Introduction
Cyber libel is one of the most common legal concerns in the Philippines involving Facebook posts, TikTok videos, YouTube uploads, X posts, Instagram stories, blogs, online news comments, group chats, messaging apps, screenshots, livestreams, and other internet-based publications.
A person may feel defamed when another person posts accusations online such as “scammer,” “thief,” “mistress,” “corrupt,” “drug addict,” “criminal,” “fake lawyer,” “rapist,” “cheater,” “fraud,” “estafador,” “homewrecker,” “manyak,” or similar damaging statements. But not every offensive, insulting, embarrassing, or hurtful online statement is automatically cyber libel.
The central rule is this:
Cyber libel may be committed when a person publicly and maliciously imputes a crime, vice, defect, act, condition, status, or circumstance against an identifiable person through a computer system or similar electronic means, causing dishonor, discredit, or contempt.
A cyber libel case requires proof of specific legal elements. The complainant must preserve digital evidence, identify the author or publisher, show that the statement was defamatory, prove publication, prove identifiability, and establish malice where required. The respondent may raise defenses such as truth, fair comment, privileged communication, lack of malice, lack of identification, absence of publication, opinion, consent, or prescription.
I. What Is Cyber Libel?
Cyber libel is libel committed through a computer system or other similar means using information and communications technology.
Traditional libel under the Revised Penal Code involves malicious imputation made publicly and in writing or similar means. Cyber libel is essentially libel committed online or through digital technology.
Examples of platforms where cyber libel may arise include:
Facebook posts;
Facebook comments;
Facebook stories;
Messenger group chats, depending on publication;
TikTok videos;
YouTube videos;
Instagram posts and stories;
X posts;
Blogs;
Online articles;
Online forums;
Reddit-type posts;
Viber groups;
Telegram groups;
WhatsApp groups;
Emails sent to multiple people;
Websites;
Livestreams;
Online reviews;
Digital posters;
Shared screenshots;
And other internet-based communication.
The form does not matter as much as the substance. If the defamatory statement is made through electronic means and reaches a third person, cyber libel may be considered.
II. Difference Between Libel and Cyber Libel
Traditional libel is usually committed through writing, printing, radio, engraving, theatrical exhibition, or similar means.
Cyber libel is committed through a computer system or electronic means.
The main difference is the medium.
Traditional libel may involve:
Newspaper;
Printed letter;
Poster;
Pamphlet;
Magazine;
Printed circular;
Written public accusation.
Cyber libel may involve:
Social media;
Website;
Online comment;
Messaging platform;
Email;
Video caption;
Digital image;
Online livestream;
Computer-generated post.
Because cyber libel is committed online, digital evidence and cybercrime procedures become important.
III. Legal Nature of Cyber Libel
Cyber libel is a criminal offense. It may also give rise to civil liability.
This means that a complainant may seek:
Criminal prosecution;
Civil damages;
Moral damages;
Exemplary damages in proper cases;
Attorney’s fees;
Removal or takedown, where available through platform rules or court processes;
Public correction or apology, if agreed;
And other remedies depending on the case.
The criminal aspect punishes the offense. The civil aspect compensates the injured person.
IV. Elements of Cyber Libel
The basic elements are generally:
There is an imputation of a crime, vice, defect, act, omission, condition, status, or circumstance;
The imputation is defamatory;
The imputation is malicious;
The imputation is made publicly or communicated to a third person;
The offended party is identifiable; and
The defamatory imputation is made through a computer system or similar electronic means.
Each element must be proven.
If one element is missing, the case may fail.
V. First Element: Imputation
An imputation means an accusation, assertion, insinuation, or statement that attributes something to a person.
The imputation may be direct or indirect.
Direct examples:
“Juan stole company money.”
“Maria is a drug pusher.”
“Pedro is a scammer.”
“Anna committed adultery.”
Indirect examples:
“Alam na kung sino ang magnanakaw sa office.”
“Yung kapitbahay naming may initials M.R. ang kabit.”
“Hindi na ako magtataka kung bakit nawawala pera kapag siya ang treasurer.”
“Beware of this seller,” followed by identifying photos and accusations.
Even if the statement does not name the person directly, it may still be an imputation if readers can identify the person.
VI. Types of Defamatory Imputation
The imputation may involve:
A crime;
A vice;
A defect;
A dishonorable act;
A damaging omission;
A condition that brings discredit;
A status that exposes the person to contempt;
Or circumstances that harm reputation.
Examples:
Calling someone a thief;
Accusing someone of estafa;
Calling someone a prostitute;
Accusing someone of being a mistress;
Accusing a professional of malpractice;
Calling a business owner a scammer;
Accusing a teacher of abusing students;
Accusing a barangay official of corruption;
Accusing a spouse of infidelity;
Accusing a person of having a sexually transmitted disease;
Accusing a person of being a drug user or pusher;
Accusing someone of faking credentials.
The statement must be evaluated in context, including language, audience, platform, relationship of parties, and ordinary meaning.
VII. Second Element: Defamatory Character
A statement is defamatory if it tends to dishonor, discredit, or put a person in contempt.
The test is not merely whether the complainant felt offended. The question is whether the words, viewed in context, would tend to injure the person’s reputation in the eyes of others.
Examples of potentially defamatory statements:
“Do not transact with her, she is a scammer.”
“He stole our funds.”
“She is a kabit and destroys families.”
“This doctor kills patients.”
“This lawyer is fake.”
“This teacher is a predator.”
“This business is fraudulent.”
“This barangay captain pockets ayuda.”
Statements that merely express annoyance, criticism, or opinion may not always be defamatory.
For example:
“I had a bad experience with this seller.”
“I disagree with his decision.”
“I think her service was poor.”
“This restaurant’s food was disappointing.”
These may be protected opinion or fair comment if made in good faith and based on actual experience, though context matters.
VIII. Defamation by Insinuation
Cyber libel may be committed even without direct accusation if the post clearly implies a defamatory meaning.
Examples:
Posting a person’s photo with captions like “ingat kayo sa tao na ito” and comments suggesting fraud;
Posting “hindi ko na papangalanan pero initials J.D., nagnanakaw sa opisina” where everyone in the group knows who J.D. is;
Using emojis, memes, or coded words to imply criminality or immorality;
Sharing screenshots and adding captions suggesting dishonesty.
Courts look at the whole communication, not isolated words alone.
IX. Third Element: Malice
Malice is a key element in libel.
Malice may be:
Malice in law, which may be presumed from a defamatory imputation; or
Malice in fact, which means actual ill will, bad motive, or intent to injure.
In many libel cases, malice is presumed once a defamatory publication is shown, unless the communication is privileged.
However, where privilege applies, the complainant may need to prove actual malice.
X. Malice in Law
Malice in law is presumed when a defamatory statement is made publicly and no lawful justification appears.
This means the complainant does not always need to prove personal hatred or spite. The law may infer malice from the defamatory publication itself.
However, the presumption may be rebutted by defenses such as:
Truth;
Good motives;
Justifiable ends;
Privileged communication;
Fair comment;
Lack of intent to defame;
Absence of identification;
Or other circumstances.
XI. Malice in Fact
Malice in fact refers to actual bad motive or ill will.
Evidence of malice in fact may include:
Prior threats;
Personal grudge;
Repeated attacks;
Refusal to verify facts;
Knowledge that the statement was false;
Reckless disregard of truth;
Use of insulting language beyond necessity;
Targeted humiliation;
Posting private matters unrelated to public concern;
Editing screenshots to mislead;
Continuing to post after correction;
Recruiting others to attack the complainant;
Or timing that shows intent to injure.
