Cyberbullying Legal Remedies in the Philippines

Introduction

Cyberbullying is one of the most common modern forms of harassment in the Philippines. It may happen through Facebook, Messenger, TikTok, Instagram, X, YouTube, group chats, school platforms, gaming communities, email, text messages, anonymous confession pages, fake accounts, or other online spaces. It can involve insults, threats, humiliation, spreading private information, posting edited photos, impersonation, sexual shaming, repeated unwanted messages, exclusion, blackmail, or public ridicule.

Although the Philippines does not have one single law called the “Cyberbullying Act” that covers every situation, cyberbullying may give rise to several legal remedies depending on the facts. These remedies may be criminal, civil, administrative, school-based, workplace-based, or protective in nature.

The correct legal remedy depends on important factors such as:

  • whether the victim is a minor;
  • whether the bully is a student, employee, stranger, former partner, or anonymous account;
  • whether threats, sexual content, identity theft, extortion, or defamatory statements are involved;
  • whether the act happened in a school, workplace, public platform, or private chat;
  • whether the content is true, false, private, obscene, manipulated, or malicious;
  • whether the bullying caused mental distress, reputational damage, fear, or financial harm.

Cyberbullying is not “just online drama.” In many cases, it may be punishable under Philippine law.


I. Meaning of Cyberbullying

Cyberbullying generally refers to bullying, harassment, intimidation, humiliation, or abuse committed through electronic technology or online communication.

It may include:

  1. sending repeated insulting or degrading messages;
  2. posting humiliating photos, videos, or captions;
  3. creating fake accounts to mock or impersonate someone;
  4. spreading rumors online;
  5. publishing private conversations or screenshots;
  6. threatening harm through chat or posts;
  7. encouraging others to harass a person;
  8. posting sexual comments, images, or edited photos;
  9. exposing private information such as address, phone number, school, workplace, or family details;
  10. making defamatory accusations online;
  11. blackmailing someone with photos, videos, or secrets;
  12. excluding or targeting classmates in group chats;
  13. using anonymous pages to shame a student or employee;
  14. repeatedly tagging, mentioning, or messaging a person to cause distress.

In law, the word “cyberbullying” may not always be the exact offense charged. Instead, the same conduct may be prosecuted as cyber libel, unjust vexation, grave threats, light threats, slander by deed, identity theft, violation of privacy, child abuse, gender-based online sexual harassment, violence against women, or another offense.


II. Main Laws That May Apply to Cyberbullying in the Philippines

1. Republic Act No. 10627, or the Anti-Bullying Act of 2013

The Anti-Bullying Act applies mainly to basic education schools. It requires elementary and secondary schools to adopt policies to prevent and address bullying, including cyberbullying.

This law is especially relevant when the victim and offender are students in kindergarten, elementary, junior high school, or senior high school.

Cyberbullying under school policy may include bullying committed through technology or electronic means.

Remedies under the Anti-Bullying Act

A student victim may seek:

  • school investigation;
  • disciplinary action against the bully;
  • protection measures;
  • counseling;
  • parental conferences;
  • intervention programs;
  • referral to appropriate authorities if the act may be criminal;
  • assistance from the Department of Education or school administration.

The Anti-Bullying Act is not mainly a criminal law against the child bully. It is primarily a school governance and child protection law requiring schools to prevent and respond to bullying.


2. Republic Act No. 10175, or the Cybercrime Prevention Act of 2012

The Cybercrime Prevention Act is one of the most important laws in cyberbullying cases. It punishes certain crimes committed through information and communications technology.

Relevant offenses may include:

  • cyber libel;
  • identity theft;
  • illegal access;
  • cybersex;
  • child pornography-related acts;
  • computer-related fraud;
  • computer-related forgery;
  • aiding or abetting cybercrime;
  • attempt to commit cybercrime.

It also increases penalties for certain crimes when committed through information and communications technology.

For cyberbullying, the most common cybercrime issue is cyber libel.


3. Revised Penal Code

Many cyberbullying acts may still fall under traditional crimes in the Revised Penal Code, especially when committed through online messages, posts, videos, images, or digital communication.

Possible offenses include:

  • libel;
  • grave threats;
  • light threats;
  • unjust vexation;
  • slander;
  • intriguing against honor;
  • grave coercion;
  • alarms and scandals;
  • acts of lasciviousness, depending on facts;
  • blackmail-related conduct;
  • falsification, depending on documents or identity used.

The use of technology does not automatically remove the act from ordinary criminal law. It may instead make the act punishable under both traditional and cybercrime frameworks.


4. Civil Code of the Philippines

Cyberbullying may also create civil liability. Even if a criminal case is not filed, or even if the act does not clearly fall under a specific crime, the victim may seek damages under civil law if there is a wrongful act causing injury.

Possible civil bases include:

  • abuse of rights;
  • acts contrary to morals, good customs, or public policy;
  • defamation;
  • invasion of privacy;
  • emotional distress;
  • damage to reputation;
  • tortious conduct;
  • liability of parents or guardians for minors, depending on circumstances;
  • liability of schools, employers, or other persons if negligence is proven.

