connected with other crimes;
  • online publication of defamatory statements;
  • use of fake accounts to impersonate a person;
  • hacking accounts to obtain private information;
  • spreading malicious content through digital platforms.

If an act is already punishable under the Revised Penal Code or special laws and is committed through ICT, the Cybercrime Prevention Act may affect the penalty or treatment of the offense.


B. Revised Penal Code

The Revised Penal Code may apply to online abuse when the conduct corresponds to traditional criminal offenses, such as:

  • grave threats;
  • light threats;
  • grave coercions;
  • unjust vexation;
  • slander by deed;
  • libel;
  • alarms and scandals;
  • incriminatory machinations;
  • malicious mischief;
  • robbery or extortion-related threats;
  • other offenses depending on the facts.

When these acts are committed online, cybercrime implications may arise.


C. Data Privacy Act

The Data Privacy Act of 2012, Republic Act No. 10173, may apply to doxxing and unauthorized disclosure of personal information.

Personal information includes information from which a person’s identity is apparent or can reasonably be ascertained. Sensitive personal information includes matters such as age, marital status, health, education, genetic or sexual life, government IDs, and other protected data.

Doxxing may involve unlawful processing of personal data when someone collects, stores, shares, posts, or uses personal information without consent or lawful basis, especially where the purpose is harassment, intimidation, or harm.

The victim may consider filing a complaint with the National Privacy Commission if personal data was unlawfully processed or disclosed.


D. Anti-Bullying Act

The Anti-Bullying Act of 2013, Republic Act No. 10627, applies mainly in the school context. It requires elementary and secondary schools to adopt policies to prevent and address bullying, including cyberbullying.

Cyberbullying in schools may include:

  • bullying through social media;
  • abusive group chat messages;
  • humiliating posts by classmates;
  • sharing embarrassing photos;
  • creating fake pages against a student;
  • online threats among students;
  • digital harassment connected to school life.

The law is especially relevant where the victim and offender are students, or the bullying affects the school environment.


E. Safe Spaces Act

The Safe Spaces Act, Republic Act No. 11313, may apply to gender-based online sexual harassment. This is relevant when online abuse targets a person based on sex, gender, sexual orientation, gender identity, gender expression, or involves sexual harassment.

Examples include:

  • misogynistic attacks;
  • sexist slurs;
  • sending unwanted sexual messages;
  • making rape threats;
  • posting sexual comments;
  • sharing sexual rumors;
  • threatening to publish intimate photos;
  • gender-based humiliation;
  • stalking or harassment through digital platforms.

The Safe Spaces Act may apply in streets, public spaces, workplaces, schools, and online spaces.


F. Anti-Photo and Video Voyeurism Act

The Anti-Photo and Video Voyeurism Act, Republic Act No. 9995, may apply when someone records, shares, uploads, or threatens to distribute intimate photos or videos without consent.

This is relevant to:

  • revenge porn;
  • hidden camera recordings;
  • leaked intimate videos;
  • screenshots of private sexual video calls;
  • threats to upload intimate content;
  • sharing intimate material in group chats;
  • blackmail using private sexual images.

Even if the victim originally consented to the recording, sharing or distributing it without consent may still create liability.


G. Anti-Violence Against Women and Their Children Act

The Anti-VAWC Act, Republic Act No. 9262, may apply where online harassment, threats, humiliation, stalking, or economic abuse is committed by a husband, former husband, boyfriend, former boyfriend, live-in partner, former live-in partner, dating partner, sexual partner, or father of the woman’s child.

Examples include:

  • an ex-boyfriend threatening to leak intimate photos;
  • a husband posting humiliating accusations against his wife;
  • a former partner repeatedly messaging threats;
  • online stalking;
  • public shaming;
  • threats to take away children;
  • harassment through fake accounts;
  • use of online posts to cause emotional anguish.

VAWC may cover psychological violence committed online.


H. Child Protection Laws

If the victim is a minor, additional protections apply. Online abuse involving minors may fall under child protection laws, especially when it involves:

  • sexual exploitation;
  • grooming;
  • child pornography;
  • online sexual abuse;
  • coercion;
  • threats;
  • harassment by adults;
  • bullying by peers;
  • sharing intimate images of minors;
  • blackmail;
  • inducement to self-harm;
  • exploitation through livestreams or private chats.