Malice in fact is especially important when the statement is claimed to be privileged.
XII. Fourth Element: Publication
Publication means communication of the defamatory statement to at least one person other than the person defamed.
In cyber libel, publication may occur when the post, message, video, or article is made accessible to others online.
Examples of publication:
Public Facebook post;
Comment visible to others;
Group chat message seen by members;
YouTube video;
TikTok upload;
Blog article;
Email copied to third persons;
Public online review;
Shared screenshot in a group;
Livestream statement heard by viewers.
A private message sent only to the person complained against may not satisfy publication unless another person saw or received it.
XIII. Publication in Private Messages and Group Chats
Cyber libel can arise in group chats if the defamatory message is seen by people other than the complainant and the sender.
For example:
A Viber group of homeowners;
A Messenger group of employees;
A Telegram group of investors;
A WhatsApp family group;
A school parent group chat;
A barangay group chat.
If a defamatory accusation is sent to a group, publication may exist because third persons received it.
However, if the message is sent only privately to the complainant, publication may be lacking unless it was forwarded, shown, or copied to others by the sender or under circumstances attributable to the sender.
XIV. Sharing, Reposting, and Commenting
A person who shares or reposts defamatory content may also risk liability if the repost republishes the defamatory imputation.
Examples:
Sharing a defamatory post with approval;
Reposting an accusation and adding “true ito”;
Uploading screenshots of another person’s defamatory statements;
Quoting defamatory text in a new post;
Tagging others to spread the accusation;
Commenting additional defamatory statements.
Merely reacting with an emoji may be different from reposting or endorsing, but facts matter.
A person should avoid sharing defamatory content, even if originally posted by someone else.
XV. Fifth Element: Identifiability
The offended party must be identifiable.
The defamatory statement must refer to the complainant either by name or by circumstances that allow others to identify the complainant.
Identification may be through:
Full name;
Nickname;
Photo;
Address;
Workplace;
Job title;
Business name;
Initials;
Tagging;
Family relationship;
Unique description;
Screenshots showing profile;
Context known to the audience;
Or comments identifying the person.
A post does not need to state the full name if readers can reasonably determine who is being referred to.
XVI. Blind Items
Blind items may still be libelous if the person is identifiable.
Example:
“Yung teacher sa Grade 5 ng XYZ School na may initials A.S., manyak.”
If the community can identify the teacher, the statement may support a complaint.
A blind item is not automatically safe. Identifiability depends on whether third persons understood the reference.
XVII. Group Defamation
A defamatory statement against a large group may not always allow individual members to sue unless the group is small enough or the statement points to a specific member.
Example:
“All politicians are corrupt” may be too general.
“All officers of ABC Cooperative stole the members’ money” may identify a smaller group.
“The treasurer and president of ABC Cooperative stole funds” may identify specific persons.
The narrower and more identifiable the group, the stronger the claim.
XVIII. Sixth Element: Use of Computer System or Electronic Means
Cyber libel requires that the defamatory publication be made through a computer system or similar electronic means.
This may include:
Computer;
Smartphone;
Tablet;
Internet platform;
Website;
Social media app;
Messaging app;
Email system;
Cloud service;
Online video platform;
Digital publication system.
The use of electronic technology distinguishes cyber libel from traditional libel.
XIX. Common Examples of Cyber Libel
Potential cyber libel situations include:
Posting that a person is a scammer without sufficient basis;
Accusing a former partner of being a prostitute online;
Posting a business owner’s photo and calling him a thief;
Publishing accusations that a teacher molested students without proof;
Calling a doctor a murderer online after a patient dies;
Posting edited screenshots to imply fraud;
Uploading a TikTok accusing a neighbor of drug pushing;
Writing that a barangay official stole public funds;
Posting that an employee falsified documents;
Accusing a seller of estafa rather than simply describing a transaction dispute;
Calling someone a fake professional without verified basis.
Whether these are punishable depends on proof, truth, privilege, malice, and context.
XX. Statements That May Not Be Cyber Libel
Not all negative online statements are cyber libel.
The following may not be libelous depending on wording and context:
Fair criticism;
Honest opinion;
Truthful customer review;
Good-faith complaint to proper authority;
Privileged communication;
Mere insult not affecting reputation;
Hyperbole;
Satire;
Private message with no third-party publication;
Statements not referring to an identifiable person;
Statements supported by official records;
Statements made in defense of legitimate interest, if not excessive;
Statements made in judicial or official proceedings, if privileged.
The exact words and circumstances matter.
XXI. Opinion vs. Defamatory Fact
A statement of opinion is generally treated differently from a statement of fact.
Opinion:
“I think his service was terrible.”
“I do not trust this seller.”
“The food was bad.”
“This policy is unfair.”
Defamatory factual assertion:
“He stole my money.”
“She is an estafadora.”
“This restaurant uses rotten meat.”
“This doctor has no license.”
“He falsified documents.”
Opinion may still become defamatory if it implies undisclosed false facts.
For example:
“In my opinion, she is a thief” may still be defamatory because it imputes a crime.
XXII. Truth as a Defense
Truth may be a defense in libel, especially when the publication is made with good motives and for justifiable ends.
However, truth alone is not always a complete practical shield if the post was made maliciously, unnecessarily, or without justifiable purpose.
For example, exposing a matter of public concern in good faith may be defensible. Posting private humiliating facts unrelated to public interest may still create legal risk.
A person who wants to rely on truth should have solid evidence before posting.
XXIII. Good Motives and Justifiable Ends
Even if a statement is true, the person making it may need to show that it was made with good motives and for justifiable ends.
Examples of potentially justifiable purposes:
Warning the public about a verified scam;
Reporting misconduct to proper authorities;
Protecting consumers from ongoing fraud;
Filing a complaint;
Responding to accusations;
Reporting matters of public interest;
Making fair comment on official conduct.
However, the statement should be limited, factual, and not unnecessarily insulting or excessive.
XXIV. Fair Comment
Fair comment protects honest criticism or opinion on matters of public interest.
It may apply to:
Public officials;
Public figures;
Government action;
Public projects;
Public controversies;
Consumer matters;
Professional services offered to the public;
Business practices affecting consumers;
Public performances;
Newsworthy issues.
But fair comment does not protect knowingly false factual accusations.
For example, saying “I believe the mayor’s policy is harmful” is different from falsely saying “the mayor stole ₱10 million.”
XXV. Privileged Communication
Certain communications are privileged. Privilege may be absolute or qualified.
Privileged communications may include statements made in official proceedings, judicial pleadings, legislative proceedings, or good-faith communications made in the performance of a legal, moral, or social duty, or in protection of a legitimate interest.
If a statement is privileged, malice may not be presumed in the same way. The complainant may need to prove actual malice.
XXVI. Absolute Privilege
Absolute privilege protects certain statements even if damaging, so long as they are made in the proper proceeding and are relevant.
Examples may include statements made in:
Judicial pleadings;
Court proceedings;
Legislative proceedings;
Certain official proceedings.
However, the statement must be relevant to the proceeding. Abuse of process or irrelevant defamatory attacks may create issues.
A complaint filed with proper authorities is generally safer than posting accusations online.
XXVII. Qualified Privilege
Qualified privilege may apply to good-faith communications made in the performance of a duty or protection of an interest.