Civil remedies may include moral damages, exemplary damages, actual damages, attorney’s fees, and injunction in proper cases.


5. Republic Act No. 11313, or the Safe Spaces Act

The Safe Spaces Act punishes gender-based sexual harassment in streets, public spaces, online spaces, workplaces, educational institutions, and training institutions.

For cyberbullying, this law is important when the online harassment is gender-based or sexual in nature.

Examples may include:

  • misogynistic or homophobic online attacks;
  • sexual comments;
  • unwanted sexual messages;
  • threats to expose sexual photos;
  • sexist insults;
  • stalking through online platforms;
  • uploading or sharing sexualized content;
  • creating fake accounts for sexual harassment;
  • repeated unwanted sexual remarks or advances online.

The Safe Spaces Act recognizes online sexual harassment and provides remedies for victims.


6. Republic Act No. 9262, or the Anti-Violence Against Women and Their Children Act

RA 9262 may apply when cyberbullying is committed by a current or former husband, boyfriend, live-in partner, dating partner, or person with whom the woman has or had a sexual or dating relationship.

Cyberbullying by an intimate partner may amount to psychological violence, harassment, threats, emotional abuse, stalking, public shaming, or coercive control.

Examples include:

  • threatening to post intimate photos;
  • humiliating a former partner online;
  • repeatedly messaging abusive insults;
  • spreading accusations of infidelity;
  • monitoring online activity;
  • using fake accounts to harass;
  • threatening the woman or her child;
  • publishing private conversations to shame her;
  • forcing reconciliation through online intimidation.

RA 9262 can provide criminal remedies and protection orders.


7. Republic Act No. 7610, or the Special Protection of Children Against Abuse, Exploitation and Discrimination Act

RA 7610 may apply when the victim is a child and the cyberbullying involves abuse, cruelty, exploitation, discrimination, or acts prejudicial to the child’s development.

Cyberbullying involving a minor may be treated more seriously when it causes psychological harm or involves sexual exploitation, degrading treatment, or repeated abuse.


8. Republic Act No. 11930, or the Anti-Online Sexual Abuse or Exploitation of Children and Anti-Child Sexual Abuse or Exploitation Materials Act

This law is relevant when cyberbullying involves sexual images, videos, grooming, coercion, sexual exploitation, or sharing of sexualized material involving minors.

Examples include:

  • threatening a minor with exposure of sexual images;
  • sharing nude or sexualized images of a minor;
  • coercing a child to send intimate photos;
  • sexual blackmail or sextortion against a minor;
  • live-streamed sexual abuse;
  • using fake accounts to obtain sexual material from a child.

This is a serious criminal matter and should be reported immediately.


9. Data Privacy Act of 2012

The Data Privacy Act may apply when cyberbullying involves unauthorized collection, use, disclosure, or posting of personal information.

Examples include:

  • posting someone’s address, phone number, school, workplace, medical information, or private IDs;
  • sharing private messages containing personal data;
  • exposing sensitive personal information;
  • using personal information to harass or threaten;
  • doxxing.

Not every online insult is a data privacy violation. But when personal data is unlawfully processed or disclosed, the Data Privacy Act may be relevant.


10. School, Workplace, and Platform Rules

Apart from statutes, cyberbullying may violate:

  • school handbooks;
  • student codes of conduct;
  • workplace policies;
  • anti-sexual harassment policies;
  • social media platform rules;
  • professional ethics rules;
  • company disciplinary rules;
  • university student discipline rules.

These may provide faster practical remedies, such as takedown requests, suspension, expulsion, workplace discipline, no-contact orders, or administrative complaints.


III. Cyber Libel as a Remedy

Cyber libel is one of the most commonly invoked legal remedies for cyberbullying in the Philippines.

What is cyber libel?

Cyber libel is libel committed through a computer system or similar means. Libel generally involves a public and malicious imputation of a crime, vice, defect, act, condition, status, or circumstance that tends to dishonor, discredit, or contempt a person.

In cyberbullying cases, cyber libel may arise from:

  • Facebook posts accusing someone of theft, cheating, immorality, or fraud;
  • TikTok videos mocking and accusing a person of misconduct;
  • defamatory posts in group chats or public pages;
  • edited photos with defamatory captions;
  • anonymous confession posts attacking a named person;
  • online reviews containing false personal accusations;
  • public allegations of sexual misconduct, corruption, or criminal acts without proof.

Elements usually considered

A cyber libel complaint generally requires showing:

  1. there was a defamatory statement;
  2. the statement identified or was clearly about the victim;
  3. the statement was published online or through a computer system;
  4. malice is present or presumed;
  5. the statement caused dishonor, discredit, contempt, or reputational harm.

Public post versus private message

A public post, shared post, comment thread, group page, or group chat with multiple recipients may satisfy publication.