Children are given special protection, and the identity of child victims must be handled confidentially.


I. Civil Code

Even where criminal liability is uncertain, the victim may seek civil remedies under the Civil Code.

Possible civil claims may include:

  • damages for injury to reputation;
  • damages for emotional distress;
  • damages for invasion of privacy;
  • damages for abuse of rights;
  • damages for bad faith;
  • injunction or takedown-related relief where available;
  • reimbursement of losses caused by the abuse;
  • moral damages;
  • exemplary damages.

Civil liability may exist even when a prosecutor does not file a criminal case.


VI. Cyberbullying as a Criminal Matter

Cyberbullying is not always one specific crime. The legal classification depends on the conduct.

A. Cyber libel

If cyberbullying involves defamatory accusations, such as calling someone a thief, scammer, adulterer, criminal, corrupt person, abuser, or fraudster, the victim may consider cyber libel.

Cyber libel requires defamatory imputation, publication, identifiability, malice, and use of a computer system.

B. Threats

If the cyberbullying includes threats to harm the victim, the offender may face charges for threats, possibly with cybercrime implications.

C. Unjust vexation

Repeated harassment, annoying messages, and abusive conduct may be considered unjust vexation depending on facts.

D. Identity theft

Creating fake accounts using another person’s identity may trigger computer-related identity theft or related offenses.

E. Data privacy violations

Publishing private information may trigger data privacy liability.

F. Gender-based online sexual harassment

Sexualized online attacks may trigger the Safe Spaces Act or other laws.

G. Child abuse or child protection violations

If the victim is a minor, school, child protection, or cybercrime remedies may apply.


VII. Doxxing Under Philippine Law

Doxxing is not always labeled by one specific offense, but it may be punishable or actionable under several legal theories.

A. Unlawful processing of personal information

Posting someone’s private personal information without consent may violate data privacy principles, especially where there is no lawful purpose.

B. Threats or harassment

Doxxing often comes with statements such as “puntahan ninyo,” “alam na this,” “pakitaan ng leksyon,” or “here is the address.” These may strengthen claims of threat, harassment, or incitement.

C. Cyber libel

If the doxxing post includes defamatory accusations, cyber libel may also apply.

D. Identity theft or fraud

If personal information is used to impersonate the victim, open fake accounts, access accounts, or commit fraud, additional liability may arise.

E. Stalking and safety risks

While Philippine law may not always use the same terminology as other jurisdictions, doxxing may be relevant evidence of harassment, threats, coercion, VAWC, or gender-based harassment.


VIII. Online Threats Under Philippine Law

Online threats may be legally serious even if phrased as jokes or memes.

The law may consider:

  • exact words used;
  • whether the victim was identified;
  • whether the offender had means to carry out the threat;
  • prior history between the parties;
  • whether the offender knew the victim’s address;
  • whether weapons were shown;
  • whether the threat was repeated;
  • whether the threat was public or private;
  • whether others were encouraged to act;
  • whether the victim reasonably feared harm;
  • whether the threat involved sexual violence, death, property damage, or exposure of private information.

A threat may be made through text, chat, email, social media post, voice message, video, image, emoji, meme, or coded language if the meaning is clear from context.


IX. Cyber Libel and Online Shaming

Many cyberbullying cases involve online shaming. The victim may be insulted, mocked, accused, or exposed to public ridicule.

Cyber libel may arise when online shaming includes specific defamatory allegations. Examples:

  • “She stole company money.”
  • “He is a rapist.”
  • “This doctor is fake.”
  • “This seller is a scammer.”
  • “This teacher abuses students.”
  • “This employee is corrupt.”
  • “This person has HIV.”
  • “This woman is a prostitute.”

The victim must show that the post was defamatory, published, identifiable, malicious, and made online.

However, not every insult is cyber libel. Vague insults, opinions, satire, or hyperbole may be treated differently. Still, repeated insulting behavior may support other claims such as unjust vexation, harassment, school discipline, workplace action, or civil damages.