Examples:
A complaint to an employer about employee misconduct;
A report to a barangay, police, school, or regulatory agency;
A consumer complaint to the proper office;
A company memo to relevant officers about an investigation;
A warning to persons with a legitimate need to know.
The privilege may be lost if the speaker acts with actual malice, publishes excessively, or communicates to people with no legitimate interest.
XXVIII. Complaint to Authorities vs. Public Social Media Post
A person who believes he or she was scammed, abused, harassed, or wronged should usually file a complaint with proper authorities rather than post accusations publicly.
A complaint to authorities may be privileged if made in good faith.
A public social media post may expose the poster to cyber libel if it contains defamatory accusations that are unproven, excessive, or malicious.
Safer approach:
File a police, barangay, administrative, court, or regulatory complaint;
State facts, not insults;
Attach evidence;
Avoid public accusations before investigation;
Warn others carefully using verified facts.
XXIX. Cyber Libel and Public Officials
Public officials may file cyber libel complaints, but criticism of official conduct may receive broader protection.
Citizens may criticize government officials, public policies, public spending, and official acts.
However, false statements of fact made with malice may still be actionable.
Examples of safer statements:
“I disagree with the mayor’s project.”
“The barangay should explain how funds were used.”
“I am requesting audit and transparency.”
Examples of riskier statements:
“The mayor stole the funds” without proof;
“The barangay captain is a thief” without official basis;
“This councilor pocketed ayuda” without evidence.
Public criticism should be factual, documented, and directed at official conduct.
XXX. Cyber Libel and Public Figures
Public figures may also be subject to criticism. The law often gives room for comment on matters of public concern.
But public figures are not fair game for false criminal accusations or private defamatory attacks unrelated to public matters.
The more public the issue, the stronger the space for criticism. The more private and false the attack, the stronger the libel risk.
XXXI. Cyber Libel and Customer Reviews
Negative customer reviews are common.
A review may be lawful if it is truthful, based on actual experience, and expressed as opinion or fair comment.
Safer review:
“I ordered on March 1, paid ₱2,500, and did not receive the item. The seller has not replied to my messages.”
Risky review:
“This seller is an estafador and a criminal.”
The first states verifiable facts. The second imputes a crime.
Consumers should describe facts and attach proof instead of using criminal labels.
XXXII. Cyber Libel and Business Disputes
Business disputes often lead to online accusations.
Examples:
Unpaid debt;
Failed delivery;
Cancelled contract;
Poor service;
Defective product;
Delayed refund;
Investment loss.
A complainant should distinguish between:
A civil dispute;
Breach of contract;
Bad service;
Fraud;
Estafa;
Scam.
Calling someone a criminal without sufficient basis may create cyber libel exposure. A demand letter or formal complaint is safer.
XXXIII. Cyber Libel and Family Disputes
Cyber libel may arise from family conflicts, such as:
Accusing a relative of stealing inheritance;
Calling a former spouse immoral;
Posting about alleged adultery;
Accusing in-laws of abuse;
Calling a sibling a fraud;
Posting private family disputes in group chats.
Family-related posts can still be published if shared with third persons. Emotional distress does not automatically excuse defamatory statements.
XXXIV. Cyber Libel and Relationship Disputes
Cyber libel may arise when a person posts against:
Former partner;
Alleged mistress or lover;
Spouse;
Fiancé;
Dating partner;
In-laws;
Third party in a breakup.
Accusations such as “kabit,” “pokpok,” “abuser,” “rapist,” “gold digger,” “scammer,” or “manloloko” may lead to complaints depending on facts.
Some situations may also involve violence against women and children, harassment, unjust vexation, grave threats, data privacy, or anti-photo and video voyeurism laws.
XXXV. Cyber Libel and Workplace Posts
Employees may commit cyber libel by posting accusations against employers, managers, co-workers, or clients.
Employers may also commit cyber libel if they publicly accuse employees of theft, fraud, or misconduct without proper basis.
Workplace posts may also lead to administrative discipline, termination, or labor disputes.
A better approach is to use internal grievance processes, DOLE/NLRC complaints, or formal investigations.
XXXVI. Cyber Libel and Schools
Students, parents, teachers, and school administrators may be involved in cyber libel disputes.
Examples:
Parent posts that a teacher is abusive;
Student posts that a classmate is a thief;
Teacher posts that a student cheated;
School posts accusations against a parent;
Group chat accusations among parents.
Schools should handle complaints through proper channels. Public shaming of minors is especially risky and may involve child protection and privacy concerns.
XXXVII. Cyber Libel and Minors
If the respondent is a minor, special rules on children in conflict with the law may apply.
If the complainant is a minor, the parent or guardian may file on the child’s behalf.
Online defamation involving minors may also implicate child protection, bullying, privacy, psychological harm, and school disciplinary rules.
Names, photos, and identities of minors should be handled carefully.
XXXVIII. Cyber Libel and Anonymous Accounts
Cyber libel may be committed using fake or anonymous accounts.
The challenge is proving who controlled or posted from the account.
Evidence may include:
Account profile;
Phone number;
Email address;
IP records through law enforcement;
Admissions;
Posting patterns;
Photos;
Linked accounts;
Payment records;
Device evidence;
Witnesses;
Screenshots showing identity;
Prior communications;
Or circumstantial evidence.
Mere suspicion is not enough. The complainant must link the respondent to the post.
XXXIX. Cyber Libel and Fake Accounts Using Another Person’s Name
If someone creates a fake account to defame another person, additional offenses may be involved, such as identity misuse, data privacy violations, or other cyber-related offenses depending on facts.
The victim should preserve evidence before reporting the account for takedown.
XL. Cyber Libel and Hacked Accounts
A respondent may defend by claiming that the account was hacked.
The court or prosecutor may consider:
Whether the respondent reported hacking;
Timing of the hacking claim;
Account access logs, if available;
Consistency with past posts;
Device evidence;
Password changes;
Recovery emails;
Witnesses;
Whether respondent deleted or disowned the post promptly;
Whether respondent benefited from the post;
And other circumstances.
A hacking claim must be supported by evidence.
XLI. Cyber Libel and Sharing Screenshots
Posting screenshots of private conversations may create several legal issues.
If the screenshot contains defamatory accusations, reposting it may be republication.
If the screenshot contains private personal information, privacy issues may arise.
If the screenshot is edited or misleading, fraud or malicious intent may be inferred.
A person should be careful before posting private chats online.
XLII. Cyber Libel and Memes
A meme can be defamatory if it imputes dishonorable or criminal conduct to an identifiable person.
Humor or satire may be a defense in some contexts, especially if no reasonable person would take it as factual. But if the meme clearly accuses a real person of wrongdoing, cyber libel risk remains.
XLIII. Cyber Libel and Reactions, Likes, and Emojis
Merely liking a post is generally different from publishing the defamatory content.
However, adding a comment, caption, share, repost, or endorsement can increase risk.
For example:
“True! Scammer talaga yan.”
“Confirmed, magnanakaw siya.”
“Share para walang mabiktima.”
These comments may constitute republication or additional defamatory imputations.
XLIV. Cyber Libel and Tagging
Tagging people in a defamatory post can increase publication and show intent to spread the accusation.
Tagging the victim, employer, family members, clients, school, or community may aggravate harm and support publication.
XLV. Cyber Libel and Online Reviews of Professionals
Professionals such as doctors, lawyers, accountants, engineers, teachers, brokers, and real estate agents may be reviewed or criticized.
A factual and fair complaint may be permissible. False accusations affecting professional integrity may be defamatory.
Examples of safer statements:
“I filed a complaint because I believe the service was negligent.”