A one-to-one private message may not always qualify as libel because libel requires publication to a third person. However, a private message may still be relevant to threats, harassment, unjust vexation, coercion, or other offenses.

Opinion versus defamatory accusation

Not every insulting opinion is libel. Statements such as “I dislike this person” may not be actionable in the same way as a false factual accusation such as “this person stole money.”

Courts and prosecutors usually examine whether the post asserts facts, merely expresses opinion, uses satire, or contains malicious accusations.

Truth is not always a complete shield

In defamation cases, truth may be relevant, but the manner, motive, public interest, and malice may still matter. A person cannot assume that posting embarrassing information is automatically lawful just because it has some factual basis.


IV. Threats, Harassment, and Intimidation Online

Cyberbullying may involve threats rather than defamatory statements.

Grave threats

A person may commit grave threats when they threaten another with harm amounting to a crime, such as killing, injuring, kidnapping, or destroying property, depending on the circumstances.

Examples:

  • “I will kill you after school.”
  • “I will stab you when I see you.”
  • “I will burn your house.”
  • “I will hurt your child.”

When sent through chat, text, email, or social media, screenshots and account details become important evidence.

Light threats

A less serious threat may still be punishable if it causes fear or intimidation.

Grave coercion

If the bully uses threats, violence, or intimidation to force the victim to do something against their will, or prevent them from doing something lawful, grave coercion may apply.

Example:

  • “Send me money or I will post your photos.”
  • “Break up with him or I will expose your secret.”
  • “Apologize publicly or we will destroy your reputation.”

Unjust vexation

Unjust vexation may apply to acts that cause annoyance, irritation, torment, distress, or disturbance without necessarily fitting into a more specific offense.

Examples:

  • repeated insulting messages;
  • persistent harassment from fake accounts;
  • coordinated online attacks;
  • repeated tagging or posting meant to torment;
  • prank posts that cause distress.

Unjust vexation is often considered in harassment situations, but the correct charge depends on facts.


V. Gender-Based Online Sexual Harassment

Cyberbullying becomes more serious when it is gender-based or sexual.

Examples

Gender-based online sexual harassment may include:

  • unwanted sexual comments through chat;
  • sending sexually explicit messages or images;
  • making sexual remarks on posts;
  • threatening to upload intimate photos;
  • spreading sexual rumors;
  • creating sexually humiliating memes;
  • posting edited nude images;
  • using gender-based slurs;
  • harassing someone because of gender identity or sexual orientation;
  • cyberstalking with sexual intent;
  • repeatedly sending unwanted romantic or sexual advances online.

Legal remedies

Possible remedies include:

  • criminal complaint under the Safe Spaces Act;
  • complaint with school or employer;
  • complaint with barangay, police, prosecutor, or appropriate office;
  • protection measures;
  • takedown reports to the platform;
  • civil damages where applicable;
  • VAWC remedies if the offender is an intimate partner;
  • child protection remedies if the victim is a minor.

VI. Cyberbullying Against Minors

Cyberbullying involving minors requires special care. The victim may be a minor, the bully may be a minor, or both may be minors.

A. If the victim is a minor

Legal remedies may include:

  • school complaint under the Anti-Bullying Act;
  • child protection referral;
  • complaint under RA 7610 if abuse or cruelty is involved;
  • complaint under online sexual abuse laws if sexual material is involved;
  • cybercrime complaint if applicable;
  • civil action through parents or guardians;
  • request for counseling and protective measures.

Parents, guardians, teachers, and school officials should preserve evidence and report serious harm immediately.

B. If the bully is also a minor

When the offender is a child, the Juvenile Justice and Welfare Act may apply. The child may be subject to intervention, diversion, counseling, school discipline, or other measures depending on age and seriousness of the offense.

This does not mean the victim has no remedy. It means the legal system treats child offenders differently from adult offenders.

C. School responsibility

Schools are expected to have anti-bullying policies, reporting mechanisms, investigation procedures, disciplinary rules, and intervention programs. Schools may be held accountable administratively if they ignore bullying complaints or fail to implement required policies.


VII. Cyberbullying in Schools

Cyberbullying in school settings is common because students interact through class group chats, social media pages, online learning platforms, anonymous confession pages, and messaging apps.

Examples

  • classmates create a group chat to mock a student;
  • edited photos of a student are circulated;
  • anonymous posts shame a student;
  • a student is repeatedly tagged in humiliating memes;
  • classmates spread rumors about sexuality, pregnancy, grades, family background, or appearance;
  • students exclude and publicly ridicule another student;
  • private conversations are screenshotted and posted.

School remedies

A student or parent may:

  1. report the incident to the class adviser;
  2. report to the guidance office;
  3. file a written complaint with the principal or school head;
  4. request protection from retaliation;
  5. request removal of posts or group content;
  6. ask for disciplinary action;
  7. request counseling for victim and offender;
  8. escalate to DepEd or appropriate school authority;
  9. report to law enforcement if threats, sexual exploitation, extortion, or severe abuse is involved.