X. Doxxing and Data Privacy

Doxxing often violates privacy because it exposes personal data outside its original context. Even if information was once available somewhere online, republishing it to invite harassment may still be legally problematic.

Examples of high-risk doxxing include:

  • posting someone’s home address after an argument;
  • exposing a person’s phone number and telling followers to call them;
  • posting a child’s school name;
  • uploading a person’s ID;
  • sharing private medical information;
  • publishing a victim’s location;
  • exposing private messages to shame someone;
  • publishing bank or e-wallet details;
  • posting family members’ information to pressure the victim.

A data privacy complaint may be especially strong when the information is sensitive, obtained without consent, used maliciously, or disclosed to a wide audience.


XI. Online Threats to Release Intimate Images

Threatening to release intimate images or videos is one of the most serious forms of online abuse. It may involve:

  • blackmail;
  • coercion;
  • psychological violence;
  • gender-based online sexual harassment;
  • photo or video voyeurism;
  • cybercrime;
  • VAWC, if committed by a partner or former partner;
  • child pornography or child protection laws, if the victim is a minor.

The victim should not negotiate endlessly with the offender. Evidence should be preserved, and urgent legal help should be sought.

Important evidence includes:

  • screenshots of the threat;
  • the account used;
  • date and time;
  • proof that the offender possesses or claims to possess the image;
  • prior relationship or communication;
  • any demand for money, sex, reconciliation, or silence;
  • any actual posting or sharing.

XII. Cyberbullying Involving Minors

Cyberbullying involving students or minors should be treated with urgency. It can lead to severe emotional harm, school avoidance, self-harm, or violence.

A. School responsibility

Schools are expected to have anti-bullying policies and procedures. They should receive complaints, investigate, protect the victim, discipline offenders where appropriate, and involve parents or guardians.

B. When the offender is a minor

If the offender is also a minor, juvenile justice and school discipline rules may apply. The goal may include accountability, intervention, rehabilitation, and protection of the victim.

C. When the offender is an adult

If an adult cyberbullies, grooms, threatens, sexually harasses, or exploits a minor online, the case may become much more serious and may involve child protection, cybercrime, sexual abuse, or exploitation laws.

D. Confidentiality

The identity of child victims should be protected. Parents, schools, barangay officials, and media should avoid posting the child’s name, photos, school, address, or details that identify the child.


XIII. Cyberbullying in Schools

School-related cyberbullying may occur:

  • in class group chats;
  • through fake student pages;
  • through anonymous confession pages;
  • on TikTok videos;
  • in gaming groups among classmates;
  • through edited photos;
  • in private messages;
  • on student council or organization channels;
  • through online class platforms.

A school should not dismiss the matter merely because the abuse happened “outside campus” if it affects the student’s safety, dignity, or school environment.

Parents should document the incidents and report them formally to the school, preferably in writing.


XIV. Cyberbullying in the Workplace

Online harassment may also occur in workplaces through:

  • work group chats;
  • Slack, Teams, or email;
  • social media posts by co-workers;
  • anonymous pages attacking employees;
  • sexualized jokes;
  • public shaming by supervisors;
  • doxxing of employees;
  • threats from customers;
  • defamatory posts by former employees.

Possible remedies include:

  • internal HR complaint;
  • workplace investigation;
  • disciplinary action;
  • Safe Spaces Act complaint;
  • labor complaint, depending on circumstances;
  • civil or criminal action;
  • data privacy complaint;
  • cybercrime complaint.

Employers should have policies against harassment, sexual harassment, discrimination, retaliation, and misuse of company communication channels.


XV. Gender-Based Online Harassment

Gender-based online harassment may target women, LGBTQ+ persons, or any person through sexual, sexist, misogynistic, homophobic, or transphobic abuse.

Examples include:

  • rape threats;
  • sexual insults;
  • unwanted sexual messages;
  • spreading sexual rumors;
  • deadnaming or outing;
  • threats to expose sexual orientation;
  • misogynistic harassment;
  • repeated sexual comments;
  • sending unsolicited explicit images;
  • demanding sexual favors online;
  • using gendered slurs;
  • creating sexualized memes;
  • threatening to release intimate images.

Such conduct may fall under the Safe Spaces Act, cybercrime laws, civil law, school rules, workplace rules, VAWC, or other special laws.