“The appointment was delayed and I was not satisfied.”
Risky statements:
“This doctor is a killer.”
“This lawyer steals client money.”
“This broker is a fraudster.”
Professional misconduct should be reported to the proper regulatory body with evidence.
XLVI. Cyber Libel and News Reports
Journalists and media entities may face cyber libel if online reports contain defamatory false statements.
However, fair and true reports of official proceedings, matters of public interest, and responsible journalism may be protected, subject to the rules on privilege, malice, and accuracy.
News reporting should verify facts, get sides, avoid sensational criminal labels without basis, and distinguish allegations from proven facts.
XLVII. Who May File a Cyber Libel Complaint?
The offended party may file the complaint.
If the offended party is:
A natural person: that person files;
A minor: parent or guardian may act;
Deceased: rules are more complex; heirs may have limited interests depending on the circumstances;
A corporation or juridical entity: authorized officer or representative may file if the entity’s reputation is harmed;
A public officer: the officer may file personally for defamatory statements against him or her.
The complainant must show that the defamatory statement refers to him, her, or the juridical entity.
XLVIII. Can a Corporation Be a Complainant?
Yes, a corporation or juridical entity may be defamed if the statement harms its business reputation.
Examples:
“This company is a scam.”
“This corporation sells fake medicine.”
“This school steals tuition.”
“This hospital kills patients for money.”
The authorized representative should present proof of authority, such as board resolution or secretary’s certificate, if required.
However, statements about a corporation may not automatically identify officers personally unless the post refers to them.
XLIX. Who May Be Charged?
Possible respondents include:
Original author;
Poster;
Uploader;
Publisher;
Page administrator;
Group administrator, if active in publication;
Person who shared or republished;
Person who dictated or caused the post;
Corporation or media entity, depending on facts;
Editor or responsible officer;
Anonymous account holder if identified;
Influencer who repeated defamatory accusation.
Liability depends on participation in publication.
L. Where to File a Cyber Libel Complaint
A complainant may file with appropriate law enforcement or prosecutorial offices.
Common routes include:
Cybercrime units of law enforcement;
City or provincial prosecutor’s office;
National Bureau of Investigation cybercrime office;
Philippine National Police cybercrime office;
Or directly with the prosecutor in proper cases.
The complaint must be supported by affidavits and evidence.
Venue and jurisdiction should be considered carefully because cyber libel involves online publication and may raise questions of where the case should be filed.
LI. Venue Considerations
Venue in cyber libel may depend on rules governing criminal actions and cybercrime cases.
Relevant considerations may include:
Where the complainant actually resides;
Where the defamatory article was first published or accessed;
Where the offended party held office, in some cases;
Where the computer system or publication originated;
Where the respondent resides;
And applicable rules on cybercrime jurisdiction.
Because venue errors can cause dismissal or delay, complainants should carefully determine the proper filing office.
LII. Prescriptive Period
Cyber libel complaints must be filed within the applicable prescriptive period.
Prescription is the period within which a criminal action must be commenced. If the complaint is filed too late, it may be dismissed.
Because prescription rules can be technical and have been the subject of legal discussion, a complainant should file as soon as possible after discovering the defamatory post.
Do not wait. Online posts can be deleted, accounts can disappear, and evidence can be lost.
LIII. When Does Prescription Start?
Prescription may raise questions such as:
When was the post first published?
When did the complainant discover it?
Was it reposted?
Was it still accessible?
Was there a new publication?
Was the defamatory content edited or uploaded again?
Was it shared by another person?
The safer approach is to count conservatively from the earliest known publication and file promptly.
LIV. Single Publication Rule
A legal issue in online defamation is whether continued availability of a post counts as a new offense every day or only as one publication.
The concept of single publication means that one publication gives rise to one cause of action, rather than a new cause every time it is accessed. However, reposting, editing, re-uploading, or sharing may raise separate issues.
Complainants and respondents should be careful about dates of publication and republication.
LV. Evidence Needed to File a Cyber Libel Case
A strong complaint should include:
Screenshots of the defamatory post;
URL or link;
Date and time of publication;
Name or account of poster;
Profile information;
Comments showing people saw or understood the post;
Proof that the complainant is identifiable;
Proof of falsity or damage, if available;
Proof of malice, if needed;
Witness affidavits from persons who saw the post;
Digital preservation or forensic copy, if available;
Affidavit of complainant;
Proof of residence or venue;
Valid IDs;
Certification or report from platform, if available;
And other supporting documents.
The complaint must tell a clear story: what was posted, who posted it, when, where, who saw it, why it refers to the complainant, and why it is defamatory.
LVI. Screenshots as Evidence
Screenshots are common but should be properly preserved.
A useful screenshot should show:
The defamatory words;
Name or username of poster;
Profile picture, if relevant;
Date and time;
URL or page name;
Comments or reactions, if relevant;
Full context of the post;
Device date, if useful;
And surrounding content.
Do not crop too much. Cropped screenshots may be challenged as incomplete or misleading.
LVII. URL and Links
Always save the URL or link of the post, page, comment, video, or profile.
A screenshot without a link may still be useful, but a link helps investigators verify the content if it remains available.
For social media apps, copy the post link if possible.
LVIII. Screen Recording
A screen recording may help show that the post existed and how it appeared online.
A good screen recording may show:
Opening the app or website;
Navigating to the profile or post;
Showing the URL;
Showing date and time;
Scrolling through full post and comments;
Opening the profile;
Showing account details.
Screen recordings can supplement screenshots.
LIX. Notarization or Affidavit of Screenshots
Screenshots may be attached to an affidavit of the person who captured them.
The affidavit may state:
When the screenshot was taken;
What device was used;
Where the post was found;
The URL or account name;
That the screenshot is a faithful capture;
That the post was visible to others;
And how the complainant was identified.
Notarization of the affidavit does not automatically prove truth, but it supports authentication.
LX. Digital Forensic Preservation
For serious cases, digital forensic preservation may be helpful.
This may include:
Hash values;
Metadata preservation;
Device imaging;
Authenticated downloads;
Platform records;
Server logs;
IP logs through lawful process;
Chain of custody;
Expert certification.
For ordinary complaints, screenshots and affidavits may be used, but forensic support strengthens the case when authenticity is disputed.
LXI. Witnesses Who Saw the Post
Witnesses can help prove publication and identification.
A witness affidavit may state:
The witness saw the post;
When and where the witness saw it;
The account that posted it;
The exact words or attached screenshot;
That the witness understood it to refer to the complainant;
How the witness knows the complainant;
And the effect on the complainant’s reputation.
This is especially useful when the post did not name the complainant directly.
LXII. Proof of Identity of the Poster
The complainant must connect the respondent to the post.
Proof may include:
Respondent’s real-name account;
Profile photos;
Admissions;
Phone number;
Email;
Prior conversations;
Matching writing style;
Account linked to respondent’s business;
Witnesses who know the account;
Screenshots of respondent using the account;
Platform records obtained through law enforcement;
Or circumstantial evidence.
If the account is anonymous, the complaint may ask authorities to investigate the account holder.
LXIII. Proof of Identifiability of the Complainant
If the complainant is named, identification is easy.
If not named, prove identifiability through:
Photo;
Initials;
Nickname;
Address;
Workplace;
Position;
Unique facts;
Comments naming the complainant;
Witnesses who understood the reference;
Prior dispute giving context;
Tags;
Screenshots of profile;
Business name;
Or surrounding posts.
