A Philippine Legal Article
The non-consensual distribution of explicit videos is one of the clearest forms of technology-facilitated sexual violence in the Philippines. In ordinary language, it is often called “revenge porn,” but that label is too narrow. The conduct is not limited to ex-partners, not always motivated by revenge, and not confined to pornography as a commercial category. At its core, the wrong is this: a person’s sexually explicit image or video is shared, shown, uploaded, forwarded, sold, threatened to be released, or otherwise circulated without that person’s valid consent. In Philippine law, this may trigger liability under the Safe Spaces Act, and often also under the Anti-Photo and Video Voyeurism Act of 2009, the Data Privacy Act of 2012, the Cybercrime Prevention Act of 2012, the Revised Penal Code, and, depending on the victim’s age or other facts, child-protection laws.
This article explains the Philippine legal framework, how a complainant may file a case, what must be proved, what evidence matters, which agencies and courts are involved, what defenses commonly arise, and how the Safe Spaces Act fits into the larger system of remedies.
I. The conduct covered
Non-consensual distribution of explicit videos can happen in many forms:
- uploading a sex video to Facebook, X, Telegram, Reddit, Discord, pornographic websites, or cloud links;
- sending the video privately through Messenger, Viber, WhatsApp, SMS, AirDrop, email, or group chats;
- showing the video to others on a phone or laptop even without posting it publicly;
- selling or trading the file;
- threatening to release the video unless the victim gives money, sex, reconciliation, silence, or other compliance;
- reposting a video first uploaded by another person;
- deep-linking, quote-posting, or re-circulating copies already “out there”;
- secretly recording an intimate act, then later distributing it;
- sharing screenshots, clips, GIFs, thumbnails, or still frames taken from the original video;
- tagging, naming, doxxing, or identifying the victim in connection with the explicit content.
The law does not turn only on whether the victim once consented to being recorded. A person may consent to the creation of a private intimate video and still not consent to its publication, forwarding, exhibition, or reposting. Consent to one act is not consent to all later acts.
II. Why the Safe Spaces Act matters
The Safe Spaces Act is the Philippines’ principal statute against gender-based sexual harassment in public spaces, online spaces, workplaces, and educational or training institutions. Its significance in explicit-video cases lies in its recognition that online conduct can itself be gender-based sexual harassment, including acts done through information and communications technology that invade, threaten, humiliate, intimidate, or violate a person on account of sex, sexual orientation, gender identity or expression, or related sexual circumstances.
In practice, the Safe Spaces Act is especially relevant where the distribution of an explicit video is accompanied by:
- sexualized threats or coercion;
- misogynistic or gendered abuse;
- humiliation, stalking, or intimidation online;
- publication meant to shame the victim as a woman, LGBTQIA+ person, or sexual being;
- repeated sending, posting, messaging, or coordinated harassment;
- blackmail involving release of intimate content;
- harassment in digital spaces connected to work, school, public life, or community.
The Safe Spaces Act is often not the only law involved. It is one of several possible legal bases. Many complaints are strongest when framed as a combination of violations rather than as a single-statute case.
III. The core Philippine laws typically implicated
1. Safe Spaces Act
The Safe Spaces Act addresses gender-based online sexual harassment. When intimate videos are distributed without consent and the surrounding conduct is sexually abusive, threatening, humiliating, or coercive, the act may fall within its coverage. The law is broad enough to reach conduct committed through online platforms, messaging systems, and electronic means.
In filing terms, the Safe Spaces Act is useful where the complainant wants to emphasize that the wrongdoing is not merely a privacy breach but a sexual harassment violation in online spaces.
2. Anti-Photo and Video Voyeurism Act of 2009
This is usually the most directly on-point statute in explicit-image or explicit-video distribution cases. It addresses acts such as:
- taking photos or videos of a person’s sexual act or private area without consent and under circumstances where the person has a reasonable expectation of privacy;
- copying or reproducing such material;
- selling, distributing, publishing, broadcasting, or exhibiting such material without consent;
- causing the same to be uploaded or disseminated through ICT.
This law is often central where the intimate video is authentic and its distribution is the principal misconduct.
3. Cybercrime Prevention Act of 2012
When the prohibited act is committed through computers, networks, platforms, or the internet, cybercrime-related provisions may apply. Depending on the charging theory, this statute may either create a distinct offense, qualify the means of commission, or affect jurisdiction, electronic evidence handling, and law enforcement procedure. In practice, cybercrime investigators and cybercrime prosecutors are commonly involved.