What schools should do

Schools should:

  • receive and document complaints;
  • protect the victim;
  • notify parents or guardians;
  • investigate promptly;
  • require written statements;
  • preserve digital evidence;
  • discipline students according to rules;
  • provide intervention;
  • avoid victim-blaming;
  • prevent retaliation;
  • coordinate with authorities when necessary.

VIII. Cyberbullying in the Workplace

Cyberbullying may also occur in employment settings.

Examples

  • coworkers mock an employee in group chats;
  • a supervisor humiliates an employee online;
  • false accusations are spread through company platforms;
  • private work messages are exposed to shame someone;
  • employees create memes ridiculing a coworker;
  • sexual comments are made in workplace chats;
  • threats are sent through company communication tools;
  • doxxing or personal attacks occur in work-related groups.

Possible remedies

An employee may:

  • file an internal HR complaint;
  • invoke company anti-harassment policies;
  • file a complaint under workplace sexual harassment rules;
  • file a Safe Spaces Act complaint, if gender-based;
  • file a labor complaint if the employer fails to act or if constructive dismissal or hostile work environment issues arise;
  • file criminal complaints for cyber libel, threats, unjust vexation, or other offenses;
  • file a civil action for damages.

Employer responsibility

Employers should respond to workplace cyberbullying by investigating, protecting complainants, disciplining offenders, and preventing retaliation. Failure to act may expose the employer to administrative, labor, or civil consequences depending on the facts.


IX. Cyberbullying by a Former Partner or Romantic Partner

Cyberbullying by a former partner is common and may be legally serious.

Examples

  • threatening to leak intimate photos;
  • posting humiliating accusations after breakup;
  • sending repeated abusive messages;
  • using fake accounts to monitor or harass;
  • contacting the victim’s family, employer, or friends to shame them;
  • spreading sexual rumors;
  • threatening suicide or harm to manipulate the victim;
  • demanding money, sex, or reconciliation;
  • exposing private chats.

Legal remedies

If the victim is a woman and the offender is a current or former intimate partner, RA 9262 may apply. Remedies may include:

  • Barangay Protection Order;
  • Temporary Protection Order;
  • Permanent Protection Order;
  • criminal complaint for psychological violence;
  • order to stop harassment;
  • order to stay away or cease contact;
  • support and custody-related relief, where applicable.

Other remedies may include cyber libel, grave threats, unjust vexation, coercion, Safe Spaces Act violations, or civil damages.


X. Doxxing and Exposure of Personal Information

Doxxing is the publication of someone’s personal information to harass, intimidate, or expose them to harm.

Examples include posting:

  • home address;
  • phone number;
  • school or workplace;
  • government ID;
  • private photos;
  • medical information;
  • family information;
  • financial details;
  • location;
  • private messages.

Possible remedies may include:

  • Data Privacy Act complaint;
  • criminal complaint if threats or harassment are involved;
  • civil damages;
  • platform takedown request;
  • school or workplace complaint;
  • protection order if connected to domestic or gender-based violence.

Doxxing can be especially dangerous when it encourages others to harass or physically harm the victim.


XI. Fake Accounts, Impersonation, and Identity Theft

Creating fake accounts to bully someone may lead to legal consequences.

Examples

  • creating a fake Facebook account using the victim’s name and photo;
  • pretending to be the victim and sending messages;
  • posting defamatory or sexual content under the victim’s identity;
  • using the victim’s photos for catfishing;
  • creating parody pages that go beyond satire and become harassment;
  • using the victim’s information to damage reputation.

Possible offenses

Depending on the facts, the offender may be liable for:

  • computer-related identity theft;
  • cyber libel;
  • unjust vexation;
  • data privacy violations;
  • gender-based online sexual harassment;
  • fraud or forgery-related offenses;
  • civil damages.

The victim should report the fake account to the platform and preserve evidence before the account disappears.


XII. Group Chats and Private Online Spaces

Cyberbullying often happens in group chats rather than public posts.

Legal significance

A group chat may still involve publication if defamatory statements are read by third persons. It may also serve as evidence of threats, harassment, conspiracy, coordinated bullying, or school misconduct.

Examples

  • classmates mock a student in a class group chat;
  • coworkers insult an employee in a work chat;
  • friends share private photos without consent;
  • group members encourage harassment of a person;
  • a person is removed from a group to humiliate them;
  • screenshots are circulated to shame someone.

Private setting does not automatically make the conduct lawful. Harmful messages in group chats may still have legal consequences.


XIII. Anonymous Posts and Confession Pages

Anonymous confession pages are common sources of cyberbullying.

Examples

  • “blind item” posts clearly identifying a student;
  • anonymous accusations of cheating, promiscuity, theft, or misconduct;
  • posts exposing private relationships;
  • edited photos or memes;
  • school gossip pages encouraging comments.

Even if the post does not name the victim, liability may arise if people can identify the victim from the description, initials, photo, school section, workplace, or context.