The key is whether third persons could reasonably identify the complainant.
LXIV. Proof of Defamatory Meaning
The complaint should explain why the words are defamatory.
For example:
The post accuses complainant of theft;
The post accuses complainant of infidelity;
The post imputes fraud to complainant’s business;
The post states complainant committed a crime;
The post portrays complainant as immoral or dishonest;
The post harms complainant’s profession.
If the words are in Filipino, Cebuano, Ilocano, Hiligaynon, Bisaya, or another language, provide an accurate translation or explanation of meaning.
LXV. Posts in Local Languages or Slang
Cyber libel often uses slang, local language, sarcasm, or coded terms.
Examples:
“Magnanakaw”;
“Estapador”;
“Kabit”;
“Pokpok”;
“Scammer”;
“Budol”;
“Manyak”;
“Adik”;
“Pusher”;
“Corrupt”;
“Fake”;
“Mandurugas.”
The complaint should explain the ordinary meaning, context, and defamatory implication.
LXVI. Proof of Malice
Malice may be presumed in some defamatory publications, but it is wise to show evidence of actual malice when available.
Evidence may include:
Prior quarrel;
Threats to ruin reputation;
Repeated posting;
Posting despite knowing truth;
Refusal to delete after correction;
Use of fake evidence;
Targeting employer or family;
Inflammatory language;
Spreading to multiple groups;
Tagging people to maximize humiliation;
Using old disputes to attack complainant;
Or posting after demand letter.
LXVII. Proof of Damage
Damage to reputation may be presumed in libel, but evidence of actual harm can strengthen the case.
Examples:
Loss of customers;
Cancelled contracts;
Employment consequences;
Family humiliation;
Messages from people asking about the accusation;
Business decline;
Mental distress;
Community backlash;
School or workplace investigation;
Public ridicule;
Professional harm.
For civil damages, proof of actual consequences may be important.
LXVIII. Medical or Psychological Harm
If the post caused anxiety, depression, humiliation, sleep problems, or other psychological distress, medical records may support moral damages.
Evidence may include:
Medical certificate;
Psychological report;
Therapy records;
Medication receipts;
Witness affidavits;
Journal or timeline;
And proof of emotional suffering.
LXIX. Demand Letter Before Filing
A demand letter is not always required before filing a cyber libel case, but it may be useful.
It may demand:
Removal of post;
Public apology;
Correction;
Cessation of further defamatory statements;
Preservation of evidence;
Damages;
Settlement;
Or explanation.
However, in some cases immediate filing may be better, especially if the respondent may delete evidence, hide identity, or continue posting.
LXX. Sample Demand Letter
A demand letter may state:
Subject: Demand to Remove Defamatory Online Post and Cease Further Publication
Dear [Name]:
On [date], you published a post on [platform] stating that [quote or describe statement]. The post identifies me by [name/photo/context] and falsely imputes [crime/vice/dishonorable act], causing damage to my reputation.
I demand that you immediately remove the post, cease further publication, issue a written correction or apology, and preserve all related communications and records.
This demand is without prejudice to the filing of criminal, civil, and other appropriate actions for cyber libel and related claims.
Sincerely, [Name]
This should be adjusted to the facts.
LXXI. Filing With Law Enforcement
Filing with a cybercrime law enforcement office may help when:
The respondent is anonymous;
Platform records are needed;
IP tracing may be required;
There are multiple posts;
The post was deleted;
There are threats or harassment;
There are fake accounts;
Other cyber offenses are involved.
The complainant should bring printed copies and digital copies of evidence.
LXXII. Filing Directly With the Prosecutor
A complainant may file a complaint-affidavit with the prosecutor’s office in proper cases.
The complaint should include:
Complainant’s affidavit;
Witness affidavits;
Screenshots;
Links;
Translations;
Proof of publication;
Proof of identification;
Proof of respondent identity;
Evidence of malice;
Evidence of damage;
And other supporting documents.
The prosecutor will conduct preliminary investigation if required.
LXXIII. Complaint-Affidavit
The complaint-affidavit is the core document.
It should state:
Complainant’s identity;
Respondent’s identity;
Relationship or background;
The exact defamatory statement;
Where and when it was posted;
How it was published;
How complainant was identified;
Why the statement is false or defamatory;
How complainant discovered it;
Who saw it;
What harm was caused;
What evidence is attached;
And request for prosecution.
It must be sworn before a person authorized to administer oaths.
LXXIV. Sample Complaint-Affidavit Structure
A cyber libel complaint-affidavit may follow this structure:
Personal circumstances of complainant;
Personal circumstances of respondent, if known;
Background of relationship or dispute;
Description of defamatory post;
Exact quotation of words;
Date, time, and platform;
Explanation of publication;
Explanation of identification;
Explanation of defamatory meaning;
Evidence of malice;
Evidence of damage;
Preservation of screenshots and links;
Witnesses who saw the post;
Legal statement that acts constitute cyber libel;
Prayer for prosecution;
List of attachments.
Keep it factual and chronological.
LXXV. Attachments to Complaint
Possible attachments include:
Screenshot of post;
Screenshot of profile;
Post link or URL;
Video file or audio file;
Transcript of video, if needed;
Translation;
Witness affidavits;
Demand letter;
Proof of receipt of demand;
Messages from people who saw the post;
Business records showing damage;
Medical or psychological records;
Proof of complainant identity;
Proof of respondent identity;
Corporate authorization, if complainant is corporation;
USB drive or storage media containing digital copies;
Certification of authenticity, if available.
Organize attachments clearly.
LXXVI. If the Post Was Deleted
A deleted post can still be the basis of a case if evidence was preserved.
Useful evidence includes:
Screenshots taken before deletion;
Witness affidavits;
Cached pages;
Screen recordings;
Notifications;
Emails from platform;
Shared copies;
Comments referring to the post;
Admissions by respondent;
Archive links, if available;
Law enforcement data request, if possible.
Deletion may also be argued as consciousness of wrongdoing, but deletion alone does not prove guilt.
LXXVII. If the Post Is Still Online
If the post is still online:
Take screenshots;
Take screen recording;
Copy URL;
Ask witnesses to capture independently;
Do not engage in online argument unnecessarily;
Preserve comments;
Consider reporting to platform after preserving evidence;
Consider requesting takedown;
Proceed with complaint if warranted.
Do not rely on the post remaining available. It may be deleted anytime.
LXXVIII. Should the Complainant Comment on the Post?
Usually, avoid emotional public exchanges.
Responding angrily may create counterclaims or complicate the case.
A measured response may be acceptable:
“This accusation is false. I am preserving evidence and will take legal action.”
But avoid defamatory counter-accusations.
LXXIX. Takedown Requests
A complainant may report defamatory content to the platform for violation of community standards.
However:
Preserve evidence first;
Platform takedown does not automatically result in criminal case;
Platform refusal does not mean the post is lawful;
Takedown may remove public harm but may also make evidence harder to access if not preserved.
In serious cases, legal reporting should accompany platform reporting.
LXXX. Preliminary Investigation
In criminal cases requiring preliminary investigation, the prosecutor evaluates whether there is probable cause.
The process may include:
Filing complaint-affidavit;
Issuance of subpoena to respondent;
Respondent’s counter-affidavit;
Complainant’s reply-affidavit, if allowed;
Clarificatory hearing, if needed;
Resolution by prosecutor;
Possible filing of information in court;
Or dismissal.
The prosecutor does not decide guilt beyond reasonable doubt. The prosecutor determines whether the case should proceed to court.