4. Data Privacy Act of 2012
Explicit videos containing a person’s image and identity involve highly sensitive personal information in a practical sense, and their unauthorized processing, disclosure, or sharing may create liability. This is particularly relevant where:
- the distributor obtained the file through access to a device, cloud drive, workplace system, or database;
- the video was shared by someone with custody or control over the data;
- a platform operator, employee, school official, or organization mishandled reports or records;
- there was unauthorized disclosure of identifying details alongside the video.
The Data Privacy Act is not always the lead charge in intimate-video cases, but it can be a strong supplemental basis.
5. Revised Penal Code offenses
Depending on the facts, prosecutors may also consider:
- grave threats or light threats if release of the video is used to intimidate;
- unjust vexation where conduct is harassing and abusive but proof for other charges is incomplete;
- grave coercion where the victim is forced to do or avoid doing something under threat of exposure;
- libel/cyberlibel if false captions, accusations, or imputations accompany the video;
- slavery-like or exploitation-related offenses in extreme coercive situations;
- violence against women-related offenses if the facts overlap with intimate-partner abuse.
6. VAWC and related laws
If the offender is a current or former intimate partner, the case may also overlap with Violence Against Women and Their Children law, especially where the distribution is part of psychological violence, coercive control, or abuse in a relationship. In actual litigation, many fact patterns involving ex-boyfriends, spouses, live-in partners, or fathers of children can be viewed not only as online sexual harassment or voyeurism, but as gendered domestic abuse.
7. Child protection laws
If the victim is below 18, the legal landscape changes dramatically. The material may be treated as child sexual abuse or child sexual exploitation material, and law enforcement response becomes more urgent and more severe. Consent is legally constrained or irrelevant in ways different from adult cases.
IV. Is the Safe Spaces Act enough by itself?
Sometimes yes, but often no single law should be relied on alone.
A complainant can file a complaint emphasizing the Safe Spaces Act, particularly where the conduct is online gender-based sexual harassment. But in many explicit-video cases, the Anti-Photo and Video Voyeurism Act is the more direct fit for the actual recording or distribution, while the Safe Spaces Act captures the harassment, humiliation, intimidation, and online abuse that accompany it.
A strong legal strategy in Philippine practice often identifies all plausible violations arising from the same facts. The prosecutor, not the complainant, ultimately determines the formal Information to be filed in court, but the complaint-affidavit should lay out the full picture.
V. Key legal elements that usually matter
Even without quoting statutory text section by section, the following factual elements usually determine whether a case is strong.
1. There is explicit or intimate content
The material must depict sexual acts, sexual conduct, nudity, private body parts, or intimate circumstances of a sexual nature.
2. The victim did not validly consent to the distribution
This is often the most important issue. Consent to being in a relationship, to being photographed, to participating in a private recording, or even to sending the file to one person does not automatically mean consent to wider circulation.
3. The accused intentionally shared, posted, exhibited, forwarded, uploaded, sold, or threatened to release it
Intent can be shown through direct proof or circumstantial evidence.
4. There is a link between the accused and the dissemination
The complainant should be able to show how the accused got the file, had motive, had access to the device or account, admitted the act, was identified by recipients, or was traced through messages, metadata, account ownership, witness testimony, or platform records.
5. The act caused or was likely to cause harassment, humiliation, intimidation, or injury
This matters especially under the Safe Spaces Act framing, but it is also important generally in explaining why the conduct is criminal and harmful.
6. Online transmission or electronic means were used
This becomes important for cybercrime handling, preservation requests, and electronic evidence.
VI. Consent: the issue most people get wrong
The most common misconception is that once a person agreed to be recorded, the law is powerless if the file is later leaked. That is false.
In Philippine legal analysis, consent is specific, limited, and contextual. A person may:
- consent to a private consensual recording,
- refuse any copying,
- refuse cloud storage,
- refuse sharing with friends,
- refuse publication,
- refuse re-sending after breakup,
- withdraw permission for retention,
- object to any later use once the relationship ends.
Another misconception is that because the victim originally sent the video to the accused, the accused “owns” it. Personal possession of a file is not a license to distribute it. Distribution without consent can still be unlawful.