Page administrators may also face issues if they publish, approve, encourage, or refuse to remove defamatory or harmful content, depending on their participation and knowledge.


XIV. Evidence in Cyberbullying Cases

Evidence is critical. Online content can be deleted quickly. Victims should preserve evidence before reporting or confronting the bully.

Important evidence includes:

  1. screenshots of posts, comments, messages, and profiles;
  2. screen recordings showing the account, URL, date, and content;
  3. links to posts or pages;
  4. account usernames, handles, profile URLs, and user IDs;
  5. dates and times of posts;
  6. names of witnesses who saw the content;
  7. copies of group chat messages;
  8. proof of identity of the offender;
  9. proof of harm, such as medical certificates, counseling records, school reports, or work consequences;
  10. takedown reports and platform responses;
  11. affidavits of witnesses;
  12. notarized printouts or certified digital evidence, when needed.

Best practice for screenshots

A screenshot should ideally show:

  • the full content;
  • the account name and profile photo;
  • date and time;
  • URL or platform;
  • comments and reactions, if relevant;
  • identifying context;
  • the device date/time if possible.

Screen recording may be better because it shows the user navigating from the profile or page to the offending post.

Do not edit evidence

Victims should avoid cropping, editing, or altering screenshots. Edited evidence may be challenged. Keep original files.

Preserve URLs

Even if the post is later deleted, the URL may help investigators or platforms trace it.

Witnesses matter

If other people saw the post, ask them to save screenshots and provide statements. For group chats, other members may be witnesses.


XV. Where to Report Cyberbullying

Depending on the facts, a victim may report to one or more of the following:

1. School authorities

For student bullying, report to:

  • class adviser;
  • guidance counselor;
  • principal;
  • school head;
  • child protection committee;
  • student discipline office;
  • DepEd office, for basic education concerns.

2. Barangay

For some disputes, the barangay may help with mediation or documentation. However, serious cybercrime, child sexual exploitation, threats, or VAWC matters should not be treated as simple neighborhood disputes.

3. Philippine National Police

The PNP may receive complaints involving cybercrime, threats, harassment, child exploitation, and related offenses.

4. National Bureau of Investigation

The NBI Cybercrime Division may assist in cybercrime complaints, digital evidence, tracing, and investigation.

5. Office of the City or Provincial Prosecutor

Criminal complaints may be filed with the prosecutor’s office for preliminary investigation, depending on the offense.

6. National Privacy Commission

If the issue involves unlawful processing or disclosure of personal information, a complaint may be filed with the National Privacy Commission.

7. Commission on Human Rights or women and child protection desks

For gender-based violence, child abuse, and serious harassment, specialized offices may assist.

8. Employer or HR office

For workplace cyberbullying, file an internal written complaint.

9. Social media platforms

Report the post, account, page, or content for violation of platform rules. Platform reports can remove content quickly but do not replace legal remedies.


XVI. Criminal Remedies

Cyberbullying may result in criminal prosecution when it falls under a punishable offense.

Possible criminal charges include:

Conduct Possible Legal Characterization
False defamatory online post Cyber libel
Threatening to kill or injure Grave threats or light threats
Repeated online harassment Unjust vexation or other offense
Fake account using victim’s identity Identity theft
Sexual harassment online Safe Spaces Act violation
Posting intimate images Possible sexual harassment, privacy, VAWC, or child protection offense
Threatening to leak nudes Coercion, threats, VAWC, Safe Spaces Act, or child exploitation law
Harassing former partner VAWC, cyber libel, threats, unjust vexation
Sharing child sexual images Serious child sexual exploitation offense
Posting private data Possible Data Privacy Act violation
Coordinated defamatory campaign Cyber libel and related offenses

A criminal case is not based on the label “cyberbullying” alone. The complaint should identify the specific unlawful acts.


XVII. Civil Remedies

A victim may file a civil action for damages if cyberbullying caused injury.

Types of damages

Possible damages include:

1. Actual damages

These compensate for proven financial loss, such as therapy expenses, medical bills, lost income, school transfer costs, or business losses.

2. Moral damages

These compensate for mental anguish, serious anxiety, wounded feelings, social humiliation, and reputational harm.

3. Exemplary damages

These may be awarded to set an example or deter similar conduct, in proper cases.

4. Attorney’s fees and litigation expenses

These may be recovered when allowed by law and supported by the case.

Civil action with or separate from criminal case

Civil liability may be included in a criminal action, or a separate civil action may be considered depending on legal strategy.


XVIII. Protection Orders

Protection orders are especially important where cyberbullying involves domestic violence, stalking, threats, or harassment by an intimate partner.

Under RA 9262

A woman victim may seek:

  • Barangay Protection Order;
  • Temporary Protection Order;
  • Permanent Protection Order.

These may include orders preventing contact, harassment, threats, communication, or proximity.

In other cases

Courts may issue injunctive relief in proper civil cases. Schools and workplaces may also issue administrative no-contact measures.