XVI. Online Harassment by a Former Partner

If online harassment is committed by a former partner, spouse, boyfriend, live-in partner, dating partner, or sexual partner, the Anti-VAWC Act may apply when the victim is a woman or her child.

Examples:

  • repeated threatening messages;
  • posting humiliating accusations;
  • stalking through fake accounts;
  • threatening to leak intimate photos;
  • harassing the woman’s employer;
  • messaging relatives to shame her;
  • threatening to take the children;
  • posting private conversations;
  • withholding support while harassing online.

Possible remedies include a barangay protection order, temporary protection order, permanent protection order, criminal complaint, and related cybercrime or privacy complaints.


XVII. Online Threats Against Journalists, Public Officials, and Public Figures

Online threats against journalists, public officials, activists, influencers, or public figures may raise public interest and freedom of expression issues, but threats are not protected merely because the victim is public.

Criticism is different from threatening harm. A person may criticize a public figure’s actions, policies, or statements, but threats to kill, rape, attack, doxx, or physically harm may be actionable.

Public figures may also file cyber libel cases, though commentary on matters of public concern may have stronger defenses when grounded in facts and made without malice.


XVIII. Anonymous Accounts and Trolls

Many online abusers use fake accounts. This does not make a case impossible, but it makes evidence gathering more important.

Potential evidence includes:

  • screenshots of the account;
  • profile URL;
  • username changes;
  • linked phone number or email if visible;
  • mutual contacts;
  • writing style;
  • admissions;
  • reused photos;
  • payment records;
  • IP or platform records obtained through legal process;
  • device evidence;
  • witnesses who know who controls the account;
  • pattern of posts matching the suspect.

Law enforcement or cybercrime investigators may assist where the case is serious.


XIX. Group Chats and Private Messages

Cyberbullying and threats in group chats may still have legal consequences.

A group chat may involve publication if defamatory content is seen by persons other than the victim. Threats sent privately may still be criminally relevant. Sexual harassment, doxxing, and intimidation can occur in private messages.

Evidence should show:

  • group chat name;
  • participants;
  • sender account;
  • date and time;
  • full conversation context;
  • exact words or images;
  • whether the victim was identified;
  • whether other people saw it.

XX. Evidence: What Victims Should Preserve

Evidence is often the strongest part of an online abuse case. Victims should preserve:

  • screenshots of posts and messages;
  • screen recordings;
  • URLs;
  • profile links;
  • account names and user IDs;
  • date and time stamps;
  • comments and replies;
  • shares and reposts;
  • group chat member lists;
  • photos and videos;
  • voice messages;
  • emails;
  • call logs;
  • text messages;
  • platform reports;
  • witnesses who saw the content;
  • proof of identity of the offender;
  • medical or psychological records if harm occurred;
  • work or school consequences;
  • evidence of financial loss;
  • evidence of threats or safety risk.

Screenshots should not be cropped unnecessarily. Full context matters.


XXI. How to Preserve Digital Evidence Properly

Victims should:

  1. Take screenshots showing the whole post or thread.
  2. Capture the URL or profile link.
  3. Record the date and time.
  4. Save original files if available.
  5. Use screen recording for disappearing content.
  6. Ask trusted witnesses to save what they saw.
  7. Report to the platform but preserve evidence first.
  8. Avoid editing screenshots except to redact sensitive information for public sharing.
  9. Keep backups in secure storage.
  10. Do not publicly repost intimate images or sensitive personal data.

For serious cases, a lawyer or investigator may help preserve evidence in a way that is more useful for court.


XXII. Reporting Channels

Victims may report to different channels depending on the situation.

A. Platform reporting

Report the post, account, or message to Facebook, TikTok, Instagram, X/Twitter, YouTube, messaging apps, or the relevant platform.

Request:

  • takedown;
  • account suspension;
  • preservation of records;
  • blocking of abusive users;
  • removal of non-consensual intimate content;
  • removal of personal data.

B. Barangay

The barangay may help with immediate safety, blotter, referral, or protection order issues, especially in VAWC or community-based harassment.

C. Police or cybercrime units

Report serious threats, identity theft, sextortion, hacking, doxxing, or organized harassment to law enforcement.