Another misconception is that once the video is already viral, reposting “doesn’t matter.” It does. Every repost can be a fresh act of dissemination and harm.
VII. Threats to release an explicit video can be actionable even before publication
A victim need not always wait until the video is actually uploaded. If the accused says, in substance:
- “Get back with me or I’ll post it,”
- “Send money or I’ll leak it,”
- “Do what I say or your family will see this,”
- “I’ll send it to your office, school, church, or husband,”
that can support charges involving threats, coercion, online sexual harassment, extortion-related conduct, and, depending on the surrounding facts, VAWC or other offenses. The threatened release itself is part of the violence.
From a case-building perspective, the victim should preserve every threat message, including deleted-message indicators, voice notes, call logs, and screenshots of disappearing messages if possible.
VIII. Who may file the case?
The primary complainant is usually:
- the person depicted in the video;
- in some cases, the parent or guardian if the victim is a minor;
- a duly authorized representative where necessary, though criminal complaints are strongest when the victim executes the affidavit personally.
If the victim is incapacitated, abroad, hospitalized, or under immediate danger, counsel and law enforcement can help structure the complaint process.
IX. Where to file in the Philippines
The practical options usually include one or more of the following:
1. Police, especially cybercrime-focused units
The complaint may be reported to police units capable of handling electronic evidence and online tracing.
2. NBI Cybercrime or similar investigative bodies
This is common where:
- accounts must be traced,
- devices need forensic examination,
- online platforms need preservation requests,
- email/IP/device evidence matters,
- the material has spread across multiple channels.
3. Prosecutor’s Office
The formal criminal complaint-affidavit and supporting affidavits/documents are filed for preliminary investigation before the proper prosecutor’s office, subject to procedural rules and venue considerations.
4. Women and Children Protection resources
If the facts involve intimate-partner abuse, sexual coercion, or a minor, specialized protection channels are especially important.
5. Barangay?
Generally, criminal offenses of this nature are not something to “settle” at barangay level as if they were ordinary neighborhood disputes. Barangay intervention may be relevant only in limited ancillary situations, but a complainant should not be diverted away from formal criminal reporting.
X. Venue and jurisdiction
Venue can be complicated in online cases. A case may have links to several places:
- where the victim was when the content was accessed or harm was felt;
- where the accused posted or sent the material;
- where recipients viewed it;
- where the account or device was used;
- where the original recording occurred.
Because multiple statutes may be implicated, and cybercrime dimensions affect jurisdictional analysis, complainants should frame all relevant locations clearly in the affidavit rather than guessing at a single venue theory. In practice, investigators and prosecutors use those facts to determine the proper filing venue.
XI. What to prepare before filing
A well-prepared complaint is often the difference between a case dismissed for lack of proof and a case that moves forward.
1. Complaint-affidavit of the victim
This should narrate in chronological detail:
- who the accused is;
- how the relationship began;
- how the video was created or obtained;
- what was or was not consented to;
- when the victim learned of the sharing;
- who informed the victim;
- what exact messages, posts, links, captions, or threats were sent;
- what the accused said before and after;
- what platforms were used;
- how the victim was identified in the content;
- what emotional, reputational, educational, professional, or family harm followed.
The affidavit should be precise, factual, and chronological, not merely emotional or conclusory.
2. Screenshots and screen recordings
Preserve:
- chats;
- timestamps;
- usernames and profile URLs;
- post links;
- comments;
- group chat names;
- forwarding indicators;
- threats;
- admissions;
- account recovery emails;
- payment requests, if extortion is involved.
Take screenshots showing the entire screen where possible, not cropped snippets only.
3. URL links and platform identifiers
Even if a post is deleted later, the original URL, account handle, channel name, message ID, invite link, or upload path can matter.
4. Device and file evidence
If the victim still has:
- the original video,
- the version sent to the accused,
- the leaked copy,
- metadata,
- cloud logs,
- backup histories,
these may help establish source and chain of distribution.
5. Witness affidavits
Useful witnesses include:
- the first person who saw the post and informed the victim;
- recipients who received the video from the accused;
- school or workplace persons who saw the dissemination;
- friends who witnessed threats;
- IT or admin personnel who preserved records.
6. Medical or psychological documentation
This is not always legally required, but it can strengthen proof of harm, especially where trauma, panic attacks, depression, inability to work, or need for counseling followed.
