Filing Complaints for Harassment, Threats, and Stalking in the Philippines

(General information only; not legal advice.)

Harassment, threats, and stalking often overlap in real life: repeated messages, unwanted visits, following, intimidation, humiliation online, threats to harm you or your family, impersonation, leaking private information, or coercion. Philippine law does not always use the word “stalking” as a single, standalone crime for all situations, but many stalking behaviors are criminal, and several special laws provide stronger remedies—especially when the conduct is gender-based, workplace/school-related, online, or involves intimate partners.

This article explains (1) what conduct is covered, (2) which laws commonly apply, (3) where and how to file complaints, (4) what evidence matters, (5) protective orders and urgent remedies, and (6) what to expect after filing.


1) Know the conduct you’re dealing with

A. Harassment (broad term)

“Harassment” is used in everyday language to cover many acts, such as:

  • Repeated unwanted contact (calls, texts, DMs, emails)
  • Public shaming, insults, sexual remarks, persistent propositions
  • Monitoring your movements, repeated appearances at your home/work/school
  • Sending gifts/letters after being told to stop
  • Using others to contact you (friends, coworkers, family)
  • Doxxing (sharing your address/phone/employer), impersonation, account takeovers
  • Threats to ruin your reputation, get you fired, or “teach you a lesson”

Because “harassment” is broad, the legal route depends on what exactly was done, how it was done, and who did it.

B. Threats

Threats include:

  • Threats to kill, injure, rape, kidnap, or harm your family
  • Threats to burn property, damage a business, or destroy belongings
  • Threats to release intimate photos/videos or private information
  • Threats meant to force you to do something (pay money, return to a relationship, withdraw a complaint)

C. “Stalking” behaviors

Common stalking patterns:

  • Following you physically; showing up repeatedly where you are
  • Repeated communications despite clear refusal
  • Surveillance (watching your house, workplace; tracking; using others)
  • Creating fear and forcing changes in your daily routine

Even if a law doesn’t label it “stalking” in every context, the conduct may still be prosecutable as threats, coercion, unjust vexation, alarms/scandals, gender-based sexual harassment, VAWC, or cybercrime-related offenses depending on facts.


2) Key Philippine laws used in these cases

A. Revised Penal Code (RPC): common “baseline” criminal charges

These are frequently used for harassment/threat/stalking fact patterns:

  • Grave Threats (Art. 282) / Light Threats (Art. 283) / Other Light Threats (Art. 285) Used when someone threatens harm to you, your family, or your property. The seriousness depends on the nature of the threat and conditions attached.

  • Grave Coercion (Art. 286) / Light Coercion & Unjust Vexation (Art. 287) Coercion is forcing someone to do something against their will (or preventing them from doing something) through violence, threats, or intimidation. Unjust vexation is a catch-all for irritating, annoying, or distressing conduct without lawful purpose—often used for persistent unwanted harassment that doesn’t neatly fit other crimes.

  • Slander by Deed (Art. 359) / Oral Defamation (Art. 358) For humiliating acts/gestures or spoken insults in certain contexts.

  • Intriguing Against Honor (Art. 364) For certain acts that cause dishonor by intrigue (less common, fact-specific).

  • Alarms and Scandals (Art. 155) Sometimes invoked for scandalous behavior disturbing public peace (context-dependent).

Practical note: For repeated “stalking-like” conduct without a specialized statute applying, prosecutors often look at unjust vexation, coercion, and threats, plus any related offenses (trespass, physical injuries, etc.) that occurred along the way.


B. Cybercrime Prevention Act (RA 10175): when done through ICT

When acts are committed through computers, phones, social media, email, messaging apps, etc., RA 10175 may matter in two ways:

  1. Cybercrime offenses (e.g., illegal access/hacking, identity theft, data interference) if the harasser broke into accounts, impersonated you, stole data, or manipulated systems.

  2. “Cyber-related” prosecution of traditional crimes: Crimes already punishable under the RPC may carry heavier penalties when committed through information and communications technology (ICT), depending on how the offense is charged and proved.

