Filing a Complaint Against Dummy Accounts and Online Harassment

1) The problem in plain terms

“Dummy accounts” are social media or online accounts that hide a user’s real identity. In the Philippines, having a pseudonymous or anonymous account is not automatically illegal. It becomes legally actionable when the account is used to commit a punishable act—such as cyber libel, threats, identity theft/impersonation, unlawful disclosure of intimate images, doxxing, fraud, stalking-like harassment, or gender-based online sexual harassment—or when it is used to conceal a crime or cause damage.

Online harassment is not one single crime. It is a cluster of possible offenses depending on what was said or done, how it was done, and what harm it caused.

This article maps the legal bases, evidence requirements, where to file, and how cases move in the Philippine system.


2) What counts as “online harassment” legally

Common patterns that may be actionable:

  • Repeated unwanted messages: profanity, humiliation, targeted harassment, coercive messaging
  • Threats: “I will hurt you,” “I will release your photos,” “I’ll ruin your business”
  • Public posts naming/shaming, calling you a criminal, accusing you of immorality, attacking reputation
  • Impersonation: pretending to be you, using your photos/name, sending messages as you
  • Doxxing: publishing home address, workplace, phone number, family details
  • Non-consensual sharing of sexual or intimate images/videos
  • Sexualized attacks (especially against women/LGBTQ+): lewd messages, sexual threats, sexist slurs, “rate your body,” etc.
  • Harassment tied to an intimate partner relationship (ex, spouse, dating partner) used to control, intimidate, or punish
  • Harassment involving minors (higher urgency; additional child-protection laws apply)

3) Core Philippine laws you will most often use

A) Cybercrime Prevention Act of 2012 (RA 10175)

This is the main “bridge” law that brings certain crimes into the online space and adds cybercrime procedures.

Common cyber-related offenses invoked with dummy accounts:

  • Cyber libel (libel committed through a computer system)
  • Computer-related identity theft / impersonation-style conduct (when someone uses identifying information belonging to another)
  • Related cyber offenses depending on facts (illegal access, data interference, computer-related fraud, etc.)

RA 10175 is also important because it supports law enforcement requests and court-issued orders for digital evidence (subscriber info, IP logs, preservation, etc.) via cybercrime procedures and designated cybercrime courts.

B) Revised Penal Code (RPC) offenses often paired with online conduct

Depending on content and intent, online harassment may fall under:

  • Libel / defamation (reputation-harming false imputations)
  • Grave threats / light threats
  • Coercion (forcing you to do something through intimidation)
  • Unjust vexation (broad, fact-specific “annoyance/harassment” conduct; often used in persistent harassment patterns)
  • Slander by deed (humiliating acts; can appear online via certain acts/gestures/edits)
  • Other fact-dependent crimes

C) Safe Spaces Act (RA 11313) — Gender-Based Online Sexual Harassment

If the harassment is sexual, sexist, misogynistic, homophobic/transphobic, or otherwise gender-based, RA 11313 can apply. This can cover:

  • Sexual remarks, unwanted sexual advances online
  • Sexual threats
  • Non-consensual sexual content-related attacks
  • Repeated sexualized harassment in digital spaces

This is especially relevant when the conduct is sexual in nature and targeted.

D) Anti-Photo and Video Voyeurism Act (RA 9995)

Applies when someone:

  • Takes intimate photos/videos without consent or
  • Shares or threatens to share intimate images/videos without consent

This often overlaps with “revenge porn” behavior.

E) Anti-VAWC Act (RA 9262) — if the offender is an intimate partner / spouse / dating partner

If the harasser is a husband, ex-husband, boyfriend/girlfriend, ex, or someone you have/had a dating/sexual relationship with, online harassment may qualify as psychological violence, including threats, stalking-like behavior, humiliation, and coercion through digital means.

RA 9262 is powerful because it supports Protection Orders (see below).

F) Data Privacy Act of 2012 (RA 10173)

If there’s doxxing or unlawful processing/disclosure of personal data (address, IDs, workplace details, family info, photos used beyond consent), there may be a Data Privacy angle:

  • Complaint can be pursued in appropriate cases (including through the National Privacy Commission route, depending on facts).