7. Proof of identity
If the video does not show the face clearly, the victim may need to explain identifiers:
- voice,
- body marks,
- bedroom setting,
- clothing,
- messages referencing the video,
- simultaneous chat admissions,
- context tying the file to the victim.
8. Preservation of deleted evidence
Do not assume deleted posts are gone forever. Preserve:
- cache copies,
- forwarded copies,
- emails,
- backup exports,
- witness screenshots,
- platform complaint confirmations.
XII. Electronic evidence: the real battleground
Many explicit-video cases are won or lost on electronic evidence. Philippine complaints should be built with care because defense counsel often attacks authenticity, source, and attribution.
Important concerns include:
1. Authenticity
Can the complainant show that the screenshot, file, or message is what it claims to be?
2. Integrity
Has the file been altered, edited, renamed, or recompressed?
3. Attribution
Can the act be tied to the accused, rather than an unknown troll or fake account?
4. Chain
Who first saw it? Who saved it? Who forwarded it? Who can testify?
5. Preservation
Were the original devices kept? Were exports or forensic captures made early?
The more serious the case, the less the complainant should rely solely on casual screenshots. Investigative agencies may need to secure device extraction, account records, IP traces, subscriber data subject to legal process, or certified platform records.
XIII. What the complaint-affidavit should say about the Safe Spaces Act
Where the complainant wants to invoke the Safe Spaces Act, the affidavit should clearly show that the conduct was not just “sharing a file,” but gender-based online sexual harassment. The narrative should describe:
- the sexual nature of the material;
- the non-consensual manner of dissemination;
- the humiliating, threatening, degrading, or coercive context;
- the use of digital platforms or electronic means;
- the gendered abuse, misogynistic slurs, sexual taunts, outing, or public shaming accompanying the release;
- the impact on the victim’s safety, dignity, and freedom to participate online, at work, at school, or in public.
This framing matters because it places the conduct within the law’s protective purpose: preserving safe spaces, including online spaces, from sexualized abuse.
XIV. Step-by-step: how a case is usually filed
1. Secure the evidence immediately
Before confronting the accused, preserve everything. Many offenders delete accounts, wipe devices, or fabricate claims once alerted.
2. Report to investigators
Go to an appropriate cybercrime-capable law enforcement office or investigative body. Bring:
- IDs,
- screenshots,
- URLs,
- device if necessary,
- names of witnesses,
- chronology.
3. Execute a sworn complaint-affidavit
The victim signs a sworn narrative, often with annexes marked and identified.
4. Attach supporting affidavits and annexes
Witness statements, screenshots, screenshots of profiles, threat messages, and copies of the file are attached where necessary and safely handled.
5. File for preliminary investigation
The prosecutor evaluates whether there is sufficient basis to proceed.
6. Respond to counter-affidavits
The accused may deny authorship, claim hacking, assert consent, or say the account was fake. A strong reply-affidavit is often critical.
7. Resolution by prosecutor
If probable cause is found, the prosecutor files the criminal Information in court.
8. Court proceedings
This may include issuance of warrant, arraignment, pretrial, trial, presentation of digital evidence, and testimony.
XV. Common defenses and how they are tested
1. “She consented.”
This is often incomplete or misleading. The real question is: consented to what, exactly? Recording? Possession? Viewing? Distribution? Public posting? Sending to friends? Uploading after breakup? The prosecution should separate each act.
2. “My account was hacked.”
This defense is common. It is tested against:
- account activity,
- device history,
- admissions,
- password control,
- behavior after the leak,
- witness testimony,
- recovery emails and phone numbers,
- prior threats.
3. “I only forwarded what was already public.”
Reposting still causes harm and can still be actionable.
4. “The victim sent it to me first.”
Initial receipt is not blanket authority to circulate.
5. “It’s not her in the video.”
Identity can be proved through context, admissions, voice, features, messages, witnesses, or surrounding facts.
6. “It was a joke.”
Humiliation by “joke” is still humiliation. Sexualized harassment is not excused by humor.
7. “No damage was proven.”
Criminal liability does not always depend on proving monetary damage. Harm to dignity, privacy, safety, and psychological well-being is legally significant.
XVI. Standard of proof at each stage
A complainant should understand that the burden changes by stage:
- Investigation stage: probable cause, not proof beyond reasonable doubt.