Also relevant: preservation and collection of electronic evidence, which may require faster action.


C. Safe Spaces Act (RA 11313): Gender-Based Sexual Harassment (GBSH)

RA 11313 expanded protection beyond the old workplace/school framework. It addresses gender-based sexual harassment in:

  • Streets and public spaces
  • Workplaces
  • Educational/training institutions
  • Online spaces

Covered acts can include unwanted sexual remarks, persistent sexual advances, misogynistic harassment, and certain stalking-like behaviors when they are gender-based and fall within the law’s definitions and contexts. It also creates duties for employers/schools and can lead to administrative and/or criminal consequences depending on the setting and act.


D. Anti-Sexual Harassment Act (RA 7877): workplace/school, authority influence

RA 7877 focuses on sexual harassment in work/education/training where the offender has authority, influence, or moral ascendancy, and the act is tied to employment/school conditions or a hostile environment.

Many workplaces now process sexual harassment complaints through internal mechanisms (often a committee), in addition to possible criminal/administrative actions.


E. Anti-VAWC (RA 9262): if the offender is an intimate partner (or covered relationship)

RA 9262 is one of the most powerful tools when it applies. It covers violence against women and their children, including psychological violence, threats, harassment, and acts that cause mental or emotional suffering.

It applies when the offender is:

  • A current or former husband
  • A current or former boyfriend or dating partner
  • A person with whom the woman has or had a sexual or dating relationship
  • A person with whom she has a common child

Key advantage: Protection orders (see Section 6 below) can be obtained quickly, and the law is designed for ongoing harassment, intimidation, and control dynamics.


F. Other special laws that often overlap

Depending on facts, these may apply:

  • Anti-Photo and Video Voyeurism Act (RA 9995) – sharing or threatening to share intimate images/videos without consent.
  • Anti-Bullying Act (RA 10627) – for school-based bullying in covered schools (handled through school mechanisms, may overlap with crimes).
  • Data Privacy Act (RA 10173) – certain misuse of personal data (often enforced through administrative proceedings, fact-specific).
  • Civil Code (damages, injunction) – civil suits may be possible alongside criminal actions.

3) Where to file: choosing the correct venue

A. Emergency situations

If there is immediate danger (active threat, someone outside your home, attempted entry, assault), call:

  • PNP emergency hotlines / local police station
  • Barangay for immediate assistance
  • Seek medical help if injured

B. Police / Women and Children Protection Desk (WCPD)

File with:

  • PNP station covering where the incident happened or where you live/work (depending on the case)
  • WCPD for VAWC-related matters or cases involving women/children

Police can:

  • Take your statement
  • Record in the blotter
  • Conduct initial investigation
  • Refer to prosecutor for inquest or regular filing
  • Assist in evidence handling and coordination

C. NBI Cybercrime Division / PNP Anti-Cybercrime Group (ACG)

For online harassment and account-related abuses:

  • NBI Cybercrime
  • PNP ACG

They are useful when you need technical assistance (account compromise, tracing, preservation advice).

D. Office of the City/Provincial Prosecutor

For most criminal cases not requiring immediate arrest, you file a complaint-affidavit for preliminary investigation at the prosecutor’s office.

E. Barangay (Katarungang Pambarangay / mediation)

Many minor disputes between residents of the same city/municipality may pass through barangay conciliation first. However, there are important exceptions, including situations where:

  • You need urgent legal protection,
  • The respondent lives in a different city/municipality (or other statutory exceptions apply),
  • The case is not subject to barangay settlement procedures,
  • VAWC cases are generally treated with urgency and are not handled like ordinary compromise disputes.

Because barangay rules can be technical and exception-heavy, victims often still begin with a blotter report for documentation even when conciliation is not appropriate.


4) Evidence: what to collect, how to preserve, and common pitfalls

A. Core evidence checklist (do this early)

  1. Timeline / incident log Dates, times, places, what happened, who witnessed, how you responded, and how it affected you.

