False Online Loan Under Stolen Identity and Threats to Post Borrower Photos

A false online loan under a stolen identity happens when a person’s name, mobile number, government ID, selfie, photo, address, contacts, or other personal information is used to apply for or obtain an online loan without that person’s knowledge or consent. The victim may later receive collection calls, threats, fake legal notices, messages to relatives, or threats to post the supposed borrower’s photos online.

This situation is serious because it involves two separate problems:

First, there may be identity theft or fraudulent use of personal data. The victim did not borrow the money, did not receive the proceeds, and did not authorize the loan.

Second, there may be harassment, privacy abuse, threats, or public shaming by the online lending app, collector, scammer, or person using the victim’s identity.

A person wrongly accused of borrowing should not panic, should not immediately pay a loan they did not take, and should not ignore the threats. The correct response is to preserve evidence, dispute the debt in writing, demand proof of the loan, report identity theft, secure accounts, and file complaints with the proper authorities if harassment or data misuse continues.

This article discusses false online loans under stolen identity and threats to post borrower photos in the Philippine context.

This is general legal information, not legal advice. A victim should consult a Philippine lawyer, law enforcement officer, cybercrime investigator, data privacy professional, or regulator for advice based on the actual loan app, messages, documents, photos, IDs, transaction records, and facts.


1. What is a false online loan under stolen identity?

A false online loan under stolen identity occurs when another person uses someone’s personal information to apply for, receive, or create a loan account without authority.

Examples include:

  • A scammer uses the victim’s ID and selfie to apply for an online loan.
  • A stolen phone or SIM is used to borrow through a lending app.
  • A fake account is created using the victim’s name and photo.
  • A person uses a friend’s or relative’s ID to apply for a loan.
  • A lending app claims the victim borrowed money, but the victim never applied.
  • The loan was released to a GCash, Maya, bank, or e-wallet account not owned by the victim.
  • The victim receives collection threats for a loan they never received.
  • The victim’s photos are used by collectors to shame or threaten them.
  • The victim’s contacts are messaged and told the victim is a scammer.
  • A fake borrower uploads the victim’s information to multiple lending apps.

The central point is that the victim did not give genuine consent to the loan.


2. What makes this different from ordinary non-payment?

In an ordinary unpaid loan, the borrower applied for the loan, received the proceeds, and later failed to pay.

In a false loan under stolen identity, the alleged borrower says:

  • “I did not apply for this loan.”
  • “I did not receive the money.”
  • “That is not my e-wallet or bank account.”
  • “Someone used my ID without permission.”
  • “My phone or SIM was stolen.”
  • “My selfie or photo was taken from another source.”
  • “The app is collecting from the wrong person.”
  • “The loan agreement is fake or not signed by me.”
  • “The number used is mine, but the transaction was unauthorized.”
  • “The collectors are threatening to post my photos for a debt I do not owe.”

This is not merely a payment dispute. It may be identity theft, cybercrime, data privacy abuse, fraud, or harassment.


3. Common ways identity is stolen for online loans

Identity theft in online lending may happen through:

  • Lost or stolen phone.
  • Lost SIM card.
  • SIM swap or unauthorized SIM replacement.
  • Phishing links.
  • Fake job applications.
  • Fake loan applications.
  • Fake investment forms.
  • Fake “ayuda” or prize forms.
  • Fake GCash or bank verification pages.
  • Hacked email or social media account.
  • Stolen wallet containing IDs.
  • Photos taken from social media.
  • ID submitted to a previous scammer.
  • ID submitted to a fake online seller or recruiter.
  • Lending app with excessive permissions.
  • Ex-partner, relative, co-worker, or friend using personal documents.
  • Data breach or leaked personal records.
  • Person borrowing a phone and accessing financial apps.
  • Fake “agent” who collects IDs for loan processing.

Victims often discover the problem only after collectors begin calling.


4. Immediate steps after receiving collection threats for a loan you did not take

Act quickly and calmly.

Step 1: Do not admit the debt

Do not say “I will pay” just to stop the threats if you did not borrow the money. A payment promise may later be used against you.

Step 2: Preserve evidence

Take screenshots of messages, call logs, loan details, threats, photos, and posts.

Step 3: Demand proof

Ask the lender or collector for the loan application, disbursement record, account where money was released, ID used, selfie used, loan agreement, and transaction logs.

Step 4: State that the debt is disputed

Tell them in writing that you did not apply for or receive the loan.

Step 5: Report identity theft

Report to cybercrime authorities, police, and relevant regulators depending on the facts.

Step 6: Secure accounts

Change passwords, secure SIM, e-wallets, email, social media, and banking accounts.

Step 7: Warn contacts if they are being harassed

Tell them not to pay, not to provide information, and to send screenshots.

Step 8: Report threats to post photos

Threats to post photos, IDs, or personal details may support privacy, cybercrime, harassment, and regulatory complaints.


5. Sample first response to collector

A victim may send a short written response:

I did not apply for, authorize, or receive this loan. I dispute this alleged debt. Please provide the loan application, agreement, ID and selfie used, disbursement record, receiving account, transaction reference number, and proof that I personally received the proceeds.

Do not contact my relatives, employer, co-workers, references, or phone contacts. Do not post or share my photos, ID, personal data, address, or alleged loan information. Any further harassment or unauthorized disclosure will be included in my complaints to the proper authorities.

After sending a clear dispute, avoid emotional arguments. Preserve all replies.


6. Do not pay a false loan just to stop harassment

Paying a debt you did not incur can create problems:

  • It may be treated as implied acknowledgment.
  • The collector may demand more.
  • Other lending apps may start collecting.
  • The real identity thief may continue borrowing.
  • Payment does not guarantee deletion of your photos or data.
  • The lender may still keep the fraudulent loan record.
  • You may lose money without stopping the abuse.

If you choose to pay for practical reasons, document that payment is made under protest and not as admission of liability. But legal advice is strongly recommended before paying a false debt.


7. What proof should the alleged lender provide?

If a lending app or collector claims you borrowed money, ask for:

  • Name of lending company.
  • App name.
  • Loan account number.
  • Date and time of application.
  • Loan agreement.
  • Borrower information submitted.
  • ID used.
  • Selfie or facial verification record used.
  • Mobile number used.
  • Device used, if available.
  • IP address or device information, if available through proper process.
  • Amount approved.
  • Amount actually released.
  • Deductions made.
  • Receiving e-wallet, bank, or cash-out account.
  • Transaction reference number.
  • Statement of account.
  • Privacy policy and authorization relied on.
  • Name of collection agency.
  • Proof that the collector is authorized.

A legitimate lender should be able to provide basic proof of the loan and disbursement. If they refuse and continue threatening, that strengthens the complaint.


8. If the loan proceeds were released to a different account

This is important evidence.

If the lender says the money was released to a GCash, Maya, bank, or e-wallet account that is not yours, state clearly:

I do not own or control that receiving account. I did not receive the loan proceeds. Please investigate identity theft and stop collection against me.

Ask for the receiving account details and transaction reference number, subject to privacy and legal procedures.


9. If the loan was released to your number but you did not receive it

This may happen if:

  • Your SIM was stolen.
  • Your phone was accessed.
  • Your GCash or e-wallet was compromised.
  • Someone used your phone without permission.
  • A SIM swap occurred.
  • Funds were immediately transferred out.