D. NBI Cybercrime Division

The NBI may assist in cybercrime investigations, especially where identification of anonymous accounts or technical investigation is needed.

E. Prosecutor’s office

A criminal complaint may be filed with the prosecutor through a complaint-affidavit and supporting evidence.

F. National Privacy Commission

For doxxing or unlawful disclosure of personal information, a privacy complaint may be considered.

G. School

For student cyberbullying, report to the class adviser, guidance office, principal, school head, or child protection committee.

H. Employer or HR

For workplace cyberbullying or online harassment by co-workers, report through HR, compliance, or grievance channels.

I. Court

For urgent protection, damages, injunctions, protection orders, or criminal proceedings, court remedies may be necessary.


XXIII. Demand Letters and Takedown Requests

A demand letter may request:

  • deletion of posts;
  • cessation of harassment;
  • public or private apology;
  • correction or retraction;
  • preservation of evidence;
  • non-contact undertaking;
  • damages;
  • warning of legal action.

A takedown request may be sent to the platform, page admin, website owner, or hosting provider.

Demand letters should be firm but not threatening beyond lawful remedies. They should avoid defamatory counter-statements.


XXIV. Protection Orders

Protection orders may be relevant in certain relationships or situations.

A. VAWC protection orders

If the abuse is committed by a husband, former husband, boyfriend, former boyfriend, live-in partner, dating partner, sexual partner, or father of the woman’s child, the victim may seek protection orders under R.A. 9262.

These may include orders to stop contact, harassment, stalking, threats, and other abusive conduct.

B. Child protection measures

If the victim is a child, social welfare, police, schools, and courts may take protective steps.

C. Workplace or school no-contact directives

Schools and employers may impose administrative no-contact or separation measures pending investigation.


XXV. Civil Remedies

Victims may pursue civil claims for damages where appropriate.

Possible damages include:

  • moral damages for mental anguish, humiliation, anxiety, and reputational harm;
  • actual damages for documented losses;
  • exemplary damages to deter similar conduct;
  • attorney’s fees where proper;
  • injunctive relief or orders to stop harmful conduct;
  • reimbursement for therapy, relocation, or security expenses.

Civil cases may be useful when the primary objective is compensation, correction, or cessation rather than criminal punishment.


XXVI. Criminal Remedies

Possible criminal complaints depend on the facts and may include:

  • cyber libel;
  • grave threats;
  • light threats;
  • unjust vexation;
  • coercion;
  • identity theft;
  • illegal access;
  • data interference;
  • computer-related fraud;
  • gender-based online sexual harassment;
  • photo and video voyeurism;
  • child pornography;
  • trafficking;
  • VAWC-related psychological violence;
  • child abuse;
  • other offenses.

The complaint should match the specific conduct. Mislabeling the case can delay resolution.


XXVII. Administrative Remedies

Administrative remedies may apply where the offender is:

  • student;
  • teacher;
  • school employee;
  • government employee;
  • licensed professional;
  • company employee;
  • officer of an organization;
  • public official;
  • platform user subject to community rules.

Administrative sanctions may include:

  • warning;
  • suspension;
  • expulsion;
  • termination;
  • reprimand;
  • license discipline;
  • removal from position;
  • no-contact orders;
  • mandatory counseling;
  • training or corrective measures.

Administrative cases may proceed separately from criminal or civil cases.


XXVIII. Platform Liability and Responsibility

Social media platforms may provide reporting tools, content moderation, account suspension, and privacy complaint processes. However, platforms are not always immediately liable for user content.

A platform may become more involved when:

  • it receives notice of illegal content;
  • the content violates its policies;
  • the post contains non-consensual intimate images;
  • the content exposes personal data;
  • the content threatens violence;
  • the account impersonates someone;
  • the content involves child sexual abuse material;
  • the abuse is coordinated or repeated.

Victims should report using the platform’s official tools and keep proof of the report.


XXIX. Doxxing Public Officials or Public Figures

Public officials and public figures have less privacy in matters connected to public functions, but they do not lose all privacy rights.

Publishing official contact information for legitimate public accountability may be different from posting a home address, family details, children’s school, private phone number, medical information, or location for harassment.