  2. Screenshots and screen recordings

    • Messages (SMS, Messenger, Viber, WhatsApp, Telegram, IG, email)
    • Threats, repeated contact, impersonation, harassment posts Capture: username, profile URL (if available), date/time, and the full conversation context.
  3. Call logs / voicemail Export logs if possible, or photograph another device showing the logs.

  4. Links and identifiers URLs to posts, profiles, messages, group chats.

  5. Witness affidavits Coworkers, neighbors, security guards, friends who saw the following/visits/threats.

  6. CCTV / building security logs Request copies quickly; many systems overwrite within days.

  7. Medical records / psychological consultation notes (when relevant) Particularly important for VAWC psychological violence or any injury-based offense.

  8. Proof you clearly told them to stop (when safe to do so) A single clear boundary message can help show “unwanted” contact—do not prolong engagement.

B. Preserve digital evidence properly

  • Keep original files where possible.
  • Don’t edit screenshots; keep originals and backups.
  • If posts may be deleted, capture them immediately and note the URL and timestamp.
  • Consider asking the investigating officer about preservation requests to platforms or service providers.

C. Recording audio/video: be cautious

Philippine law on recording private communications can be strict and fact-sensitive. If you plan to record calls or private conversations, get legal advice first to avoid creating evidence that becomes legally problematic.

(Photos/videos in public places and CCTV are often treated differently from secretly recording private communications, but the boundaries can matter.)


5) What to file: criminal, administrative, civil, or all of the above

A. Criminal complaint (most common path)

You typically submit:

  • Complaint-affidavit (your sworn narration)
  • Attachments (screenshots, printouts, USB, photos)
  • Affidavits of witnesses
  • Proof of identity and contact details

You file at:

  • Prosecutor’s office (for preliminary investigation), or
  • Police (who may assist and refer), or
  • NBI/ACG (for cyber-related support)

B. Workplace or school administrative complaint

If the harassment is in a workplace or educational setting:

  • File under company policy and applicable laws (Safe Spaces Act mechanisms, Anti-Sexual Harassment Act processes).
  • HR, a designated committee, or compliance office may investigate.
  • Administrative findings can support (but do not automatically replace) criminal cases.

C. Civil remedies

Even if criminal charges are not pursued or are pending, a victim may consider:

  • Civil damages for injury, suffering, reputational harm, costs
  • Certain court orders (fact-dependent) where available under procedural rules and substantive law

Civil strategy is usually best planned with counsel due to costs, timelines, and proof burdens.


6) Protection orders and urgent remedies (especially powerful under RA 9262)

If RA 9262 (VAWC) applies, protection orders can be life-changing.

A. Types of protection orders

  1. Barangay Protection Order (BPO) Typically addresses immediate protection needs; may include orders to stop contacting/harassing and to stay away within limits defined by law and practice.

  2. Temporary Protection Order (TPO) Issued by the court for immediate, time-limited protection.

  3. Permanent Protection Order (PPO) Issued after hearing; longer-term protection.

B. What protection orders can do (examples)

  • Order the respondent to stop harassing, threatening, contacting, surveilling
  • Require the respondent to stay away from home/work/school
  • Address contact through third parties
  • Provide other protective conditions allowed by law and the court

C. Practical advantages

  • Faster relief than waiting for a full criminal trial
  • Clear enforcement basis if the respondent continues harassment

7) Step-by-step: how the criminal process usually works

Step 1: Document and secure immediate safety

  • Save evidence, create an incident log, inform trusted people.
  • Consider safe housing and emergency contacts if threats escalate.

Step 2: Make an initial report (often recommended)

  • Police blotter entry can help establish a record of ongoing conduct.
  • For online harassment, consider reporting to ACG/NBI for technical guidance.

Step 3: Prepare your complaint-affidavit

Your affidavit should be:

  • Chronological and specific (dates, times, places, exact words if possible)
  • Focused on facts and how they meet elements of offenses (threats, coercion, repeated unwanted acts)
  • With attachments labeled and explained (“Annex A,” “Annex B,” etc.)

Step 4: File with the prosecutor (preliminary investigation)

  • The prosecutor evaluates whether there is probable cause.
  • The respondent will usually be required to submit a counter-affidavit.
  • There may be a reply and rejoinder (depends on office practice).