Steps:

  • Check GCash, Maya, bank, or wallet transaction history.
  • Report unauthorized transactions.
  • Contact the e-wallet or bank.
  • Contact the telco if SIM issue is suspected.
  • File cybercrime or police report.
  • Preserve transaction records.

This may involve both false loan and unauthorized e-wallet transaction issues.


10. If your ID and selfie were used

If a collector sends your ID or selfie and says it proves you borrowed, do not panic. IDs and selfies can be stolen, copied, or misused.

Ask:

  • When was the ID uploaded?
  • Through what app or device?
  • What liveness verification was performed?
  • What mobile number and email were used?
  • What account received the proceeds?
  • Was the ID image taken from another source?
  • Was the selfie altered or reused?
  • Who verified the borrower?

If your ID or selfie was stolen, report identity theft and data misuse immediately.


11. If the signature is fake

If a loan agreement contains a signature you did not make:

  • Preserve the document.
  • State that the signature is not yours.
  • Compare with your valid signature records.
  • Ask for the source of the document.
  • File a complaint if falsification is suspected.
  • Consult a lawyer if the amount is significant.

Do not simply deny verbally. Put the dispute in writing.


12. If your photo was taken from social media

Collectors or scammers may use your Facebook, Instagram, TikTok, LinkedIn, or profile photo to shame you.

This does not prove you borrowed. It may prove that someone harvested your image.

Steps:

  • Screenshot the threatening message.
  • Screenshot where the photo may have been taken from.
  • Tighten privacy settings.
  • Report unauthorized use of your photo.
  • Include it in privacy and cybercrime complaints.

13. Threats to post borrower photos

Threats to post photos are common in abusive online lending collection.

Collectors may say:

  • “We will post your photo as scammer.”
  • “We will upload your ID and selfie.”
  • “We will tag your employer.”
  • “We will send your picture to all contacts.”
  • “We will post you in Facebook groups.”
  • “We will make a wanted poster.”
  • “We will shame you until you pay.”
  • “We will send your photo to barangay.”
  • “We will post your family photos too.”

This may involve privacy violations, harassment, cybercrime, defamation, coercion, or abusive collection practices.


14. Sample response to threats to post photos

I do not consent to the posting, sharing, forwarding, editing, or publication of my photo, ID, selfie, address, employment details, contact list, or any personal data. I dispute this alleged loan and did not authorize or receive it. Any posting or disclosure will be included in my complaints for identity theft, privacy violation, harassment, and other applicable offenses.

Use this once. Then preserve evidence.


15. If the photos are already posted

If your photos, ID, or personal details are posted online:

  1. Screenshot the post.
  2. Copy the URL.
  3. Screenshot the page or profile.
  4. Screenshot comments, shares, and tags.
  5. Report the post to the platform.
  6. Ask trusted contacts not to share or comment.
  7. Report to cybercrime authorities.
  8. Report to the National Privacy Commission if personal data was disclosed.
  9. Report to the SEC if linked to a lending app or financing company.
  10. Consider legal action for damages, defamation, privacy violation, or harassment.

Do not repost the humiliating content yourself unless properly redacted.


16. If they send photos to your contacts

Ask contacts to send screenshots showing:

  • Sender number or account.
  • Date and time.
  • Photo sent.
  • Message content.
  • Any accusation or threat.
  • Any payment demand.
  • Any mention of the app or company.

Contacts should not reply emotionally. They should preserve evidence and block if needed.


17. Contacts are not automatically liable

Collectors may message your contacts and say:

  • “You are included in the case.”
  • “You are responsible for this borrower.”
  • “You must pay.”
  • “You are a guarantor.”
  • “You will also be posted.”
  • “You are part of estafa.”

A contact is not automatically liable just because their number appears in a phonebook or loan app. A contact becomes liable only if they signed as borrower, co-borrower, co-maker, guarantor, or surety.

A contact may reply:

I did not sign as borrower, co-maker, guarantor, or surety. Do not contact me again about another person’s alleged loan. Do not send me that person’s personal data.


18. If collectors contact your employer

This may be especially harmful. If collectors message your employer with photos or accusations:

  • Preserve screenshots.
  • Ask HR not to circulate the message.
  • Explain that this is a disputed identity theft matter.
  • Ask HR to preserve evidence.
  • Ask HR not to disclose your personal information.
  • Include the employer contact in your complaint.

Sample message to employer:

I am being targeted in a false online loan/identity theft matter. Collectors may contact the company and send my photo or false accusations. Please do not circulate any message, do not disclose my information, and kindly preserve any message received as evidence for my complaint.


19. If collectors threaten arrest for the false loan

A private lender or collector cannot issue a warrant of arrest. A real criminal case requires legal process.

If you receive arrest threats, respond:

I dispute this alleged loan and did not receive any proceeds. Please provide the official court or prosecutor case number, if any. A private collector cannot issue a warrant of arrest. False arrest threats will be included in my complaint.

Preserve all fake warrant or estafa messages.


20. If collectors threaten estafa

Collectors may claim that non-payment is estafa. But if you did not borrow, the stronger concern may be identity theft or fraud committed against you.

If you did not apply or receive the loan, state:

I did not make any false representation to obtain this loan because I did not apply for it. Someone appears to have used my identity without authorization. Please investigate the identity theft and stop collecting from me.


21. Possible legal issues involved

Depending on facts, the case may involve:

  • Identity theft.
  • Cybercrime.
  • Computer-related fraud.
  • Unauthorized use of personal data.
  • Data privacy violation.
  • Harassment.
  • Threats.
  • Coercion.
  • Libel or cyberlibel.
  • Falsification.
  • Estafa by the identity thief.
  • Abusive collection practices.
  • Unfair lending practices.
  • Civil damages.
  • Consumer protection violations.
  • Unauthorized access.
  • Misuse of contact list.
  • Public shaming.

The correct complaint depends on who did what and what evidence exists.


22. Cybercrime issues

Cybercrime concerns may arise when:

  • A digital app was used to apply under stolen identity.
  • Online accounts were accessed without authority.
  • Fake accounts were created.
  • Photos were posted online.
  • Threats were sent through SMS or messaging apps.
  • Personal data was used in a digital loan application.
  • E-wallet funds were transferred without consent.
  • Phishing was used to obtain IDs or credentials.
  • Fake documents were sent digitally.

Report serious cases to cybercrime authorities.


23. Data Privacy Act issues

A false online loan under stolen identity usually involves personal data. Privacy issues may include:

  • Unauthorized collection of ID and selfie.
  • Unauthorized processing of personal information.
  • Use of stolen personal data for loan application.
  • Disclosure of alleged loan to contacts.
  • Posting borrower photos or IDs.
  • Sending personal data to employer or relatives.
  • Using contact list without valid basis.
  • Failing to verify borrower identity properly.
  • Retaining or sharing data after dispute.

A complaint to the National Privacy Commission may be appropriate if an identifiable lender, app, collector, or company misused or disclosed personal data.


24. SEC issues for online lending apps

If the harassment comes from a lending company, financing company, or online lending app, the Securities and Exchange Commission may be relevant.