G) Child-protection laws (if a minor is involved)

If the victim is a minor, or content involves minors, additional laws apply (child pornography/online sexual exploitation regimes). These cases are treated with higher urgency, and specialized units should be engaged.


4) Dummy accounts: what is and isn’t illegal

Not automatically illegal:

  • Anonymous/pseudonymous accounts used for ordinary speech, satire, commentary, fandom, privacy

Potentially illegal:

  • Impersonation (posing as you or another identifiable person)
  • Identity theft or use of your identifying data to create credibility or cause harm
  • Using a fictitious name to conceal a crime or cause damage
  • Harassment, threats, extortion, defamation, voyeurism, fraud committed through the account
  • Coordinated attacks (especially with threats, doxxing, sexual harassment)

The key legal question is not “Is it a dummy account?” but “What crime or civil wrong was committed using it?”


5) Choosing the right “cause of action”: a practical charging guide

Because online harassment varies, complaints are often filed with multiple possible offenses (“in relation to” cybercrime law where applicable). Common pairings:

Scenario 1: Reputation attacks (public posts accusing you of crimes/immorality)

  • (Cyber) libel is often considered when posts are defamatory, identifiable, and published online.

Scenario 2: “I will hurt you / ruin you / leak your nudes”

  • Threats (and possibly coercion or extortion concepts depending on demands)
  • If intimate images are involved: RA 9995 angles may apply.

Scenario 3: Impersonation (fake profile using your name/photos)

  • Computer-related identity theft (RA 10175) and/or related provisions, depending on how identity data was used and harm caused.
  • Potential civil remedies and takedown steps (platform reporting + evidence preservation).

Scenario 4: Doxxing (posting your address, workplace, phone number)

  • Potential Data Privacy complaint angle
  • Threats/coercion if used to intimidate
  • In some cases, unjust vexation/harassment-type filing depending on pattern

Scenario 5: Sexualized harassment or sexist attacks

  • RA 11313 (Safe Spaces Act) for gender-based online sexual harassment
  • Add other crimes if threats/voyeurism are involved

Scenario 6: Ex-partner harassment, control, humiliation, threats

  • RA 9262 (Anti-VAWC) + Protection Orders
  • Often the most effective route when relationship requirement is met

6) Evidence: what wins (and what fails) in digital harassment cases

Most cases fail due to weak evidence preservation. The goal is to prove:

  1. What was posted/sent
  2. That it was published and seen
  3. That you are the target / identifiable
  4. That it caused harm / meets elements of the offense
  5. Linkage (tying the dummy account to a real person, if possible)

Minimum evidence checklist

  • Screenshots that include:

    • Username/handle and profile URL
    • Date/time stamps if available
    • Entire message thread context (not just one line)
  • Screen recording scrolling from the profile to the post to show continuity

  • Direct links (URLs) to posts/comments/messages

  • Copies of messages (export tools where available)

  • Witness statements (people who saw the posts, received messages, or can identify patterns)

  • Evidence of harm:

    • Medical/psychological consult notes if applicable
    • Work/business impact (client cancellations, HR memos, lost income)
    • Security incidents, police blotter entries
  • Preserve metadata if possible:

    • Original files (images/videos) and not just screenshots
    • Device backups
    • Email notifications from the platform showing content and timestamps

Authenticating electronic evidence (why it matters)

Philippine courts follow the Rules on Electronic Evidence and related principles: you generally need to show the evidence is authentic and unaltered. In practice, this often means:

  • The person who captured the screenshots can execute an affidavit explaining how, when, and where they were captured.
  • Keep originals and avoid re-editing images.
  • Avoid “cropped” screenshots that remove context—cropping invites “fabrication” defenses.

A common mistake: confronting the harasser before preserving

Confrontation often triggers deletion. Preserve first, report second, confront last (if ever).


7) Identifying the person behind a dummy account

Victims often ask: “Can authorities force Facebook/TikTok/X to reveal who it is?”