- Trial stage: guilt must be established beyond reasonable doubt.
This matters because many victims incorrectly think they need perfect evidence before filing. They do not need a fully trial-ready digital-forensics package just to report the offense. But the more organized the evidence is from the start, the better.
XVII. Can the victim ask for immediate takedown?
Yes, and they should pursue this quickly through all available channels.
Practical measures include:
- reporting the content to the platform immediately;
- preserving evidence before removal;
- using platform forms for non-consensual intimate imagery;
- asking investigators or counsel to issue preservation or disclosure requests consistent with law;
- notifying websites, hosts, and channels;
- documenting every report made and every response received.
Takedown is not the same as criminal prosecution. Both should be pursued in parallel where possible.
XVIII. Can the victim also sue civilly?
Yes. Even if the main path is criminal, the victim may have civil claims arising from:
- invasion of privacy,
- moral damages,
- exemplary damages,
- actual damages where provable,
- violations tied to data privacy or other statutory rights.
The precise civil theory depends on facts and litigation strategy. In some criminal actions, civil liability is deemed instituted unless reserved or waived according to procedural rules.
XIX. Special issues in workplace and school settings
When the distribution occurs among co-workers, classmates, teachers, students, trainees, or within institutional channels, the case may also involve administrative liability and institutional duties.
In workplaces
The employer may have duties to investigate and prevent sexual harassment and hostile environments. Failure to act on known circulation of explicit videos involving an employee can create separate consequences.
In schools
Educational institutions have obligations to address sexual harassment and protect students or trainees. A school that ignores dissemination in class chats, org groups, or campus networks may face legal and regulatory consequences.
Under the Safe Spaces Act framework, the institution’s duty to maintain a safe environment can become highly relevant.
XX. LGBTQIA+ victims and gender-based framing
The Safe Spaces Act is especially important in cases involving:
- outing through intimate content,
- same-sex relationship breakups followed by sexualized exposure,
- humiliation based on gender identity or expression,
- transphobic or homophobic captions attached to explicit materials.
The violence is not reduced merely because the parties are of the same sex or because the content is “consensual” in origin. What matters is the non-consensual sexualized dissemination and the gender-based abuse surrounding it.
XXI. Minors: a radically different category
If the person depicted is a minor, the matter becomes far more serious. The law treats sexual content involving minors with exceptional severity. Even consensually made “private” content between minors can trigger grave consequences once possessed, sent, stored, or shared. Anyone handling such evidence must be extremely careful and should avoid unnecessary copying or circulation.
For filing purposes, authorities should be informed immediately, and the evidence should be handled through proper channels.
XXII. Deepfakes and edited explicit videos
A growing category involves fabricated or manipulated explicit videos. Even if the victim was never actually recorded, the creation and circulation of false explicit imagery can still support serious legal action under harassment, cybercrime, privacy, and related theories. Under a Safe Spaces Act lens, the essential harm remains: online gender-based sexual abuse through sexualized digital material.
The complainant should clearly state whether the video is:
- authentic,
- altered,
- AI-generated,
- face-swapped,
- partially edited,
- falsely captioned.
Falsehood does not neutralize harm; in some respects it aggravates the attack.
XXIII. Blackmail, extortion, and sexual coercion
In many Philippine cases, the explicit video is not posted immediately. It is used as leverage to force:
- sex,
- reconciliation,
- silence,
- money,
- withdrawal of complaints,
- continued relationship,
- obedience,
- access to more images.
This should never be narrated in the affidavit as mere “personal conflict.” It is often a coercive crime pattern. The prosecutor should be given the full extortion or threat context.
XXIV. Delay in reporting does not destroy the case
Victims often delay reporting due to shame, fear of family reaction, economic dependence, community gossip, or trauma. Delay is common and explainable in sexualized abuse cases. It does not automatically make the accusation false.
What matters is whether the explanation is credible and whether the evidence supports the account.
XXV. What victims should avoid doing
To preserve the case, the victim should avoid:
- publicly bargaining with the accused through social media fights if that risks more deletion or manipulation of evidence;
- sending retaliatory threats;
- editing screenshots;
- reposting the explicit video “to prove it exists”;
- sharing the material widely with friends instead of preserving it responsibly;
- surrendering the only device copy without documenting what was on it;
- accepting cash “settlement” without legal advice where the offense is criminal and harm is ongoing.