Report issues such as:

  • Abusive collection.
  • Threats.
  • Public shaming.
  • Contact-list harassment.
  • Use of fake legal threats.
  • Failure to verify borrower identity.
  • Collection from a person who disputes the loan as identity theft.
  • Failure to stop collection after identity theft notice.
  • Unauthorized or unregistered lending operations.
  • Hidden or excessive charges.

Provide the app name, company name, screenshots, loan details, and collector numbers.


25. Police and cybercrime reporting

Report to police or cybercrime authorities if:

  • Your identity was used without consent.
  • Your ID or selfie was misused.
  • Collectors threaten to post or already posted your photos.
  • You receive threats of harm.
  • Fake accounts are used.
  • Fake legal documents are sent.
  • E-wallets or SIMs are compromised.
  • The amount is significant.
  • The identity thief is known.
  • The harassment is severe.

Bring organized evidence and a written timeline.


26. What to bring when reporting

Prepare:

  • Valid ID.
  • Written narrative.
  • Screenshots of threats.
  • Screenshots of loan app messages.
  • Collection messages.
  • Fake legal notices.
  • Photos or IDs posted.
  • URLs of posts.
  • Call logs.
  • Messages sent to contacts.
  • Contact screenshots from relatives or employer.
  • Proof you did not receive loan proceeds.
  • E-wallet or bank records.
  • Telco report if SIM was stolen or swapped.
  • Police report for lost ID or phone, if applicable.
  • Proof of identity theft or phishing.
  • App name and company details.
  • Collector numbers and aliases.

27. Evidence checklist

Preserve the following:

A. Loan-related evidence

  • App name.
  • Company name.
  • Loan account number.
  • Alleged loan amount.
  • Alleged date of loan.
  • Amount supposedly released.
  • Receiving account.
  • Loan agreement.
  • Statement of account.
  • Collector’s claim of disbursement.
  • Proof you did not receive funds.

B. Identity theft evidence

  • Lost ID report.
  • Stolen phone or SIM report.
  • Phishing messages.
  • Fake forms submitted.
  • Account takeover alerts.
  • Unauthorized SIM replacement.
  • Unauthorized e-wallet activity.
  • Proof of hacked email or social media.
  • Evidence your photo was taken from public sources.

C. Harassment evidence

  • SMS.
  • Calls.
  • Voice messages.
  • Messenger/Viber/Telegram/WhatsApp messages.
  • Threats to post photos.
  • Fake warrants.
  • Fake legal notices.
  • Messages to contacts.
  • Employer messages.
  • Social media posts.

D. Privacy evidence

  • Posted ID.
  • Posted selfie.
  • Posted address.
  • Posted workplace.
  • Sent photos to third parties.
  • Contact-list harassment.
  • App permissions.
  • Privacy policy.
  • Data sharing threats.

28. Create a timeline

A clear timeline may look like this:

  1. Date you first received collection message.
  2. Number or account that contacted you.
  3. App or company name mentioned.
  4. Alleged loan amount.
  5. Your response disputing the loan.
  6. Collector’s threats.
  7. Threat to post photos.
  8. Contacts who received messages.
  9. Employer contacted.
  10. Photos posted or sent.
  11. Reports filed.
  12. Continuing harassment.

Attach screenshots in chronological order.


29. Sample timeline table

Date Time Event Evidence
May 1 9:00 AM Received first collection text for loan I did not take Screenshot A
May 1 9:30 AM I disputed the loan and asked for proof Screenshot B
May 1 10:00 AM Collector threatened to post my photo Screenshot C
May 1 10:30 AM Collector messaged my sister with my ID photo Screenshot D
May 2 8:00 AM I reported to app support / police / NPC Report receipt

30. How to prove you did not receive the loan

Useful evidence includes:

  • GCash transaction history.
  • Maya transaction history.
  • Bank statement.
  • No credit entry on alleged date.
  • Statement from e-wallet or bank.
  • Proof that receiving account is not yours.
  • Proof your SIM was lost or inactive.
  • Proof you were not using the phone.
  • Proof of unauthorized account activity.
  • Screenshot of app or collector showing different account.
  • Police report for identity theft.
  • Telco report for SIM issue.
  • Affidavit denying application and receipt.

You may not always be able to prove a negative completely, but you can demand that the lender prove application, consent, and disbursement to you.


31. Affidavit of denial and identity theft

For serious cases, prepare an affidavit stating:

  • Your full name and details.
  • That you did not apply for the loan.
  • That you did not authorize anyone to apply.
  • That you did not receive loan proceeds.
  • When you first learned of the loan.
  • What the collectors said.
  • What personal data was used.
  • What threats were made.
  • What accounts were contacted.
  • What steps you took to report.
  • What evidence is attached.

This affidavit may be used for police, cybercrime, regulator, bank, e-wallet, employer, or legal proceedings.


32. Sample affidavit paragraph

I did not apply for, authorize, receive, or benefit from the alleged loan with [app/company]. I did not sign any loan agreement and did not authorize any person to use my name, ID, selfie, mobile number, address, or other personal information for a loan application. I first learned of the alleged loan when I received collection messages on [date]. I dispute the alleged obligation and believe my identity was used without my consent.


33. If the identity thief is known

The identity thief may be:

  • Relative.
  • Friend.
  • Co-worker.
  • Ex-partner.
  • Household member.
  • Person who borrowed your phone.
  • Agent who collected your ID.
  • Online seller or recruiter.
  • Former employer or staff.
  • Fixer.
  • Scam operator.

If you know or suspect who used your identity:

  • Preserve messages connecting them to the loan.
  • Do not make public accusations without proof.
  • File a police or cybercrime complaint if evidence supports it.
  • Consider civil action for damages.
  • Demand that they settle the fraudulent loan and correct records.
  • Secure accounts they may access.

34. If a relative used your identity

Family cases are sensitive. A relative may have used your ID or phone to borrow.

Options include:

  • Written demand.
  • Barangay conciliation, where applicable.
  • Police complaint for serious fraud.
  • Agreement requiring the relative to settle the loan and stop use of your identity.
  • Notice to lender that you did not authorize the transaction.
  • Protection of your IDs and accounts.

Do not allow family pressure to make you silently assume a fraudulent debt unless you knowingly choose to do so.


35. If an ex-partner used your identity

An ex-partner may have access to IDs, selfies, phone numbers, passwords, or personal records.

This may involve:

  • Identity theft.
  • Cybercrime.
  • Harassment.
  • VAWC-related issues if legal requirements are present.
  • Privacy violation.
  • Coercion.
  • Threats to post photos.

Secure accounts and consult counsel if the ex-partner is threatening, stalking, or using intimate materials.


36. If a lending agent processed the loan

Some “agents” collect IDs and selfies from victims, claiming they will process legitimate loans. The agent may then apply using the victim’s identity or keep part of the proceeds.

Ask:

  • Who is the agent?
  • Did you sign anything?
  • Did you receive money?
  • Where were proceeds released?
  • Did the agent keep the money?
  • Was the agent authorized by the lender?
  • Did the agent use your ID for multiple loans?

Report the agent if fraud occurred.


37. If the false loan came from a fake lending app

The app itself may be fraudulent. Red flags include:

  • APK installed outside official app store.
  • No real company name.
  • No office.
  • Personal e-wallet payment channels.
  • Immediate threats.
  • Fake legal notices.
  • Access to contacts and photos.
  • Demand for “activation fee” or “processing fee.”
  • Claimed loan balance without actual release.
  • Threats to post photos if fees are not paid.