Step 5: Prosecutor resolution

  • If probable cause is found, an Information is filed in court.
  • If dismissed, remedies may exist (often time-bound and procedural).

Step 6: Court phase

  • Court may issue a warrant (depending on the offense and circumstances).
  • Arraignment, pre-trial, trial follow.
  • Some offenses allow bail; conditions depend on the charge.

Because timelines vary widely by locality and court load, cases can take time—this is why protection orders (where available) and safety planning matter.


8) Choosing charges: practical mapping of common scenarios

Scenario A: Repeated unwanted messages and calls; no explicit threats

  • Often evaluated as Unjust Vexation (Art. 287) and/or related offenses
  • If gender-based/sexual in nature and within covered contexts: Safe Spaces Act may apply
  • If workplace/school with authority dynamics: RA 7877 may apply
  • If intimate partner/ex-partner (woman victim): RA 9262 psychological violence / harassment

Scenario B: “I will kill you,” “I will hurt your child,” “I will burn your house”

  • Grave Threats / Light Threats depending on details
  • If sent via ICT: consider cyber-related treatment under RA 10175 framework
  • If by intimate partner/ex-partner toward a woman: often also VAWC with protection orders

Scenario C: Following you, appearing at home/work, surveillance, contacting your friends

  • Often charged using combinations of: Unjust Vexation, Coercion, Threats, plus other crimes if trespass, damage, or injuries occur
  • If gender-based sexual dimension exists in covered settings: Safe Spaces Act
  • If intimate partner/ex-partner and woman victim: RA 9262, where protection orders can directly target “stalking-like” conduct

Scenario D: Threat to release private/intimate images; or actual sharing

  • RA 9995 (Photo/Video Voyeurism)
  • Potential additional crimes depending on accompanying threats/coercion
  • Strongly consider rapid preservation of evidence

Scenario E: Online impersonation, hacked accounts, doxxing tied to intimidation

  • Possible RA 10175 offenses (identity theft/illegal access/data interference) depending on proof
  • Plus threats/coercion/unjust vexation as applicable
  • Data privacy issues may arise in some doxxing patterns

9) Common mistakes that weaken cases

  • Deleting conversations or failing to preserve URLs and timestamps
  • Continuing long arguments that blur “unwanted contact” boundaries (safety first, but keep communications minimal)
  • Waiting too long to request CCTV or building logs
  • Submitting only cropped screenshots without context
  • Filing in the wrong forum without considering special laws (e.g., missing RA 9262 eligibility)
  • Treating workplace/school harassment purely as “HR” (internal discipline is useful, but may not stop criminal conduct)

10) Practical drafting tips for a strong complaint-affidavit

A useful structure:

  1. Who you are and relationship to respondent
  2. Background (how contact began, when you told them to stop)
  3. Incident narrative (chronological; numbered paragraphs)
  4. Specific threats / acts (quote exact words where possible)
  5. Impact and fear (changes in routine, safety measures, distress)
  6. Evidence list (Annexes with short descriptions)
  7. Request (investigation and filing of appropriate charges)

Keep it factual. Avoid speculation about motives unless tied to observable facts.


11) Special notes: minors, schools, and family contexts

  • If the victim is a minor, additional protections and special procedures may apply, and reporting pathways often involve specialized desks and child protection mechanisms.
  • For school-based bullying/harassment, the school’s child protection policy and the Anti-Bullying framework may be relevant, but criminal conduct (threats, extortion, voyeurism, physical injuries) can still be pursued separately.

12) Summary: the fastest way to get traction

  1. Ensure safety and document everything immediately.
  2. Identify whether RA 9262 (VAWC), RA 11313 (Safe Spaces), RA 7877, RA 9995, and/or RA 10175 apply—these can change the remedies dramatically.
  3. Start with a blotter report if needed for documentation and immediate police involvement.
  4. File a complaint-affidavit with the prosecutor for preliminary investigation, supported by organized evidence.
  5. If eligible under RA 9262, prioritize protection orders for immediate relief.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.