LXXXI. Counter-Affidavit
The respondent may file a counter-affidavit raising defenses such as:
Statement was true;
Statement was opinion;
Statement was privileged;
No malice;
No publication;
No identification;
Account was hacked;
Respondent did not post it;
Post was taken out of context;
Complaint prescribed;
Venue is improper;
Evidence is unauthenticated;
Statement was fair comment;
Complainant is public figure;
Or complainant failed to prove elements.
The complainant should be ready to respond with evidence.
LXXXII. Prosecutor’s Resolution
After preliminary investigation, the prosecutor may:
Dismiss the complaint;
File an information in court;
Recommend further investigation;
Require additional documents;
Or resolve some charges differently.
If dismissed, the complainant may have remedies such as motion for reconsideration or appeal to higher prosecution authorities, depending on the rules and circumstances.
If filed, the criminal case proceeds in court.
LXXXIII. Court Proceedings
If an information is filed, the case may proceed through:
Raffle to court;
Issuance of warrant or summons, depending on offense and procedure;
Posting of bail if applicable;
Arraignment;
Pre-trial;
Trial;
Presentation of prosecution evidence;
Cross-examination;
Defense evidence;
Formal offer of evidence;
Memoranda, if required;
Decision;
Possible appeal.
The prosecution must prove guilt beyond reasonable doubt.
LXXXIV. Bail
Cyber libel is generally bailable as a matter of right before conviction, subject to applicable rules.
The accused may be required to post bail after the case is filed and a warrant is issued or after voluntary surrender.
The amount and process depend on the court.
LXXXV. Penalties
Cyber libel carries criminal penalties. The exact penalty depends on the applicable law, court interpretation, and circumstances.
Because cyber libel is treated more severely than ordinary libel due to the cybercrime law, respondents should take complaints seriously.
Civil damages may also be awarded if proven.
LXXXVI. Civil Liability in Cyber Libel
A cyber libel conviction may include civil liability.
The complainant may claim:
Moral damages;
Actual damages;
Exemplary damages;
Attorney’s fees;
Litigation expenses;
Other appropriate damages.
Actual damages require proof, such as loss of income, lost contracts, medical expenses, or business losses.
Moral damages may be supported by testimony and surrounding circumstances.
LXXXVII. Independent Civil Action
The offended party may also consider civil action for damages depending on the facts and strategy.
However, the relationship between criminal and civil actions must be handled carefully to avoid procedural mistakes.
Legal advice is important if pursuing both criminal and civil remedies.
LXXXVIII. Settlement and Affidavit of Desistance
Parties may settle cyber libel disputes.
Settlement may include:
Removal of post;
Public apology;
Written correction;
Payment of damages;
Non-disparagement agreement;
Undertaking not to repost;
Confidentiality clause;
Withdrawal of complaint;
Affidavit of desistance.
However, in criminal cases, an affidavit of desistance does not automatically bind the prosecutor or court. The State may still proceed if evidence supports the charge.
LXXXIX. Public Apology
A public apology may reduce harm but does not automatically erase criminal liability.
It may be considered in settlement, damages, or mitigation.
The apology should be clear, truthful, and not sarcastic or conditional.
Example:
“I retract my statement posted on [date] accusing [name] of [statement]. I acknowledge that I had no sufficient basis for that accusation. I apologize for the harm caused.”
XC. Retraction
A retraction may help but does not automatically cure the offense.
A defamatory statement already published may have caused harm. However, prompt retraction can show good faith and may reduce damages or support settlement.
XCI. Defenses in Cyber Libel
Common defenses include:
Truth;
Good motives and justifiable ends;
Fair comment;
Privileged communication;
No defamatory meaning;
No publication;
No identification;
No malice;
Opinion;
Consent;
Lack of authorship;
Account hacking;
Prescription;
Improper venue;
Lack of jurisdiction;
Insufficient evidence;
Constitutional free speech;
Public interest;
Absence of damage, where relevant;
Incomplete or altered screenshots;
Satire or hyperbole.
The strength of the defense depends on evidence.
XCII. Defense of Truth
A respondent claiming truth must be prepared to prove the truth of the defamatory imputation.
If the respondent posted “He stole money,” proof should be strong, such as official records, admissions, conviction, audit findings, or other competent evidence.
Mere belief, rumor, or “many people said so” is not enough.
XCIII. Defense of Opinion
A respondent may argue the statement was opinion, not factual accusation.
Examples:
“I think the service was bad.”
“In my view, the policy is unfair.”
“I do not recommend this shop.”
But calling someone a criminal, immoral, or corrupt may be treated as factual imputation, even if phrased as opinion.
XCIV. Defense of Privileged Communication
A respondent may argue that the statement was made in a privileged setting.
Examples:
A complaint filed with the police;
A report to the employer;
A pleading in court;
A grievance filed with school administration;
A report to a regulatory agency;
A private warning to persons with legitimate interest.
The privilege may be lost if the statement was shared publicly or with people who had no need to know.
XCV. Defense of Lack of Identification
The respondent may argue that the post did not identify the complainant.
This defense is stronger if:
No name was used;
No photo was used;
No unique details were included;
The audience could not know who was meant;
The complainant only assumed it referred to him or her.
The complainant may counter with witness affidavits showing readers understood the post to refer to the complainant.
XCVI. Defense of Lack of Publication
The respondent may argue the statement was not communicated to a third person.
This may apply if:
The message was sent only privately to the complainant;
The draft was never posted;
The account was private and no one saw it;
The screenshot was fabricated;
Or there is no proof anyone else accessed it.
The complainant may prove publication through witnesses, comments, reactions, shares, group membership, or platform visibility.
XCVII. Defense of Lack of Authorship
The respondent may deny making the post.
This defense may be raised when:
Account was fake;
Account was hacked;
Someone else had access;
Screenshot was fabricated;
The page was managed by multiple admins;
No proof links respondent to account.
The complainant should present evidence connecting respondent to the post.
XCVIII. Defense of Account Hacking
A hacking defense should be supported by:
Report to platform;
Report to authorities;
Password reset records;
Login alerts;
Emails showing unauthorized access;
Immediate disavowal;
Evidence that respondent did not control post;
Device records;
Witnesses.
A bare claim of hacking may be weak.
XCIX. Defense of Fair Criticism of Public Matter
A respondent may argue that the post was a fair comment on a matter of public interest.
This defense is stronger when the statement:
Concerns public conduct;
Is based on facts;
Is expressed as opinion;
Uses fair language;
Is not knowingly false;
And is not made solely to injure.
It is weaker when the post makes false factual accusations of crime or immorality.
C. Defense of Satire or Hyperbole
Satire, parody, and exaggeration may be protected if a reasonable reader would not understand the statement as a factual accusation.
However, satire is not a blanket defense. If the post clearly identifies a real person and imputes a false crime or serious defect, liability may still arise.
CI. Defense of Consent
If the complainant consented to publication, that may be a defense.
However, consent must be clear and must cover the actual defamatory publication.
Consent to private discussion is not consent to public posting.
CII. Defense of Prescription
If the complaint was filed beyond the prescriptive period, the respondent may seek dismissal.
Because prescription is technical, respondents should check:
Date of publication;
Date of filing;
Nature of offense;
Applicable prescriptive period;
Any interruption or relevant procedural rule;
Whether there was republication.
CIII. Defense of Improper Venue
Improper venue may be raised if the complaint was filed in the wrong place.
Venue rules in cyber libel can be technical because online publication may be accessible anywhere. The complainant should choose venue carefully.