In such cases, report as scam and do not pay without verification.


38. If the lender is legitimate but the application was fraudulent

A legitimate lender may still be a victim of identity fraud. However, once notified, it should investigate and stop abusive collection while the identity theft claim is reviewed.

Send a written dispute and request:

  • Freeze collection.
  • Investigate identity theft.
  • Provide application records.
  • Stop contacting third parties.
  • Remove or correct fraudulent account.
  • Preserve records for authorities.
  • Confirm that the debt is disputed.

39. If the lender refuses to investigate

If the lender ignores your identity theft claim and continues collecting:

  • Send a second written dispute.
  • File complaint with SEC if lender is regulated.
  • File privacy complaint if data is misused.
  • File cybercrime or police report.
  • Keep all proof of your dispute and their continued harassment.

Continued collection after notice of identity theft can strengthen your complaint.


40. If the lender says “your ID is enough proof”

Your ID alone is not necessarily proof that you authorized the loan. A stolen or copied ID can be misused.

Ask for proof of:

  • Genuine application.
  • Consent.
  • Liveness check.
  • Loan agreement.
  • Disbursement to your account.
  • Device or account used.
  • Authentication steps.
  • Borrower control over receiving account.

41. If the lender says “your selfie is proof”

A selfie may be stolen, reused, edited, or taken under false pretenses. Ask when and how it was captured and whether proper verification was done.

If you submitted the selfie to a different scam or agent, explain that it was used without authority for this loan.


42. If the lender says “your phone number is proof”

A phone number may be stolen, spoofed, SIM-swapped, borrowed, or used without authority. Ask for more proof.

If the SIM was lost or compromised, submit telco records or police report.


43. If the lender says “your contacts were in the app”

Contact-list access does not prove you borrowed. It may prove the app accessed data from a device. If the device was used without authority or the app harvested contacts excessively, that may support your complaint.


44. If collectors use your contact list

Contact-list harassment may violate privacy rights and abusive collection rules.

Preserve:

  • Messages to contacts.
  • Contact names.
  • Sender numbers.
  • Screenshots showing your loan details disclosed.
  • Threats involving your photos or ID.
  • Any statements calling you a scammer.

45. If collectors post “wanted” or “scammer” posters

Fake wanted posters are serious. They may include your photo, name, address, or ID.

Preserve:

  • Original post.
  • URL.
  • Profile or page.
  • Comments and shares.
  • Time posted.
  • Who received it.
  • Whether the poster mentions a lending app or collector.

Report to platform, cybercrime authorities, NPC, and SEC if lending-related.


46. If the post says “estafa” or “criminal”

Calling someone an estafador, scammer, criminal, or wanted person online may be defamatory if false and not privileged. If done through the internet, cyberlibel issues may arise depending on facts.

Even if a debt exists, public accusation can be unlawful if it goes beyond legitimate collection.


47. If the posted photo is your government ID

Posting a government ID exposes you to further identity theft. Take immediate action:

  • Screenshot and report.
  • Request takedown.
  • Monitor accounts.
  • Consider replacing compromised ID where appropriate.
  • Report data privacy violation.
  • Warn banks or institutions if needed.
  • Watch for new loans or accounts opened under your name.

48. If intimate or private photos are threatened

If collectors or identity thieves threaten to post intimate photos, the issue becomes more serious. It may involve blackmail, cybercrime, image-based sexual abuse, or other offenses.

Do not send money or more photos. Preserve threats and report urgently.


49. If the identity thief used your phone contacts

If a suspicious app was installed on your phone, revoke permissions and uninstall after preserving evidence.

Steps:

  • Screenshot app permissions.
  • Screenshot app name and developer.
  • Screenshot loan dashboard.
  • Revoke contacts, camera, storage, SMS, and location permissions.
  • Uninstall app.
  • Scan device.
  • Change passwords.
  • Warn contacts.
  • Report app.

50. If your phone was stolen

If your phone was stolen before the false loan:

  • File police report or affidavit of loss.
  • Contact telco to block SIM.
  • Contact e-wallets and banks.
  • Lock or wipe device if possible.
  • Change passwords.
  • Report unauthorized loan applications.
  • Submit theft report to lender as evidence.
  • Monitor accounts.

Timing matters. Show when the phone was stolen and when the loan was made.


51. If your SIM was lost or replaced without authority

SIM control may allow OTP access.

Steps:

  • Contact telco immediately.
  • Request SIM blocking or investigation.
  • Ask for record of SIM replacement.
  • Secure e-wallets and banks.
  • Report unauthorized loan.
  • File cybercrime report if SIM swap is suspected.

52. If your email was hacked

A hacked email can be used for loan applications, OTPs, account recovery, and document access.

Secure email by:

  • Changing password.
  • Enabling two-factor authentication.
  • Checking recovery email and phone.
  • Checking forwarding rules.
  • Checking recent login activity.
  • Logging out all sessions.
  • Reviewing linked accounts.
  • Reporting unauthorized access.

53. If your social media was hacked

A hacked social media account can be used to obtain IDs, solicit loans, or scam contacts.

Steps:

  • Recover account.
  • Change password.
  • Enable two-factor authentication.
  • Warn contacts.
  • Preserve scam messages.
  • Report fake posts.
  • Check if photos or IDs were taken.

54. If your ID was submitted to a fake job or loan offer

Many victims submit IDs to fake recruiters or fake lending agents. Later, the ID is used for loans.

Preserve:

  • Job post or loan ad.
  • Person who requested ID.
  • Messages.
  • Email address.
  • Forms.
  • Uploaded documents.
  • Any promises made.
  • Payment demands.
  • Contact details.

Report the original scam as identity theft source.


55. If your photo was used with AI or editing

A photo may be altered, deepfaked, or placed on a fake ID or fake borrower profile.

Preserve the altered image and any original photo source. Report as identity misuse and possible cybercrime.


56. If the false loan appears on credit record

If the false loan affects credit reporting or future applications:

  • Dispute the account with the lender.
  • Request written confirmation of identity theft.
  • Ask for correction or deletion of fraudulent record.
  • Preserve police or cybercrime report.
  • Ask for confirmation that collection and reporting will stop.
  • Follow up regularly.

Do not allow a fraudulent loan to remain unchallenged.


57. If collectors continue after you file a report

Send them your report reference and repeat the dispute once:

This alleged loan is disputed as identity theft. I have filed a report with [agency] under reference number [number]. Stop collection and preserve all records for investigation.

If harassment continues, submit supplemental evidence to the agency.


58. If you receive fake legal notices

Fake legal notices may include:

  • Fake warrant.
  • Fake subpoena.
  • Fake barangay complaint.
  • Fake NBI notice.
  • Fake police blotter.
  • Fake court order.
  • Fake estafa complaint.
  • Fake hold departure order.

Preserve them. A private collector cannot issue a warrant or court order.

Verify any supposed official document directly with the named office.


59. If you receive a real subpoena

Do not ignore a real prosecutor or court subpoena. If a real complaint was filed, respond through counsel and present evidence of identity theft.