Sometimes, but not instantly. Identification typically depends on:

  • Platform cooperation and
  • Lawful requests/orders (depending on what data is sought)

In practice:

  • Law enforcement (PNP Anti-Cybercrime Group / NBI Cybercrime Division) can handle the technical and legal coordination.
  • For deeper data (subscriber info, IP logs), authorities may need appropriate legal process through cybercrime procedures and designated courts.

Practical linkage evidence you can gather (legally)

  • Repeated patterns: writing style, recurring phrases, timing
  • Cross-posted content leading to another identifiable account
  • Connections: the dummy account consistently interacts with the same circle
  • Screenshots showing the account advertising its real identity (even indirectly)
  • Admissions in chat (e.g., “Alam mo naman ako ‘to…”)—preserve carefully

Avoid “hacking back,” doxxing, or illegal access. That can expose you to liability.


8) Where to file in the Philippines

A) PNP Anti-Cybercrime Group (ACG)

Good for:

  • Cyber libel guidance
  • Online threats, impersonation, fraud, harassment patterns
  • Technical assistance and evidence handling

B) NBI Cybercrime Division

Good for:

  • More complex cases, identity theft/impersonation, fraud networks
  • Evidence handling and coordination for data requests

C) Prosecutor’s Office (Office of the City/Provincial Prosecutor)

This is where criminal complaints proceed for preliminary investigation, usually after you execute:

  • Complaint-Affidavit
  • Supporting affidavits of witnesses
  • Attachments (screenshots, printouts, device records)

Often, victims start with PNP/NBI for evidence handling, then file with the prosecutor.

D) Barangay / Local mechanisms

This can be useful for certain disputes between known parties in the same locality, but many cybercrime-related complaints are not ideal for barangay conciliation, especially when the respondent is unknown, outside the area, or when urgent protective relief is needed.

E) Specialized routes when applicable

  • VAWC Desk / Women and Children Protection Desk for RA 9262 scenarios
  • School mechanisms for student-related bullying/harassment (administrative remedies alongside criminal/civil options)
  • Data Privacy complaints where unlawful processing/disclosure of personal data is central

9) Step-by-step: how to file a criminal complaint (typical flow)

Step 1: Document and preserve

Use the evidence checklist above. Save everything in organized folders:

  • “Post links”
  • “Screenshots”
  • “Screen recordings”
  • “Witness statements”
  • “Timeline”

Create a simple timeline (date, platform, what happened, link, evidence file name).

Step 2: Decide the best legal theory (or combination)

Pick the most fitting laws:

  • Defamation? Threats? Voyeurism? Identity theft? Gender-based harassment? VAWC?

It’s common to allege alternative offenses in a complaint, especially early on, because exact classification can shift as evidence develops.

Step 3: Execute affidavits

Prepare:

  • Complaint-Affidavit (your narrative, facts, dates, harm, and prayer for action)
  • Affidavits of witnesses (if any)
  • Attach and properly label evidence

Step 4: File with PNP ACG / NBI (optional but often helpful)

They can help ensure evidence is handled properly and guide cybercrime process.

Step 5: File with the Prosecutor

Submit complaint packet for preliminary investigation.

  • If respondent is unknown (“John/Jane Doe”), that can still be filed, but identification issues may affect speed and strategy.

Step 6: Preliminary investigation and counter-affidavits

  • Prosecutor may issue subpoena to the respondent (if known/identified).
  • Respondent files counter-affidavit; you file reply.
  • Prosecutor resolves whether there is probable cause.

Step 7: Case filed in court if probable cause is found

For cybercrime-related cases, these are often raffled to designated cybercrime courts (where applicable).


10) Protection orders and urgent relief

If the harassment involves an intimate partner (RA 9262), consider Protection Orders:

  • Barangay Protection Order (BPO) (faster, limited scope)
  • Temporary Protection Order (TPO)
  • Permanent Protection Order (PPO)

Protection orders can prohibit contact, harassment, stalking-like acts, and communication—including online contact—depending on the order’s terms.