XXVI. Practical evidentiary checklist
A strong filing packet may include:
- Victim’s affidavit
- Witness affidavits
- Screenshot bundle with dates and explanations
- URL and username list
- Device ownership information
- Copy of the leaked file, if legally and forensically appropriate
- Proof of original communication with accused
- Threat messages or admissions
- Psychological report, if available
- School or workplace notices showing impact
- Proof of takedown reports
- ID copies and authorization documents where needed
Each annex should be labeled and explained in the affidavit, not simply attached without narrative.
XXVII. How prosecutors usually view case strength
A case is typically stronger when:
- the accused had exclusive or primary access to the file;
- there were prior threats to release it;
- recipients can identify the accused as sender;
- the accused used personal accounts tied to real identity;
- timestamps and chronology line up;
- the victim clearly withheld consent to distribution;
- the digital trail is preserved;
- the dissemination caused concrete disruption at home, work, or school;
- there is no plausible innocent explanation for the circulation.
A case is weaker when:
- there is no clear proof linking the accused to the upload;
- the material is already so widely diffused that source tracing is difficult;
- the victim’s own affidavit is vague or contradictory;
- the evidence consists only of cropped screenshots without identifiers;
- the complaint focuses on outrage but not facts.
XXVIII. Interaction of criminal and administrative remedies
In some settings, three tracks may proceed at once:
- criminal complaint against the offender;
- administrative complaint in workplace or school;
- civil claim for damages.
These tracks have different standards, procedures, and purposes. A failed administrative case does not automatically kill a criminal case, and vice versa.
XXIX. Privacy, dignity, and constitutional values
At a deeper level, explicit-video distribution cases are not only about obscenity or scandal. They are about:
- privacy,
- sexual autonomy,
- bodily dignity,
- informational control,
- freedom from coercion,
- equal participation in digital and public life.
The Safe Spaces Act is important because it shifts the legal lens from “private immorality” to publicly actionable sexual harm, especially where online spaces are used to degrade and control.
XXX. The most important legal framing point
The best Philippine framing is usually this:
Non-consensual distribution of explicit videos is not just a “viral scandal” or breakup issue. It is a form of sexual violence and online harassment that may simultaneously violate the Safe Spaces Act, the Anti-Photo and Video Voyeurism Act, cybercrime-related laws, data privacy protections, and other penal statutes depending on the facts.
That framing helps investigators, prosecutors, and courts see the full legal gravity of the act.
XXXI. Draft structure of a complaint theory
A well-built complaint often alleges, in substance:
- The accused obtained or had access to the intimate video.
- The victim never consented to its distribution, publication, or forwarding.
- The accused threatened and/or actually disseminated the material through electronic means.
- The dissemination was sexualized, humiliating, and gender-based in context.
- The conduct caused severe emotional distress, reputational damage, fear, and disruption of daily life.
- The acts constitute one or more criminal violations, including the Safe Spaces Act and other applicable Philippine laws.
XXXII. A note on terminology
The term “revenge porn” is common but imperfect. Better terms include:
- non-consensual intimate image distribution;
- non-consensual distribution of explicit videos;
- image-based sexual abuse;
- technology-facilitated sexual violence.
These terms are broader and more accurate because the offender may be motivated by profit, coercion, bragging, humiliation, or sadism rather than revenge alone.
XXXIII. Bottom line
In the Philippine setting, filing a case for the non-consensual distribution of explicit videos under the Safe Spaces Act is legally viable, especially when the conduct amounts to gender-based online sexual harassment. But in many cases, the strongest complaint does not stop there. It also invokes the Anti-Photo and Video Voyeurism Act, and, where supported by facts, the Cybercrime Prevention Act, Data Privacy Act, threats or coercion provisions, VAWC, and child-protection laws.
The decisive issues are usually:
- lack of consent to distribution,
- proof linking the accused to the dissemination or threats,
- quality and preservation of digital evidence,
- clear narration of the sexualized, harmful, and gender-based nature of the act.
For victims, the legal system works best when the complaint is filed early, evidence is preserved carefully, and the conduct is described not as mere gossip or scandal, but as a serious violation of privacy, dignity, safety, and sexual autonomy.
In Philippine law, that is exactly what it is.