Bring:

  • Affidavit of denial.
  • Evidence you did not receive loan.
  • Police/cybercrime report.
  • E-wallet/bank records.
  • Proof of stolen ID, phone, or SIM.
  • Screenshots of harassment.
  • Lender’s failure to verify.

60. If a real case is filed against you

If a real case is filed, consult a lawyer immediately. A false loan under stolen identity is a defense, but it must be properly presented.

Possible defenses or arguments may include:

  • No application by accused.
  • No consent.
  • No receipt of proceeds.
  • Identity theft.
  • Falsified documents.
  • Wrong recipient account.
  • Lack of deceit by accused.
  • Lack of participation.
  • Fraud by third party.
  • Unreliable verification process.

61. If the debt collector threatens your references

References should not be threatened. Ask them to preserve evidence.

A reference can say:

I am only a contact/reference and did not sign any loan document. Do not contact me again or send me another person’s personal information.

If threats continue, references may also file complaints.


62. If the debt collector calls repeatedly

Document call harassment:

Date Time Number What happened
May 1 8:00 AM 09xx Threatened to post photo
May 1 8:10 AM 09xx Called again, shouted estafa
May 1 8:20 AM 09xx Sent ID photo to contact

Repeated calls may support harassment complaints.


63. If the collector uses abusive language

Abusive language, insults, sexual remarks, threats, and humiliation should be preserved exactly as sent.

Do not respond with threats. Stay factual.


64. If the collector threatens physical harm

If they threaten to hurt you, go to your home, harm your family, or send people to your workplace:

  • Preserve the threat.
  • Inform trusted persons.
  • Report to local police.
  • Do not meet alone.
  • Alert building or workplace security.
  • Include threats in cybercrime or police complaint.

Physical threats are urgent.


65. If collectors visit your home

If collectors appear at your house:

  • Do not allow entry if unsafe.
  • Ask for ID and company authority.
  • Record details if safe.
  • Do not sign documents under pressure.
  • Do not surrender property.
  • Call barangay or police if they threaten, shout, or refuse to leave.
  • Preserve CCTV and witness names.

For a disputed identity theft loan, state that the debt is denied and under complaint.


66. If collectors visit your workplace

Inform HR in advance if necessary. Ask HR to treat the matter confidentially and preserve evidence.

Collectors have no right to create scandal at your workplace.


67. Can they seize property for an online loan?

For ordinary unsecured online loans, collectors generally cannot simply seize your property. They need proper legal process. If the loan is false and under identity theft, seizure threats are especially improper.


68. Can they arrest you for not paying a false online loan?

A private collector cannot arrest you. Non-payment alone does not automatically mean arrest. If a real criminal complaint exists, legal process applies, and you should respond through counsel.


69. Can they post your photos because you “agreed” in app terms?

Some apps may claim that by applying, the borrower consented to contact access or public posting. But consent to process data for loan purposes is not the same as consent to harassment, public shaming, defamatory posting, or disclosure to unrelated third parties.

If you did not apply, you did not consent at all.

Even for real borrowers, excessive data use and public shaming may still be challenged.


70. Can the lender contact references?

A lender may verify information or contact references in limited, lawful ways if properly disclosed and consented to. But contacting references to shame, threaten, disclose debt details, or demand payment is different.

If you did not borrow, reference contact is even more problematic.


71. Can the lender message all contacts?

Mass messaging phone contacts is highly problematic, especially if it discloses the alleged loan, sends photos, or accuses the person of fraud.

This may support complaints for privacy violation and abusive collection.


72. Can they use your ID photo in collection?

Using an ID photo to verify identity is different from sending or posting the ID photo to shame a person. Public disclosure or third-party sending of ID photos may expose the victim to identity theft and privacy harm.


73. Can they call you a scammer?

If they publicly call you a scammer or estafador without proof, especially when you are disputing the loan as identity theft, that may raise defamation or cyberlibel issues.

Preserve exact words and where they were published.


74. How to report to the lending company

Send a formal dispute to official customer support:

I am reporting a fraudulent loan application under my stolen identity. I did not apply for, authorize, or receive the loan under account number [number]. Please immediately mark the account as disputed, stop collection, stop contacting third parties, preserve all application and disbursement records, investigate the identity theft, and provide me with copies or details of the application, ID used, selfie used, receiving account, and disbursement reference number.

Ask for a ticket number.


75. How to report to SEC

If the lender or collector is a lending or financing company, report:

  • App name.
  • Company name.
  • Collector numbers.
  • Alleged loan details.
  • Identity theft dispute.
  • Threats to post photos.
  • Messages to contacts.
  • Fake legal threats.
  • Failure to investigate.
  • Screenshots and evidence.

Request investigation of abusive collection and identity verification failure.


76. How to report to National Privacy Commission

Report if:

  • Your ID or photo was posted.
  • Your loan information was disclosed to contacts.
  • Your contacts were messaged.
  • Your personal data was used without consent.
  • The app failed to protect your data.
  • Collectors threatened to publish personal data.
  • Your stolen identity was processed by a company.

Include screenshots, app details, privacy policy, and your written objection.


77. How to report to cybercrime authorities

Report if:

  • Identity theft occurred online.
  • Photos were posted online.
  • Fake accounts are used.
  • Threats were sent digitally.
  • E-wallets or SIMs were compromised.
  • Loan application was fraudulent.
  • Fake documents were sent.
  • Harassment is severe.

Bring a written timeline and evidence.


78. How to report to local police

Report to local police if:

  • There are physical threats.
  • Collectors visit home or workplace.
  • A known person used your identity.
  • You need a police report for identity theft.
  • You lost ID, phone, or SIM.
  • You need documentation for lenders or regulators.

79. How to report to app stores and platforms

Report the app or posts to:

  • Google Play.
  • Apple App Store.
  • Facebook.
  • Messenger.
  • Telegram.
  • Viber.
  • WhatsApp.
  • TikTok.
  • Other platforms used.

Grounds may include harassment, privacy violation, impersonation, fraud, and abusive behavior.


80. If your data is used for multiple loans

Identity thieves may apply to several apps. Create a master list:

App/company Alleged amount First contact date Collector number Status
App A ₱5,000 May 1 09xx Disputed
App B ₱3,000 May 2 09xx Reported
App C ₱7,000 May 3 09xx Harassing contacts

File disputes with each app and report the pattern to authorities.


81. If your contacts receive messages from multiple apps

Ask contacts to send screenshots. This may show that your identity was compromised broadly.

Tell contacts:

My identity may have been used fraudulently in online loan apps. I did not authorize these loans. Please do not pay or respond. Kindly send me screenshots of any message and block the sender after preserving evidence.


82. If the false loans affect your mental health

Harassment can be overwhelming. Tell a trusted person immediately. Do not face collectors alone. If self-harm thoughts arise, seek urgent help from family, medical professionals, crisis support, or emergency services.

Debt collectors and scammers rely on shame and isolation. Evidence, support, and reporting reduce their power.


83. How to secure your identity after the incident

Take identity-protection steps:

  • Replace compromised passwords.
  • Secure email and phone.
  • Change e-wallet MPINs.
  • Review bank accounts.
  • Monitor credit or loan activity.
  • Revoke app permissions.
  • Tighten social media privacy.
  • Avoid posting IDs online.
  • Use watermarks on future ID submissions.
  • File police report for stolen ID or identity theft.
  • Notify institutions if a specific ID was compromised.
  • Keep a copy of all reports.