If the situation involves threats or immediate danger, prioritize safety planning and seek help from law enforcement promptly.


11) Civil remedies (often overlooked)

Even when a criminal case is uncertain or slow, civil options may apply:

A) Damages under the Civil Code (torts / quasi-delicts)

Possible claims if you can show:

  • wrongful act, fault/negligence, and damage
  • moral damages for mental anguish, humiliation
  • exemplary damages in appropriate cases

B) Injunctive relief (fact-specific)

In certain circumstances, courts may restrain harmful conduct. The strategy depends on the cause of action and evidence.

C) Platform reporting and takedown

This is not “legal relief,” but it matters:

  • Report impersonation, harassment, and intimate image abuse using platform tools.
  • Preserve evidence before reporting, since content may be removed (good for safety, but you still need proof for the case).

12) Common defenses you should anticipate (and prepare for)

Respondents commonly claim:

  • “Not me” / “account hacked”
  • “Edited screenshot” / “fabricated”
  • “Opinion / fair comment” (defamation defenses)
  • “No malice” / “No intent”
  • “Not identifiable” (victim not clearly identified)
  • “Private message only” (publication issues for defamation—facts matter)

Your preparation should directly answer these:

  • Strong authentication (screen recordings, URLs, consistent captures)
  • Proof of identification (your name/photo/tagging, context, witness recognition)
  • Proof of harm and pattern (timeline, repeated conduct)

13) Special notes for cyber libel (high-risk, high-detail area)

Cyber libel is frequently invoked, but it is also frequently mishandled. Key practical points:

  • Defamation analysis is technical: identifiability, publication, defamatory imputation, and malice (with defenses like privileged communication and fair comment depending on context).
  • Cases involving public issues, satire, or commentary can raise nuanced free speech questions.
  • Because the risks of counter-litigation are real, cyber libel complaints should be drafted carefully and fact-based, with complete context.

14) Drafting your Complaint-Affidavit: a working outline

A clear affidavit often matters as much as the evidence.

A. Personal details

  • Name, age, address, occupation (as required)
  • Contact details (as appropriate)

B. Respondent

  • If known: full name + identifiers
  • If unknown: “John/Jane Doe” + dummy account handle/URL and description

C. Statement of facts (chronological)

  • Start date of harassment
  • Each incident with date/time/platform/link
  • Attach evidence labels (Annex “A”, “B”, etc.)

D. Why the acts are unlawful

  • Identify the specific acts (threats/impersonation/doxxing/etc.)
  • Connect them to relevant laws (briefly, without over-arguing)

E. Harm suffered

  • Emotional distress, fear, reputational harm
  • Work/business impact
  • Safety concerns

F. Relief requested

  • Investigation and filing of appropriate charges
  • Identification of the respondent through lawful process (if unknown)
  • Any urgent safety requests (if applicable)

15) A quick “what to do today” checklist

  1. Save links + screenshots + screen recordings (showing the account and the content)

  2. Build a timeline (date / act / link / evidence filename)

  3. Secure devices and accounts (change passwords, enable 2FA, review privacy settings)

  4. Decide if the case fits:

    • RA 9262 (intimate partner) → consider protection orders
    • RA 11313 (gender-based sexual harassment)
    • RA 9995 (intimate image abuse)
    • RA 10175/RPC (cyber libel, threats, identity theft, etc.)
  5. Bring your evidence pack to PNP ACG or NBI Cybercrime and/or file with the Prosecutor


16) Final cautions (practical and legal)

  • Do not retaliate with threats, doxxing, or defamatory posts; it can boomerang into mutual charges.
  • Treat everything you submit as something that may be scrutinized in court: preserve originals, keep context.
  • If you are in immediate danger, treat it as a safety issue first, a legal issue second.

If you want, share a sanitized description (no names, no addresses) of what the dummy account is doing—e.g., “threats,” “impersonation,” “doxxing,” “sexual remarks,” “ex-partner”—and the platform used, and I’ll map the most likely applicable laws and the strongest filing strategy in a way that fits those facts.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.