XIX. Takedown and Content Removal

Victims usually want the harmful post removed quickly.

Options

  1. report the content to the platform;
  2. ask the poster to delete it, when safe;
  3. request school or employer intervention;
  4. include takedown as part of settlement;
  5. request authorities to preserve or investigate content;
  6. seek court relief in proper cases.

Important warning

Before takedown, preserve evidence. Once content is deleted, it may become harder to prove the case.


XX. Barangay Conciliation

Some disputes between individuals may go through barangay conciliation before court action, depending on residence, offense, penalty, and legal requirements.

However, not all cyberbullying cases are appropriate for barangay settlement. Cases involving serious offenses, minors, sexual exploitation, VAWC, threats to life, or cybercrime investigation may require direct referral to police, prosecutor, or specialized agencies.

Victims should be careful about informal settlements that simply force them to “move on” without removing content, preventing retaliation, or preserving legal rights.


XXI. Liability of Parents for Cyberbullying by Minors

When minors commit cyberbullying, parents may face civil consequences depending on supervision, negligence, and applicable law. Schools may also impose discipline.

Parents should take cyberbullying complaints seriously. A child’s online conduct can result in school discipline, counseling, police involvement, civil liability, and long-term records.

Parents of the victim should document the incident, coordinate with the school, and avoid retaliatory posting.


XXII. Liability of Schools

Schools may be held administratively accountable if they fail to adopt anti-bullying policies or ignore complaints. A school that receives a cyberbullying complaint should not dismiss it simply because it happened online or outside school hours, especially if it affects the student’s school environment.

The connection to school may exist when:

  • the offender and victim are students of the same school;
  • the bullying affects class participation;
  • the bullying occurs in class group chats;
  • school uniforms, school pages, or school identifiers are used;
  • the bullying causes absenteeism, anxiety, or fear at school;
  • students use school platforms or school-related groups.

XXIII. Liability of Employers

Employers may be responsible for addressing workplace cyberbullying, especially if it happens through workplace communication systems, among coworkers, or in connection with employment.

If the employer ignores complaints of harassment, discrimination, sexual harassment, or retaliation, the matter may become a labor or civil issue.

Employers should maintain anti-harassment policies, complaint mechanisms, investigation procedures, confidentiality, and anti-retaliation protections.


XXIV. Liability of Page Administrators and Group Chat Admins

A page administrator, group chat admin, or platform manager may become involved if they create, approve, share, encourage, or knowingly maintain harmful content.

Mere technical admin status may not automatically create liability. But active participation may matter, such as:

  • posting the defamatory content;
  • approving anonymous defamatory submissions;
  • encouraging others to attack;
  • refusing to remove harmful content after notice;
  • editing submissions to make them more humiliating;
  • coordinating harassment;
  • reposting deleted content.

The facts will determine liability.


XXV. Remedies Against Anonymous Bullies

Anonymous cyberbullying is difficult but not hopeless.

Steps to take

  1. preserve screenshots and screen recordings;
  2. save profile links and URLs;
  3. document dates and times;
  4. identify writing style, friends, mutual contacts, or clues;
  5. check whether the account used stolen photos;
  6. report to platform;
  7. report to school, employer, or law enforcement;
  8. avoid direct threats or hacking attempts;
  9. let investigators handle tracing where appropriate.

Victims should not hack accounts, impersonate the bully, or illegally access data. Doing so may expose the victim to liability.


XXVI. Cyberbullying and Freedom of Expression

Freedom of expression is protected, but it is not absolute.

A person may express opinions, criticize public issues, or share experiences. However, free speech does not protect all harmful conduct, especially:

  • defamatory false accusations;
  • true threats;
  • sexual harassment;
  • doxxing;
  • extortion;
  • identity theft;
  • child exploitation;
  • malicious invasion of privacy;
  • repeated targeted harassment;
  • coercion.

The legal challenge is balancing speech rights with dignity, privacy, safety, reputation, and child protection.


XXVII. Defenses in Cyberbullying Cases

A respondent may raise defenses depending on the charge.

Possible defenses include:

  1. the post was not about the complainant;
  2. the statement was true and made with good motives;
  3. the statement was opinion, not a factual accusation;
  4. there was no publication;
  5. there was no malice;
  6. the account was not controlled by the respondent;
  7. screenshots were fabricated or incomplete;
  8. the complainant consented to publication;
  9. the act was privileged communication;
  10. the complaint was filed beyond the prescriptive period;
  11. the statement was fair comment on a matter of public interest;
  12. there was no intent to threaten or harass.

Victims should prepare evidence to address likely defenses, especially identity of the offender and authenticity of screenshots.


XXVIII. Prescription Periods and Timeliness

Cyberbullying complaints should be acted on promptly. Different offenses have different prescriptive periods. Delay can make evidence harder to preserve, witnesses harder to locate, and posts easier to delete.

For cyber libel and other offenses, timeliness should be assessed carefully. Victims should consult counsel or authorities early to avoid missing deadlines.