84. Watermarking IDs for future use

When submitting IDs for legitimate purposes, consider adding a watermark such as:

“Submitted to [Company] for [Purpose] on [Date]”

Do not cover important information needed for verification. This can reduce misuse.


85. Avoid sending IDs through unsecured channels

Avoid sending IDs through random Messenger accounts, Telegram chats, or unverified forms. Use official portals when possible.


86. If a company requires ID through chat

Verify:

  • Company identity.
  • Purpose.
  • Privacy policy.
  • Official email or portal.
  • Data retention.
  • Security measures.
  • Whether the representative is authorized.

Do not send IDs to unknown agents.


87. If the stolen identity came from a previous scam

Report both the current false loan and the earlier scam that collected your data. The earlier scam may explain how your ID was obtained.


88. If you lost your wallet with IDs

File an affidavit of loss or police report as appropriate. Monitor for false loans and accounts.


89. If your ID was posted publicly before

If you previously posted an ID online, remove it immediately. But even if you made a mistake, others still cannot lawfully use it for fraud or harassment.


90. If your phone contacts are being threatened

Contacts should not pay. They should preserve evidence.

If collectors threaten contacts with posting, arrest, or inclusion in a case, those contacts may also have their own complaint.


91. If collectors demand payment from relatives

Relatives should not pay unless they intentionally choose to assist after verifying the debt. They are not automatically liable.

If they pay under threat, preserve receipts and threats. They may have claims if payment was obtained by coercion or fraud.


92. If a collector asks for “deletion fee”

Some collectors may say they will delete your photos or data if you pay. This is suspicious and may be extortion-like.

Do not pay deletion fees without legal advice. Preserve the threat.


93. If the collector says payment will stop posting

Even if you pay, they may continue posting or demand more. Require written settlement, official receipt, and deletion commitment if you decide to settle for practical reasons.

But for a false loan, do not treat payment as the first solution.


94. If the lender offers settlement for a false loan

Be careful. A settlement may be interpreted as recognition of the debt. If you did not borrow, insist on identity theft investigation and account cancellation.

If you accept settlement for practical reasons, document that it is without admission of liability and under protest. Get legal advice first.


95. If the lender agrees it was identity theft

Ask for written confirmation:

  • Account is fraudulent.
  • Collection will stop.
  • Your name will be cleared.
  • Data will be corrected or blocked where legally appropriate.
  • Third-party collectors will be notified.
  • Credit reporting will be corrected.
  • Your photos and IDs will not be used.
  • Records will be preserved for authorities.
  • Any posts will be removed.

Keep this permanently.


96. If the lender says it cannot delete records

A lender may need to retain some records for legal or regulatory reasons. But it should not continue using fraudulent data for harassment or public disclosure. Ask that the data be marked disputed/fraudulent and restricted from collection use.


97. If collectors stop but posts remain online

Continue takedown efforts. Report to platforms and include URLs in complaints. If the poster is identifiable, consider legal remedies.


98. If your photos were shared in group chats

Group chat evidence is harder but still useful. Ask recipients to screenshot:

  • Group name.
  • Sender.
  • Date and time.
  • Message.
  • Members, if visible.
  • Photo shared.

Report the group if abusive.


99. If the post goes viral

Focus on containment:

  • Report original post.
  • Ask friends not to share.
  • Collect URLs.
  • File cybercrime and privacy complaints.
  • Consider legal counsel.
  • Prepare a short factual statement if needed.
  • Avoid emotional public fights.

100. Public statement sample

If necessary, a restrained statement may say:

My identity appears to have been used without my consent in an online loan matter. I did not authorize or receive the alleged loan. I am taking legal steps and request everyone not to share any post containing my photo, ID, or personal information.

Avoid naming people unless advised.


101. If you are a victim of identity theft, not a debtor

Keep repeating the correct position:

  • I did not apply.
  • I did not authorize.
  • I did not receive funds.
  • I dispute the debt.
  • My identity was misused.
  • Stop collection and investigate.

Do not let collectors force you into the role of debtor.


102. What if the loan app says the account is under your verified profile?

Ask for verification logs and disbursement proof. Verification can be defeated by stolen IDs, stolen phones, SIM swaps, or insider abuse.

A verified profile is evidence, but not conclusive if identity theft is shown.


103. What if the false borrower used your real phone

If someone had physical access to your phone and used it to borrow, identify when and how access occurred. The lender may argue the transaction came from your device, but you can still report unauthorized use by the person who accessed it.


104. What if you allowed someone to use your phone

If you voluntarily allowed someone to use your phone and they borrowed, the case becomes more fact-specific. You may have a claim against that person. Secure your account and dispute with the lender if you did not authorize the loan.


105. What if you gave your ID to someone to “help process a loan”

If you knowingly gave your ID to an agent but did not authorize the specific loan or did not receive proceeds, explain the facts honestly. The agent may have misused your documents.


106. What if you signed something but did not receive money

If you signed a loan application but funds were diverted by an agent or third party, the issue may involve fraud, agency, and disbursement. Consult counsel because the lender may claim you authorized the loan.

Ask for proof of disbursement and who received proceeds.


107. What if you received partial proceeds but the amount is wrong

If you received some money but not the amount claimed, dispute the computation rather than denying everything. Ask for statement of account and deductions.

Identity theft may not be the correct framing if you actually applied and received funds.


108. What if you applied but cancelled before release

If no proceeds were released, dispute any demand. Preserve cancellation proof and disbursement records.


109. What if the app showed a loan balance but no money was released

Fake lending apps may show a balance and demand fees or payment even though no loan was disbursed. This may be a scam. Preserve screenshots and report.


110. What if they threaten to post because you refuse to pay a non-released loan

State:

No loan proceeds were released to me. I dispute the alleged debt. Threatening to post my photos or personal data for a non-released loan is improper and will be reported.


111. If the false loan came from a stolen SIM

A stolen SIM can be used to receive OTPs and apply for loans. Report to telco and ask for documentation.


112. If the false loan came from a hacked e-wallet

Report unauthorized e-wallet access and false loan together. The loan proceeds may have passed through the wallet.


113. If the false loan came from a hacked phone

Run security checks, change passwords, revoke sessions, and consider factory reset after preserving evidence.


114. If there are unauthorized apps on your phone

Remove suspicious apps after documenting them. Some apps may harvest contacts, photos, SMS, and IDs.


115. If the app requested access to gallery

Gallery access may expose photos and IDs. Preserve app permission screenshots and report.


116. If the app requested access to SMS

SMS access can expose OTPs. This is serious. Revoke permission and secure accounts.


117. If the app requested access to contacts

Contact access can lead to mass harassment. Revoke permission and warn contacts.


118. If the app requested access to camera

Camera access may be used for selfie verification but may also be abused by malicious apps. Use only trusted apps.


119. If the app requested location

Location data may be used for harassment or intimidation. Revoke unnecessary access.


120. If you installed an APK

APK-based lending apps are risky. They may bypass app store controls. Preserve APK source link if available and report.


121. If the app name is unknown

Ask collectors to identify:

  • App name.
  • Company name.
  • Loan account.
  • Date of application.
  • Amount.
  • Authority to collect.