The context matters:

  • Is the information already official and public?
  • Is the disclosure necessary for public interest?
  • Is it being used to invite harassment?
  • Does it endanger family members?
  • Does it include sensitive personal information?
  • Is the post accompanied by threats?

Public interest is not a license to endanger people.


XXX. Doxxing of Private Individuals

Private individuals receive stronger privacy protection. Publishing their personal information without consent is risky, especially when done to shame, threaten, expose, or invite harassment.

Examples:

  • exposing a private person’s address after an argument;
  • posting a private person’s phone number in a public group;
  • sharing a student’s school and schedule;
  • posting a customer’s ID because of a dispute;
  • exposing a debtor’s information online;
  • publishing a private employee’s home address;
  • revealing medical or family information.

Even if the poster believes the victim “deserves it,” doxxing may still create liability.


XXXI. “Name and Shame” Posts

Many people post “name and shame” content to warn others. This can be lawful in some circumstances if it is truthful, fair, necessary, and made in good faith. But it becomes risky when it includes:

  • unsupported accusations;
  • insults;
  • private addresses or phone numbers;
  • threats;
  • calls for harassment;
  • photos of children;
  • intimate content;
  • medical information;
  • false claims;
  • edited screenshots;
  • exaggerated allegations.

A safer approach is to file a formal complaint, report to the platform, or post only neutral and verifiable facts without exposing unnecessary personal information.


XXXII. Online Threats and “Jokes”

Offenders often claim that threats were jokes. Whether that defense works depends on context.

Relevant questions include:

  • Were the words specific?
  • Did the victim reasonably fear harm?
  • Was there prior hostility?
  • Did the offender know the victim’s location?
  • Were weapons shown?
  • Was the threat repeated?
  • Were others encouraged to act?
  • Was the victim doxxed?
  • Was the post made in anger?
  • Was the “joke” directed at a specific person?

A threat does not become harmless merely because the offender later says it was a joke.


XXXIII. Encouraging Others to Harass

A person may incur liability not only by directly threatening a victim but also by encouraging others to attack, harass, message, stalk, report, shame, or harm the victim.

Examples:

  • “Here’s her number. Text her.”
  • “This is his address. You know what to do.”
  • “Mass report this account.”
  • “Flood his employer’s page.”
  • “Let’s ruin her business.”
  • “Message her family.”
  • “Go to his house.”
  • “Make him famous.”

This conduct may strengthen claims of malice, harassment, threat, or unlawful disclosure of personal information.


XXXIV. Cyberbullying and Mental Health

Cyberbullying can cause serious harm, including:

  • anxiety;
  • depression;
  • fear;
  • panic attacks;
  • sleep disturbance;
  • loss of employment;
  • school refusal;
  • social withdrawal;
  • reputational harm;
  • self-harm risk;
  • suicidal ideation.

Victims should seek support from trusted people, mental health professionals, school counselors, workplace assistance programs, or crisis services. Legal action should be accompanied by safety and emotional support.


XXXV. When the Victim Is at Immediate Risk

If online threats suggest immediate danger, the victim should prioritize safety.

Urgent steps include:

  1. Move to a safe location.
  2. Inform trusted family or friends.
  3. Report to police or barangay.
  4. Preserve evidence.
  5. Avoid meeting the offender.
  6. Secure home and workplace.
  7. Inform school or workplace security.
  8. Block only after preserving evidence, unless immediate blocking is necessary.
  9. Change passwords.
  10. Check whether location sharing is enabled.

Threats involving weapons, home addresses, children, sexual violence, or stalking should be treated seriously.


XXXVI. Digital Security Steps

Victims of cyberbullying or doxxing should secure their digital accounts.

Practical steps include:

  • change passwords;
  • use strong unique passwords;
  • enable two-factor authentication;
  • review account recovery emails and phone numbers;
  • log out of unknown devices;
  • check privacy settings;
  • remove public address or phone number;
  • disable location tagging;
  • check for spyware or suspicious apps;
  • secure e-wallets and banking apps;
  • warn family members not to respond to suspicious messages;
  • report impersonation accounts.

Digital safety is especially important when the offender is a former partner, co-worker, or someone who previously had access to devices or passwords.