XXIX. Practical Step-by-Step Guide for Victims

Step 1: Preserve evidence

Take screenshots, screen recordings, URLs, account details, dates, comments, and witness names.

Step 2: Do not retaliate

Avoid posting counter-accusations, insults, threats, or private information. Retaliation may weaken the case or create liability.

Step 3: Identify the type of harm

Ask whether the act involves:

  • defamation;
  • threats;
  • sexual harassment;
  • child abuse;
  • privacy violation;
  • identity theft;
  • domestic violence;
  • school bullying;
  • workplace harassment;
  • extortion.

Step 4: Report to the platform

Request takedown, but only after preserving evidence.

Step 5: Report to school, employer, or barangay if appropriate

Use written complaints and keep receiving copies.

Step 6: Report to law enforcement for serious cases

Threats, sexual exploitation, extortion, fake accounts, child victims, and persistent harassment should be escalated.

Step 7: Seek medical or psychological help if needed

Mental health records may help recovery and may also document harm.

Step 8: Consult a lawyer for legal strategy

A lawyer can help determine whether to file cyber libel, VAWC, Safe Spaces Act, civil damages, protection order, or other remedies.


XXX. Practical Step-by-Step Guide for Parents

If your child is being cyberbullied:

  1. stay calm and listen;
  2. do not blame the child;
  3. preserve evidence immediately;
  4. identify the students or accounts involved;
  5. report to the school in writing;
  6. ask for protection from retaliation;
  7. request guidance counseling;
  8. monitor emotional harm;
  9. report threats or sexual content to authorities;
  10. avoid confronting the other child aggressively;
  11. avoid posting about the incident publicly;
  12. follow up with the school until written action is taken.

If your child is accused of cyberbullying:

  1. do not ignore it;
  2. preserve your child’s side of the conversation;
  3. cooperate with school investigation;
  4. stop further contact;
  5. require deletion of harmful content if appropriate;
  6. seek counseling;
  7. consult counsel if criminal allegations are involved.

XXXI. Practical Step-by-Step Guide for Schools

Schools should:

  1. receive complaints without dismissing them;
  2. document all reports;
  3. preserve digital evidence;
  4. protect the victim from retaliation;
  5. notify parents or guardians;
  6. investigate promptly;
  7. interview parties separately;
  8. involve guidance counselors;
  9. apply discipline fairly;
  10. refer serious cases to authorities;
  11. monitor recurrence;
  12. document resolution.

Schools should avoid forcing victims into unsafe confrontation or public apologies without assessing harm.


XXXII. Practical Step-by-Step Guide for Employers

Employers should:

  1. maintain anti-harassment and social media policies;
  2. provide confidential complaint channels;
  3. investigate cyberbullying connected to work;
  4. preserve electronic communications;
  5. protect complainants from retaliation;
  6. discipline offenders if proven;
  7. address group chat harassment;
  8. comply with sexual harassment and Safe Spaces obligations;
  9. avoid victim-blaming;
  10. document all steps taken.

XXXIII. Settlement and Apology

Some cyberbullying cases may be resolved through settlement, especially if the harm is not severe and the victim mainly wants deletion, apology, and assurance of non-repetition.

A good settlement may include:

  • deletion of posts;
  • written apology;
  • undertaking not to contact or mention the victim;
  • undertaking not to repost;
  • payment for damages or expenses;
  • confidentiality terms;
  • school or workplace discipline;
  • consequences for breach.

However, settlement may not be appropriate for serious crimes, child sexual exploitation, severe threats, extortion, or repeated abuse.

Victims should avoid signing waivers without understanding their legal consequences.


XXXIV. Demand Letters

A demand letter may be useful in some cases. It can ask the offender to:

  • delete the content;
  • stop harassment;
  • issue an apology;
  • preserve evidence;
  • pay damages;
  • refrain from contacting the victim;
  • identify other persons involved.

A demand letter should be carefully written. A poorly written demand letter that uses threats or defamatory language may escalate the dispute or expose the sender to counterclaims.


XXXV. Mental Health and Cyberbullying

Cyberbullying can cause serious emotional harm, including anxiety, depression, panic attacks, shame, isolation, school avoidance, work impairment, and suicidal thoughts.

Legal remedies should be paired with support systems. Victims should seek help from trusted family members, school counselors, mental health professionals, or crisis services if needed.

For minors, parents and schools should monitor sudden changes in behavior, sleep, grades, social withdrawal, self-harm statements, or fear of going online.


XXXVI. What Not to Do

Victims should avoid:

  1. hacking the bully’s account;
  2. posting the bully’s private information;
  3. threatening revenge;
  4. creating counter-fake accounts;
  5. editing screenshots;
  6. deleting original evidence;
  7. engaging in public flame wars;
  8. forwarding intimate images to prove a point;
  9. confronting the offender alone if unsafe;
  10. accepting informal settlement without content removal;
  11. delaying action in serious cases;
  12. assuming anonymous accounts cannot be traced.