If they refuse, report as suspicious.


122. If many numbers call you

Use call logs as evidence. You may block after documenting. Keep one written channel for legitimate dispute if needed.


123. If they use robocalls

Automated harassment should also be documented. Save recordings or call logs.


124. If they use threats at night

Repeated night threats may support harassment claims. Log date and time.


125. If they threaten to involve barangay

A real barangay process should come from the barangay. Collectors cannot use barangay threats to shame you for a false loan.

Verify directly if any real summons exists.


126. If they threaten NBI or police

Ask for official case details. Do not pay to avoid imaginary police action. Report impersonation if they pretend to be officers.


127. If they send fake warrant

A private collector cannot issue a warrant. Preserve the fake warrant and report.


128. If they send fake subpoena

Verify directly with the named office. Preserve the document.


129. If they threaten hold departure

A private collector cannot casually place you on a hold departure list by text. Treat as intimidation unless official process exists.


130. If they threaten social media exposure

This is one of the strongest reasons to file privacy and cyber harassment complaints. Preserve exact threats.


131. If they threaten to contact school

If you are a student or parent, inform the school confidentially if necessary. Collectors should not shame students or disclose private debt allegations.


132. If they threaten to contact clients

For professionals or business owners, client contact may cause reputational harm. Preserve evidence and consider legal demand.


133. If they threaten professional license

Private collectors cannot revoke professional licenses. If they make false reports or defamatory posts, preserve evidence.


134. If they threaten immigration or travel

This is usually intimidation for ordinary loan matters. Verify any official process.


135. If they threaten family photos

Using family photos is a serious privacy and harassment issue. Preserve and report.


136. If they threaten children

Threats involving children should be treated seriously. Preserve and report to police or cybercrime authorities.


137. If they threaten to edit your photos

Threatening to edit photos into humiliating content may involve cyber harassment, privacy abuse, defamation, and possibly other offenses. Preserve the threat.


138. If they threaten intimate fake images

Deepfake or fake intimate image threats are serious. Report urgently and preserve all communications.


139. If you fear physical harm

Take safety precautions:

  • Tell trusted persons.
  • Avoid meeting collectors alone.
  • Report to local police.
  • Secure home and workplace.
  • Keep evidence.
  • Do not disclose your location unnecessarily.

140. Civil remedies

If the offender or company is identifiable, possible civil remedies may include:

  • Damages for injury to reputation.
  • Moral damages for mental anguish.
  • Actual damages for financial loss.
  • Exemplary damages in proper cases.
  • Injunction or takedown-related relief.
  • Action for correction of records.
  • Privacy-related claims.
  • Defamation-related claims.

Civil action requires evidence and legal strategy.


141. Criminal remedies

Depending on facts, criminal complaints may involve:

  • Identity theft.
  • Estafa by the person who used your identity.
  • Falsification.
  • Computer-related fraud.
  • Unauthorized access.
  • Threats.
  • Coercion.
  • Unjust vexation.
  • Libel or cyberlibel.
  • Other cybercrime-related offenses.

A prosecutor or investigator can determine proper charges.


142. Regulatory remedies

Regulatory remedies may involve:

  • SEC complaint against lending company.
  • NPC complaint for data privacy violation.
  • App store report.
  • Platform takedown report.
  • Complaint to payment provider if e-wallets were used.
  • Complaint to telco if SIM misuse occurred.

143. If you want the fraudulent account removed

Request in writing:

  • Mark account as fraudulent.
  • Stop all collection.
  • Remove your name from borrower records, where legally appropriate.
  • Correct credit reporting.
  • Stop processing your data for collection.
  • Notify collectors to cease contact.
  • Delete or block unnecessary personal data, subject to lawful retention.
  • Provide written confirmation.

144. If the company says it must retain data

Ask that the data be restricted and marked as disputed identity theft. Retention for legal purposes should not mean continued harassment.


145. If you want damages for posted photos

Preserve proof of harm:

  • Screenshots.
  • Witnesses.
  • Employer impact.
  • Lost work.
  • Anxiety or medical consultation.
  • Public comments.
  • Messages from contacts.
  • Takedown requests.
  • Expenses incurred.

Damages require proof.


146. If you are wrongly accused in public

A possible short corrective statement:

This is a case of identity misuse. I did not authorize or receive the alleged loan. I have reported the matter. Please do not share posts containing my personal data.

Avoid lengthy public arguments.


147. If a contact wants to help

Ask them to help by preserving evidence, not by arguing.

They can:

  • Screenshot messages.
  • Avoid replying.
  • Block the sender.
  • Send you evidence.
  • Report the account.
  • Avoid sharing your photos.

148. If family pressures you to pay

Explain that paying a false loan may not solve the identity theft and may encourage more demands. Show them the dispute and reports.


149. If you decide to settle for practical reasons

Sometimes victims pay to stop immediate harm even if they dispute the debt. If you do this, protect yourself:

  • State payment is under protest and without admission.
  • Pay only official company channel.
  • Get written settlement.
  • Get receipt.
  • Require deletion/takedown commitment.
  • Require written closure.
  • Require correction of records.
  • Consult a lawyer if amount is significant.

150. If collectors demand payment to personal accounts

Be cautious. Ask official support to confirm. Personal accounts may belong to rogue collectors or scammers.


151. If you receive a QR code for payment

Ask whether it is official. Screenshot it. Do not pay without verification.


152. If you already paid personal account

Preserve receipt and ask the company to confirm posting. If not posted, report possible fraud.


153. If payment does not stop threats

Submit proof of continued threats as supplemental complaint.


154. If the app uses multiple company names

Document all names, logos, app pages, and numbers. Some operators use many app names.


155. If the app disappears

Evidence still matters:

  • Screenshots.
  • Receipts.
  • SMS.
  • Call logs.
  • App installation records.
  • Contact messages.
  • Payment accounts.
  • Other victims.

Report what you have.


156. If the app is foreign

Report locally if Philippine citizens, local numbers, Philippine e-wallets, or local contacts are involved. Enforcement may be harder but still possible.


157. If you are an OFW

OFWs may be targeted because they are away from home. Steps:

  • Preserve messages.
  • Warn family not to pay.
  • File online reports where available.
  • Authorize trusted family member if needed.
  • Secure Philippine SIM and e-wallets.
  • Ask relatives to preserve collector messages.

158. If the victim is a minor

If a minor’s identity or photos are used:

  • Involve parent or guardian immediately.
  • Do not engage collectors alone.
  • Report to authorities.
  • Protect the child’s data and social media.
  • Preserve evidence.
  • Seek school support if harassment reaches classmates.

Threats against minors are serious.


159. If the victim is elderly

Elderly victims may panic and pay. Family should help preserve evidence, block abusive contacts, and file complaints.


160. If the victim is a public employee or professional

Collectors may use reputational pressure. Keep communications private, inform trusted HR/legal office if needed, and report.

A false loan under stolen identity should not be treated as misconduct without verification.


161. If the false loan affects employment

If employer takes action because of collector messages, explain in writing and provide reports. If adverse employment action is taken based on false allegations, consult a labor lawyer.


162. If the false loan affects school

If a school receives messages, ask school administrators not to circulate the content and preserve evidence. Students should be protected from cyberbullying and harassment.