CIV. Defense Based on Free Speech
The Constitution protects freedom of speech, expression, and press.
However, free speech is not absolute. Defamatory false statements may be punished.
The balance is especially important in matters involving public officials, public interest, journalism, criticism, and political speech.
Courts must distinguish protected criticism from punishable defamation.
CV. Cyber Libel vs. Unjust Vexation
Some online insults may not reach libel but may be considered other offenses depending on facts.
Unjust vexation may involve conduct that annoys, irritates, or causes distress without necessarily imputing a defamatory matter.
However, where the online statement damages reputation through public defamatory imputation, cyber libel may be considered.
CVI. Cyber Libel vs. Grave Threats
If the online post threatens harm, grave threats or other threat-related offenses may be involved.
Example:
“I will kill you.”
“Your family will pay.”
“I will burn your house.”
This is different from cyber libel, though one post can involve both defamatory and threatening content.
CVII. Cyber Libel vs. Slander
Slander is oral defamation. Cyber libel is written or similar defamation through electronic means.
A livestreamed spoken statement may raise questions because it is oral but transmitted through electronic means and may be recorded or captioned. The exact charge depends on the form, recording, publication, and applicable law.
CVIII. Cyber Libel vs. Intriguing Against Honor
Intriguing against honor involves spreading rumors or gossip intended to blemish reputation, but may not contain a direct defamatory imputation sufficient for libel.
Cyber libel involves a more definite defamatory imputation published online.
CIX. Cyber Libel vs. Data Privacy Violation
A post may violate data privacy laws if it discloses personal or sensitive information without lawful basis.
Example:
Posting someone’s address, ID, medical record, phone number, bank details, or private photos.
If the post also contains defamatory accusations, both cyber libel and privacy issues may arise.
CX. Cyber Libel vs. Photo and Video Voyeurism
If the online post includes intimate images, sexual videos, or private sexual content, special laws on photo and video voyeurism may apply.
This is separate from cyber libel. A victim may have multiple remedies.
CXI. Cyber Libel vs. Online Harassment
Cyber libel may be part of broader online harassment, including:
Repeated messages;
Threats;
Doxxing;
Fake accounts;
Mass reporting;
Public shaming;
Posting private photos;
Tagging employers;
Encouraging others to attack;
Sending defamatory messages to family or clients.
Other laws or remedies may apply depending on conduct.
CXII. Cyber Libel and Violence Against Women
If defamatory posts are part of harassment, control, humiliation, or abuse against a woman by a spouse, former partner, dating partner, or person with whom she has or had a sexual or dating relationship, laws protecting women and children may also be relevant.
Examples:
Posting sexual accusations;
Threatening to expose private matters;
Publicly humiliating a former partner;
Calling her immoral to control or punish her;
Posting intimate details or images.
Cyber libel may be only one part of the legal picture.
CXIII. Cyber Libel and Workplace Discipline
An employee who commits cyber libel against employer, co-workers, clients, or customers may face workplace discipline if the conduct violates company policy, damages trust, or affects business.
However, employers must observe due process before imposing discipline.
Likewise, an employer should not use cyber libel threats to silence legitimate labor complaints or protected grievances.
CXIV. Cyber Libel and Consumer Complaints
Consumers have the right to complain, but should do so responsibly.
Safer approach:
State facts;
Keep receipts;
Avoid criminal labels unless officially established;
File with DTI, SEC, BSP-supervised institution, barangay, police, or court as appropriate;
Avoid insults;
Avoid exaggeration;
Avoid posting private data.
Example:
Safe: “I paid ₱5,000 on May 1. The item was not delivered despite follow-ups.”
Risky: “This seller is a thief and estafador.”
CXV. Cyber Libel and Scam Warnings
Warning the public about scams may be justified if done carefully.
Safer warning:
“I filed a complaint regarding this transaction. I paid ₱10,000 to this account and have not received the promised item. I advise others to verify before transacting.”
Riskier warning:
“This person is a criminal scammer and should be jailed,” especially without formal findings.
Use verifiable facts and avoid unnecessary insults.
CXVI. Cyber Libel and Political Speech
Political speech is highly protected, but false defamatory accusations can still be actionable.
Citizens may criticize policies, governance, corruption allegations, and public spending. But accusing a named person of a crime without evidence carries risk.
Use documents, official records, and fair language.
CXVII. Cyber Libel and Religious or Community Disputes
Defamatory posts in church, homeowners, cooperative, fraternity, school, or civic groups may still be cyber libel if published to members.
Community disputes can escalate quickly because the audience personally knows the complainant, making reputational harm stronger.
CXVIII. Cyber Libel and Death of Complainant or Respondent
If the complainant dies before or during proceedings, continuation of civil claims or criminal proceedings may raise procedural issues.
If the respondent dies, criminal liability is generally affected by death, but civil issues may depend on timing and nature of claim.
These situations require procedural analysis.
CXIX. Practical Steps for a Complainant
A complainant should:
Preserve screenshots and links;
Take screen recordings;
Ask witnesses to save evidence;
Do not delete communications;
Avoid retaliatory posts;
Identify the account and poster;
Prepare a timeline;
Gather proof of falsity and damage;
Consult counsel or authorities;
Send demand letter if appropriate;
File complaint promptly;
Keep copies of all evidence;
Monitor reposts or new publications;
And avoid public statements that may prejudice the case.
CXX. Practical Steps for a Respondent
A respondent who receives a demand or subpoena should:
Do not ignore it;
Preserve the post and context;
Do not fabricate evidence;
Do not threaten the complainant;
Consult counsel;
Prepare counter-evidence;
Gather proof of truth or privilege;
Identify witnesses;
Check dates and venue;
Review whether the post was opinion or fact;
If appropriate, consider prompt retraction or settlement;
Avoid further posting about the complainant.
Deleting the post may not erase liability and may be viewed unfavorably if done to hide evidence.
CXXI. If You Posted in Anger
Many cyber libel cases begin with anger.
If you posted impulsively:
Take screenshots for your own record;
Consider deleting or limiting further harm after preserving context;
Issue a sincere clarification if the post was wrong;
Avoid additional posts;
Do not threaten the complainant;
Consider settlement;
Consult legal advice if a demand arrives.
A prompt apology may reduce conflict, but it does not automatically remove liability.
CXXII. If Someone Threatens to File Cyber Libel Against You
Do not panic, but take it seriously.
Ask:
What exact statement is complained of?
Did I post it?
Was it public?
Was the person identifiable?
Was it true?
Was it opinion?
Was it privileged?
Was it made with good motives?
Do I have evidence?
Was it already deleted?
Was there damage?
Has a complaint actually been filed?
Not every threat results in a valid case, but careless responses can worsen the situation.
CXXIII. If You Are a Page Admin
Page admins should have clear rules.
Avoid approving defamatory posts. Remove accusations without evidence. Do not let the page become a platform for public shaming.
If a complaint is made:
Preserve records;
Review admin logs;
Identify who posted;
Avoid further publication;
Cooperate with lawful requests;
Do not disclose private data without proper basis;
Seek legal advice if subpoenaed.
CXXIV. If You Are a Group Admin
Group admins should moderate defamatory accusations, especially in community groups.
If members accuse others of crimes, admins may remind them to file complaints with proper authorities and avoid naming or shaming without proof.
Active participation in defamatory publication is riskier than passive membership.