XXXVII. Employer and School Notifications

If doxxing or threats may affect work or school, the victim may notify:

  • HR;
  • supervisor;
  • school principal;
  • guidance counselor;
  • security office;
  • child protection committee;
  • data protection officer;
  • legal department.

The notice should be factual and include evidence. The victim may request confidentiality, security assistance, no-contact measures, or documentation.


XXXVIII. Counterclaims and Risks for Victims

Victims should avoid responding in ways that create legal exposure.

Avoid:

  • posting the offender’s address or private information;
  • making unsupported accusations;
  • threatening violence;
  • sharing intimate images;
  • hacking accounts;
  • creating fake accounts to retaliate;
  • publicly posting unredacted IDs;
  • encouraging others to harass the offender;
  • editing evidence misleadingly.

A victim can pursue remedies without committing a separate wrong.


XXXIX. Defenses of the Accused

A person accused may raise defenses such as:

  • the statement was true;
  • the statement was opinion;
  • there was no threat;
  • the victim was not identifiable;
  • there was no publication;
  • there was no intent to harass;
  • the information was public and lawfully used;
  • consent was given;
  • the account was hacked;
  • the screenshots were edited;
  • the post was satire;
  • the accused did not own the account;
  • the accused did not disclose the information;
  • the act was privileged communication;
  • the complaint is retaliatory.

The strength of defenses depends on evidence.


XL. False Accusations and Misuse of Complaints

Cyberbullying, doxxing, and online threat complaints should not be used to silence legitimate criticism, consumer complaints, whistleblowing, labor grievances, or reports of abuse.

A complaint may be weak if:

  • the post is a fair factual report;
  • the accusation is supported by official records;
  • the statement was made to authorities, not publicly;
  • the complainant is using the case to intimidate a victim;
  • the alleged “doxxed” information was voluntarily published for business contact;
  • the supposed threat is not a threat when read in context;
  • the evidence is incomplete or misleading.

At the same time, legitimate grievances should be raised carefully and through lawful channels.


XLI. Public Interest and Free Speech

Freedom of expression is protected, but it is not absolute. The law may punish defamatory falsehoods, true threats, unlawful disclosure of personal data, sexual harassment, child exploitation, and privacy violations.

Public interest may protect:

  • fair criticism;
  • good-faith reporting;
  • consumer warnings based on facts;
  • discussion of official acts;
  • advocacy;
  • whistleblowing through proper channels;
  • fair comment.

Public interest is weaker when the post includes private addresses, family details, sexual humiliation, threats, or unsupported accusations.


XLII. Practical Checklist for Victims

A victim should consider the following:

  1. Preserve evidence immediately.
  2. Save URLs, screenshots, and account links.
  3. Do not engage emotionally with the offender.
  4. Report to the platform.
  5. Tell trusted people if safety is at risk.
  6. Secure accounts and privacy settings.
  7. Report to school, employer, barangay, police, or cybercrime authorities as appropriate.
  8. Consider a data privacy complaint for doxxing.
  9. Consider a criminal complaint for threats, cyber libel, harassment, or related offenses.
  10. Seek legal advice before posting publicly.
  11. Seek medical or psychological support if affected.
  12. Keep a timeline of incidents.
  13. Document financial, school, work, or emotional harm.
  14. Avoid retaliation.

XLIII. Practical Checklist for Parents of Child Victims

Parents should:

  1. Listen calmly and avoid blaming the child.
  2. Preserve screenshots and messages.
  3. Report to the school in writing.
  4. Ask the school for protective measures.
  5. Report serious threats to police or cybercrime authorities.
  6. Secure the child’s accounts.
  7. Monitor self-harm risk.
  8. Avoid publicly posting the child’s identity.
  9. Coordinate with guidance counselors or mental health professionals.
  10. Consider legal remedies if the abuse is severe or repeated.

XLIV. Practical Checklist for Schools

Schools should:

  1. Maintain an anti-bullying policy.
  2. Provide reporting channels.
  3. Act promptly on cyberbullying complaints.
  4. Preserve confidentiality.
  5. Protect the victim from retaliation.
  6. Investigate fairly.
  7. Notify parents or guardians as appropriate.
  8. Provide counseling.
  9. Impose discipline where warranted.
  10. Refer serious cases to authorities.
  11. Avoid forced reconciliation in serious abuse cases.
  12. Document all steps taken.