163. If the false loan affects business reputation

Business owners should document lost clients, defamatory posts, and harassment. Consider legal demand and cybercrime/privacy complaints.


164. If the collector threatens to report to all social media groups

Preserve the threat and report to platforms if posted. Preemptively warn close contacts if needed.


165. If photos are sent in community groups

Ask group admins to delete and preserve evidence. Report the sender.


166. If your ID is used to open new accounts

Report to the provider. Ask for closure and fraud investigation. Monitor for further misuse.


167. If your phone number is used but not your ID

Someone may have entered your number as borrower or reference. Dispute and ask for the actual application details.


168. If your number is only a reference

State clearly that you are not the borrower. If they send borrower photos or loan information to you, the borrower’s privacy may also be violated.


169. If you receive threats for someone else’s loan

Do not pay. Tell collector they have the wrong person or that you are only a contact. Preserve and block.


170. If the collector says “you are included because you are contact”

That is not a legal basis for liability. Preserve the message.


171. If the collector says “we will post all contacts”

This is abusive and may be reportable. Contacts should preserve evidence.


172. If you want to stop data processing

Send a privacy objection:

I object to the processing and disclosure of my personal data for this disputed fraudulent loan. I did not authorize this loan and did not receive proceeds. Stop using or sharing my personal information for collection while the identity theft dispute is under investigation.


173. If you want access to data

Ask:

Please provide the personal data you hold about me in relation to this alleged loan, the source of the data, the date of collection, the purpose of processing, the recipients to whom it was disclosed, and the basis for processing.

This may support a privacy complaint.


174. If the lender refuses data access

Document refusal and consider NPC complaint, especially if they continue using your data.


175. If the lender claims consent from app

If you did not apply, deny consent. If your phone was used without authority, explain. Ask for proof of genuine consent.


176. If the app accessed contacts without your knowledge

Take screenshots of permissions if possible. Report excessive access.


177. If your data came from another person’s phone

Sometimes your contact details appear because another borrower listed you or had your number in their contacts. That does not make you the borrower.


178. If collectors confuse you with someone else

Ask for identifying details and dispute. Do not provide sensitive information just to “clear” yourself unless through official channels.


179. If they ask you to send ID to prove innocence

Be careful. If the collector is suspicious, sending more ID may worsen identity theft. Verify official company channel first.


180. If a regulator or police asks for ID

Provide through proper official channels. Keep receipts or acknowledgment.


181. If you need to redact evidence

For public sharing, redact IDs, addresses, minors’ names, and sensitive information. For authorities, provide complete evidence as needed.


182. If the collector deletes posts after you screenshot

Keep screenshots. Deletion does not erase the fact that the post existed.


183. If you need notarized documents

Some complaints may require affidavits. A lawyer or notary can help prepare accurate statements.


184. If you cannot afford a lawyer

You may still report to police, cybercrime units, SEC, NPC, or public legal assistance offices. Keep documents organized.


185. If you are afraid of retaliation

Report threats, block after preserving evidence, inform trusted people, and avoid meeting collectors. Retaliation after complaint should be documented.


186. If the collector offers to “clear your name” for a fee

This is suspicious. Ask for official written confirmation from the company. Do not pay personal “clearing fees.”


187. If a “fixer” offers to delete your online loan

Be careful. Fixers may be scammers. Do not give passwords, OTPs, MPINs, or more money.


188. If a “hacker” offers to remove posts

Do not hire hackers. Use platform takedown, legal reporting, and proper remedies.


189. If you receive a real demand letter

If the letter is real, respond with a formal dispute and identity theft evidence. Do not ignore official correspondence.


190. If you receive a real small claims summons

Small claims is civil. Attend or respond as required. Present evidence that you did not borrow or receive funds.


191. If you receive a real criminal subpoena

Consult a lawyer and file a counter-affidavit explaining identity theft.


192. If you are arrested or invited by police

Ask for the basis, contact a lawyer, do not sign statements without understanding, and present identity theft evidence through proper counsel.


193. If you want to clear your record

Ask lender and relevant reporting entities for written correction. Keep all reports and confirmations for future loan or employment issues.


194. If future lenders ask about the incident

Provide the police report, identity theft affidavit, and lender confirmation that the account was fraudulent or disputed.


195. Preventive measures

To prevent false online loans:

  • Do not send IDs to unknown persons.
  • Watermark ID copies.
  • Avoid suspicious lending apps.
  • Do not install APKs.
  • Secure phone and SIM.
  • Use strong passwords.
  • Enable two-factor authentication.
  • Do not share OTPs.
  • Keep social media photos private.
  • Avoid posting IDs online.
  • Report lost IDs.
  • Monitor e-wallets.
  • Review app permissions.
  • Keep copies of reports.
  • Warn family about identity scams.

196. Practical dispute packet

Prepare a folder containing:

  1. One-page summary.
  2. Affidavit or written statement of denial.
  3. Timeline.
  4. Screenshots of collection messages.
  5. Screenshots of threats to post photos.
  6. Screenshots of posted photos or messages to contacts.
  7. Proof you did not receive funds.
  8. Bank/e-wallet statements.
  9. Lost ID/phone/SIM report, if applicable.
  10. App/company details.
  11. Collector numbers.
  12. Reports filed.
  13. Requested remedies.

197. Sample one-page summary

I am reporting a false online loan made under my stolen identity. I did not apply for, authorize, sign, receive, or benefit from this loan. Collectors from [app/company/number] contacted me on [date] and demanded payment of ₱[amount]. They threatened to post my photos and sent messages to my contacts. I dispute the debt and request investigation of identity theft, immediate stop to collection, protection of my personal data, takedown of posted photos, and preservation of all application and disbursement records.


198. Key points to remember

  1. Do not admit or pay a loan you did not take without legal advice.
  2. Immediately dispute the debt in writing.
  3. Demand proof of application, consent, and disbursement.
  4. Preserve all messages, threats, posts, and call logs.
  5. Threats to post photos are serious and may be reportable.
  6. Contacts and references are not automatically liable.
  7. A government ID or selfie alone does not conclusively prove you borrowed.
  8. If your identity was stolen, report to police or cybercrime authorities.
  9. If your personal data or photos are shared, consider privacy complaints.
  10. If the lender is an online lending app, consider SEC complaint for abusive collection.
  11. If photos are posted online, screenshot first, then seek takedown.
  12. Secure your phone, SIM, email, e-wallets, and social media.
  13. Warn contacts not to pay or respond.
  14. If a real subpoena or court document arrives, consult a lawyer immediately.
  15. Keep all reports and confirmations to protect your future credit and reputation.

Conclusion

A false online loan under stolen identity is not a simple unpaid debt. It may involve identity theft, fraudulent loan application, misuse of personal data, cybercrime, abusive collection, and threats to publicly shame the victim through photos or personal information.

The victim should act quickly but carefully: dispute the loan in writing, demand proof, preserve evidence, report identity theft, secure accounts, warn contacts, and file complaints with the proper authorities. Threats to post borrower photos, IDs, or personal details should be documented and reported because they may cause serious privacy and reputational harm.

The central rule is clear: a person should not be forced to pay a loan they did not apply for or receive, and no lender or collector has the right to use stolen identity, public shaming, or threats to collect a disputed debt.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.