CXXV. If You Are a Journalist, Blogger, or Vlogger
Before publishing accusations:
Verify documents;
Get the other side;
Distinguish allegation from fact;
Avoid sensational labels;
Keep recordings and notes;
Check privilege and public interest;
Avoid unnecessary private details;
Consult legal review for serious accusations;
Correct errors promptly.
Responsible reporting reduces libel risk.
CXXVI. If You Are an Influencer
Influencers can be sued for defamatory content.
Avoid:
Calling people scammers without documents;
Repeating accusations from followers without verification;
Posting “exposés” based only on screenshots;
Using blind items that are identifiable;
Encouraging followers to attack;
Monetizing defamatory allegations;
Ignoring correction requests.
Large reach can increase reputational harm.
CXXVII. If You Are a Business Owner Accused Online
A business owner should:
Preserve the post;
Document lost sales or customer inquiries;
Respond professionally if needed;
Avoid counter-defamation;
Contact the poster privately or through counsel;
Request takedown or correction;
Use platform reporting;
File complaint if accusation is false and damaging;
Consider public statement limited to facts.
A calm factual response is safer than emotional retaliation.
CXXVIII. If You Are Accused of Being a Scammer
If the accusation is false:
Preserve the post;
Gather transaction documents;
Prepare proof of delivery, refund, or communication;
Respond factually;
Avoid insulting the accuser;
Offer resolution if there is a genuine dispute;
Consider demand letter;
File complaint if accusation is malicious and damaging.
If there is an unresolved customer complaint, fix the underlying issue if possible.
CXXIX. If You Are Warning Others About a Scammer
If you genuinely want to warn others:
State facts, not conclusions;
Avoid criminal labels unless official action exists;
Say “alleged” when appropriate;
Mention that a complaint has been filed, if true;
Attach proof carefully without exposing private data;
Avoid insults;
Avoid encouraging harassment;
Limit the audience to people with legitimate need, if possible.
Example:
“I paid this account on [date] for [item/service]. I have not received the item despite follow-ups. I have filed a complaint. Please verify before transacting.”
CXXX. Cyber Libel and Apology Negotiations
Settlement discussions should be documented.
An agreement may include:
Removal of content;
Non-reposting;
Written apology;
Correction post;
Payment of damages;
Mutual release;
Confidentiality;
Non-disparagement;
Withdrawal of complaints;
Consequences for breach.
Be careful with broad waivers.
CXXXI. Drafting a Retraction or Correction
A proper correction should:
Identify the original post;
State that the accusation was unsupported or false;
Apologize clearly;
Avoid repeating defamatory statements unnecessarily;
Avoid blaming the victim;
Be posted with similar visibility if agreed;
Remain online for an agreed period, if settlement requires.
Example:
“On [date], I posted statements about [name] regarding [general subject]. I acknowledge that I did not have sufficient basis for those statements. I retract them and apologize for the harm caused.”
CXXXII. Evidence Checklist for Complainants
Prepare:
Screenshots;
URLs;
Screen recordings;
Witness affidavits;
Translations;
Proof of identity of poster;
Proof complainant was identified;
Proof of publication;
Proof of defamatory meaning;
Proof of falsity, if available;
Proof of malice;
Proof of damage;
Demand letter, if any;
Platform reports, if any;
Digital copies in USB or cloud;
Printed copies;
Valid ID;
Complaint-affidavit.
CXXXIII. Evidence Checklist for Respondents
Prepare:
Full context of post;
Proof of truth;
Official records;
Receipts;
Contracts;
Messages showing basis;
Proof of good faith;
Proof of private or limited audience;
Proof no one identified complainant;
Proof of opinion or fair comment;
Proof of privilege;
Proof account was hacked, if applicable;
Retraction or apology, if any;
Witness affidavits;
Timeline;
Copies of demand and responses.
CXXXIV. Common Mistakes by Complainants
Common mistakes include:
Failing to capture the full post;
No URL saved;
No witness affidavit;
Relying on cropped screenshots;
Delaying until the post is deleted;
Filing in wrong venue;
Failing to show respondent authored post;
Failing to show complainant was identifiable;
Filing over mere insult without defamatory imputation;
Posting counter-accusations;
Deleting useful evidence;
Ignoring prescription;
Not organizing attachments.
CXXXV. Common Mistakes by Respondents
Common mistakes include:
Ignoring subpoenas;
Posting more attacks;
Threatening complainant;
Deleting evidence without preserving context;
Claiming truth without proof;
Saying “opinion lang” after making factual accusations;
Relying on “not naming names” when the person is identifiable;
Assuming “shared lang” is always safe;
Using fake screenshots;
Claiming hacking without proof;
Refusing reasonable settlement;
Admitting facts carelessly online.
CXXXVI. Frequently Asked Questions
Can I file cyber libel for a Facebook post?
Yes, if the post contains a defamatory imputation, identifies you, is published to others, is malicious, and was made through electronic means.
Is a private message cyber libel?
If sent only to you, publication may be lacking. If sent to a group or third persons, cyber libel may be possible.
What if my name was not mentioned?
You may still file if you are identifiable through photo, initials, context, comments, tags, or circumstances.
Is calling someone “scammer” cyber libel?
It can be, especially if it imputes fraud or criminal conduct and is made publicly without sufficient basis.
Is truth a defense?
Truth may be a defense, especially with good motives and justifiable ends, but you must be able to prove it.
Can I file if the post was deleted?
Yes, if you preserved screenshots, links, recordings, witnesses, or other proof.
Can sharing a defamatory post make me liable?
It can, especially if you endorse, repeat, or add defamatory comments.
Can I be sued for a negative review?
Possibly, if the review contains false defamatory accusations. A truthful, factual, good-faith review is safer.
Can a company file cyber libel?
Yes, if defamatory statements harm its business reputation and the company is identifiable.
Should I send a demand letter first?
It may help, but it is not always required. Preserve evidence and consider prompt filing if the matter is serious.
CXXXVII. Main Answer
To file a cyber libel case in the Philippines, the complainant should first preserve the online evidence, including screenshots, URLs, screen recordings, full context, and witness affidavits. The complainant must show that the respondent published a defamatory imputation online, that the complainant was identifiable, that the statement was communicated to third persons, that malice exists or may be presumed, and that the publication was made through a computer system or electronic means.
The complaint may be filed with cybercrime law enforcement offices or the proper prosecutor’s office, supported by a sworn complaint-affidavit and documentary evidence. The prosecutor will determine probable cause. If the case proceeds, the prosecution must prove guilt beyond reasonable doubt in court.
Cyber libel is not established by hurt feelings alone. The statement must be defamatory, published, identifiable, malicious, and made through electronic means. The respondent may raise defenses such as truth, fair comment, privileged communication, opinion, lack of malice, lack of publication, lack of identification, lack of authorship, prescription, or improper venue.
Conclusion
Cyber libel in the Philippines is a serious legal remedy for online attacks that damage reputation. It applies to defamatory publications made through social media, messaging groups, websites, videos, blogs, emails, and other electronic platforms. But it is also a serious criminal accusation that requires careful proof.
For complainants, the most important steps are to preserve digital evidence, prove publication, show identifiability, establish defamatory meaning, connect the respondent to the post, and file promptly. For respondents, the most important defenses are truth, privilege, fair comment, opinion, lack of identification, lack of publication, lack of malice, and lack of authorship.
The practical rule is simple:
Before filing or defending a cyber libel case, focus on the exact words, the platform used, who saw the statement, whether the complainant was identifiable, whether the statement was defamatory or merely opinion, whether malice exists, and whether the digital evidence can be authenticated.