XXXVII. Frequently Asked Questions

1. Is cyberbullying a crime in the Philippines?

Cyberbullying itself is not always charged under a single offense named “cyberbullying.” But cyberbullying acts may be crimes if they amount to cyber libel, threats, unjust vexation, identity theft, sexual harassment, VAWC, child abuse, privacy violations, or other offenses.

2. Can I sue someone for insulting me online?

Possibly, depending on the content. A mere insult may not always be cyber libel, but repeated harassment may support other remedies. If the statement falsely attacks your reputation, cyber libel may be considered.

3. Can a minor be liable for cyberbullying?

Yes, but minors are treated under child justice and school discipline frameworks. The response may involve intervention, diversion, counseling, school discipline, or legal proceedings depending on age and seriousness.

4. Can I file a case for Facebook posts?

Yes, if the posts satisfy the elements of a legal offense such as cyber libel, threats, harassment, or sexual harassment.

5. What if the bully used a fake account?

Preserve evidence and report to authorities or the platform. Fake accounts may involve identity theft or cybercrime issues.

6. Are screenshots enough?

Screenshots are useful, but stronger evidence includes URLs, screen recordings, witness statements, account details, metadata, and original files. Authentication may be required.

7. Should I message the bully to stop?

Only if safe and strategic. In some cases, a written cease-and-desist message may help. In serious cases, especially threats, extortion, sexual exploitation, or domestic violence, direct contact may be unsafe.

8. Can I ask Facebook or TikTok to remove the post?

Yes. Platform takedown is often a practical first remedy, but preserve evidence before requesting removal.

9. Can I file both school complaint and criminal complaint?

Yes, if the facts support both. School discipline and criminal liability are separate.

10. Can I claim damages?

Yes, if you prove wrongful conduct and injury. Damages may include moral damages, actual damages, exemplary damages, and attorney’s fees in proper cases.


XXXVIII. Sample Evidence Checklist

A victim should prepare:

  • screenshots of posts and messages;
  • screen recordings;
  • URLs and usernames;
  • dates and times;
  • names of witnesses;
  • copies of school or workplace reports;
  • medical or psychological records, if any;
  • proof of identity of offender;
  • proof that others saw the content;
  • proof of harm, such as missed school, work consequences, anxiety, or reputational damage;
  • copies of takedown reports;
  • written demand or cease-and-desist letters, if any;
  • affidavits of witnesses.

XXXIX. Sample Complaint Structure

A written complaint may include:

  1. name and contact details of complainant;
  2. name or account details of offender;
  3. relationship between parties;
  4. dates and times of incidents;
  5. description of each act;
  6. links, screenshots, and evidence;
  7. names of witnesses;
  8. harm suffered;
  9. prior attempts to stop the conduct;
  10. requested action;
  11. certification that the facts are true;
  12. attachments.

For school or workplace complaints, the request may include immediate protection, investigation, takedown, no-contact measures, discipline, and counseling.

For criminal complaints, affidavits and evidence should be prepared carefully.


XL. Choosing the Right Remedy

The best remedy depends on the goal.

If the goal is to stop school bullying

File a written school complaint under anti-bullying and child protection policies.

If the goal is to remove a post

Preserve evidence, then report to the platform and demand takedown.

If the goal is to punish defamatory posts

Consider cyber libel or civil damages.

If the goal is protection from an abusive partner

Consider VAWC remedies and protection orders.

If the issue is sexual harassment

Consider the Safe Spaces Act, school or workplace remedies, and criminal complaint.

If the victim is a child and sexual material is involved

Report immediately to authorities. This is a serious child protection matter.

If personal information was exposed

Consider Data Privacy Act remedies and platform takedown.

If there are threats to life or safety

Report immediately to law enforcement and seek protective measures.


Conclusion

Cyberbullying in the Philippines may be addressed through several legal remedies. Although not every hurtful online act is automatically a crime, many forms of cyberbullying are punishable or actionable when they involve defamation, threats, harassment, sexual abuse, privacy violations, identity theft, child abuse, or domestic violence.

The most important first step is to preserve evidence. Screenshots, screen recordings, URLs, account details, dates, witnesses, and proof of harm can determine whether a case succeeds or fails. The second step is to identify the correct remedy: school complaint, workplace complaint, platform takedown, barangay action, police or NBI report, prosecutor complaint, Data Privacy Act complaint, civil action, or protection order.

For students, the Anti-Bullying Act and school policies are often the starting point. For defamatory online posts, cyber libel may be considered. For sexual or gender-based harassment, the Safe Spaces Act may apply. For abuse by an intimate partner, RA 9262 may provide protection. For minors, child protection laws may apply. For doxxing and misuse of personal information, the Data Privacy Act may be relevant.

Cyberbullying should be treated seriously because online harm can damage reputation, mental health, safety, education, employment, and family life. Philippine law provides multiple remedies, but the proper remedy depends on the specific facts, the evidence available, the identity of the parties, and the nature of the harm.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.