XLV. Practical Checklist for Employers

Employers should:

  1. Have anti-harassment and social media policies.
  2. Provide complaint channels.
  3. Investigate promptly and fairly.
  4. Preserve evidence.
  5. Protect complainants from retaliation.
  6. Address gender-based online harassment.
  7. Coordinate with data protection officers when personal data is involved.
  8. Impose disciplinary measures when justified.
  9. Support employee safety if threats are made.
  10. Avoid dismissing online harassment as purely personal if it affects the workplace.

XLVI. Practical Checklist for Accused Persons

A person accused of cyberbullying, doxxing, or online threats should:

  1. Stop posting about the complainant.
  2. Preserve full conversation context.
  3. Do not delete evidence without legal advice.
  4. Do not contact the complainant if told to stop.
  5. Do not retaliate.
  6. Consult a lawyer.
  7. Prepare evidence of truth, consent, context, or lack of intent.
  8. Comply with subpoenas, school notices, HR investigations, or court orders.
  9. Consider apology, takedown, or settlement where appropriate.
  10. Avoid public commentary that worsens the case.

XLVII. Drafting a Complaint-Affidavit

A complaint-affidavit should include:

  • complainant’s identity;
  • respondent’s known identity or account;
  • relationship between parties;
  • dates and times of incidents;
  • exact words or acts complained of;
  • screenshots and URLs;
  • explanation of why the complainant is identifiable;
  • effect on the complainant;
  • evidence of threat, harassment, or doxxing;
  • witness names;
  • platform reports;
  • prior incidents;
  • requested legal action.

The complaint should be specific. General statements such as “I was cyberbullied” are less useful than a detailed timeline with evidence.


XLVIII. Demand Letter Contents

A demand letter may include:

  • identification of offending posts or messages;
  • demand to stop harassment;
  • demand to delete or take down content;
  • demand to stop sharing personal information;
  • demand to preserve evidence;
  • demand for apology or retraction;
  • demand for damages, if appropriate;
  • warning of legal action;
  • deadline for compliance.

The tone should be professional. Threatening unlawful retaliation should be avoided.


XLIX. Common Misconceptions

“It is online, so it is not real.”

False. Online abuse can create criminal, civil, administrative, and privacy liability.

“It was only a private message.”

False. Threats, harassment, and sexual abuse can occur in private messages.

“It is not illegal because the information was already online.”

Not always. Republishing personal information to harass or endanger someone may still be unlawful.

“It was just a joke.”

A threat or sexual harassment does not automatically become lawful because it is called a joke.

“Cyberbullying only applies to children.”

False. School cyberbullying laws focus on students, but adults may still have remedies under criminal, civil, privacy, workplace, and other laws.

“I can post someone’s address if they wronged me.”

Dangerous and potentially unlawful. Use formal remedies instead.

“Deleting the post solves everything.”

Not necessarily. Liability may already have arisen, but deletion may help reduce harm.

“Anonymous accounts cannot be traced.”

Not always. Digital and circumstantial evidence may identify the user.


L. Conclusion

Cyberbullying, doxxing, and online threats in the Philippines may involve multiple legal remedies. The proper case may be cyber libel, threats, unjust vexation, data privacy violation, gender-based online sexual harassment, VAWC, child protection violation, photo or video voyeurism, identity theft, civil damages, school discipline, workplace discipline, or another remedy depending on the facts.

The key legal questions are: What exactly was posted or sent? Who was targeted? Was the victim identifiable? Was private information exposed? Was there a threat? Was the victim a child? Was there sexual or gender-based harassment? Was the offender a partner, classmate, co-worker, stranger, or anonymous account? What evidence exists?

For victims, the priorities are safety, evidence preservation, platform reporting, account security, and choosing the correct legal remedy. For accused persons, the priorities are stopping harmful conduct, preserving context, avoiding retaliation, and responding through proper legal channels. Online conduct is not separate from real life. In the Philippines, harmful digital behavior can carry serious legal consequences.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.