Harassment by Illegal Lending Apps Without Existing Debt

I. Overview

Harassment by illegal lending apps has become a serious consumer-protection, privacy, and cybercrime issue in the Philippines. The problem is not limited to borrowers. Many victims are people who never borrowed money, never signed a loan agreement, never used the app, or were merely listed as contacts by someone else. Some are falsely accused of owing money. Others are threatened, shamed, or repeatedly contacted because their phone number appeared in a borrower’s contact list.

In Philippine law, a person who has no loan obligation cannot be forced to pay. A lending app, collector, agent, or third party cannot legally create a debt by intimidation, false accusation, public shaming, or repeated harassment. Even when a real debt exists, collection must follow the law. When no debt exists, the harassment may involve several violations at once: unlawful debt collection, data privacy violations, cyber harassment, unjust vexation, grave threats, coercion, libel or cyberlibel, identity misuse, and possible violations of rules governing lending and financing companies.

This article discusses the Philippine legal framework, common forms of harassment, rights of non-borrowers, possible civil, criminal, administrative, and regulatory remedies, evidence preservation, and practical response steps.


II. What Are Illegal Lending Apps?

An illegal lending app is usually an online lending platform that operates without proper registration, authority, or compliance with Philippine lending and data privacy laws. Some are entirely unregistered. Others may be connected to registered entities but use abusive, deceptive, or unauthorized collection practices.

In the Philippines, lending companies generally fall under laws and regulations such as the Lending Company Regulation Act of 2007, the Financing Company Act, relevant Securities and Exchange Commission rules, the Data Privacy Act of 2012, and consumer-protection rules. Online lending platforms are also expected to comply with rules on transparency, consent, fair collection, cybersecurity, and proper handling of personal data.

Illegal or abusive lending apps often share the following characteristics:

They demand payment from people who did not borrow. They access or misuse a borrower’s phone contacts. They send threats through SMS, calls, email, Facebook, Messenger, Viber, Telegram, or WhatsApp. They shame people in group chats or social media. They fabricate posters accusing a person of fraud or nonpayment. They impersonate police, courts, lawyers, barangay officials, or government agencies. They threaten arrest, public exposure, or workplace embarrassment. They demand immediate payment through personal e-wallet accounts. They hide their company name, registration details, office address, or collector identity.

The illegality may come from the app’s lack of authority to lend, its unlawful collection methods, its data privacy violations, or all of these combined.


III. The Special Problem: Harassment Without Existing Debt

Harassment without existing debt happens when a person is contacted, threatened, humiliated, or pressured to pay a loan that they did not personally incur.

This usually occurs in several situations.

First, the victim’s number was saved in the phone contacts of an actual borrower. When the borrower downloaded the app, the app harvested or accessed the borrower’s contacts and began contacting relatives, friends, co-workers, customers, neighbors, or employers.

Second, the victim was falsely listed as a guarantor or reference without consent. A borrower may have entered the victim’s name or number, but the victim never agreed to guarantee the loan.

Third, the app or collector claims that the victim is “responsible” for the borrower’s loan merely because they are related, work together, live nearby, or are in the borrower’s contact list.

Fourth, the victim’s personal details were used without permission to create a fake loan account. This may involve identity theft, SIM misuse, stolen IDs, leaked data, or forged information.

Fifth, the victim is mistaken for another person with a similar name, number, or profile.

Sixth, the app deliberately uses intimidation tactics against innocent third parties because they believe public pressure will force the actual borrower to pay.

In all of these situations, the basic legal principle is the same: a person is not liable for another person’s debt unless that person validly agreed to be liable.


IV. No Debt Exists Without Consent, Contract, or Legal Obligation

Under Philippine civil law principles, obligations arise from sources such as law, contracts, quasi-contracts, crimes, and quasi-delicts. A loan obligation ordinarily arises from a contract. If a person did not borrow money, did not authorize anyone to borrow on their behalf, did not sign or electronically agree to a loan, and did not act as guarantor or surety, then there is generally no contractual basis to demand payment from that person.

A mere phone contact does not create debt. A family relationship does not automatically create debt. Being a friend, spouse, sibling, parent, child, employer, employee, co-worker, classmate, customer, or neighbor of a borrower does not automatically make one liable. Being called a “reference” does not make one a guarantor. A reference is usually only a person who may confirm identity or contact details. A guarantor or surety must clearly and voluntarily agree to answer for another’s obligation.

A collector cannot turn a non-borrower into a debtor through threats. Payment demanded under fear, shame, or intimidation may raise issues of coercion, unjust enrichment, or civil liability.


V. Is a “Reference Person” Liable for the Loan?

Usually, no.

A reference person is not the same as a co-maker, guarantor, surety, or co-borrower. A person may only become legally liable if there is a valid agreement showing that they undertook responsibility for the loan.

For example:

A borrower receives the money and promises to repay it.

A co-borrower jointly borrows and is usually jointly liable.

A guarantor promises to answer for the debt if the borrower fails to pay, subject to legal rules.

A surety directly binds themselves to pay if the principal debtor fails, often with stronger liability than an ordinary guarantor.

A reference is merely a contact person and is not automatically liable.

Therefore, if a lending app says, “You are listed as a reference, so you must pay,” that statement is legally misleading unless the person actually consented to be legally bound as a guarantor, surety, co-maker, or co-borrower.


VI. Common Forms of Harassment by Illegal Lending Apps

Illegal lending app harassment often includes one or more of the following:

1. Repeated Calls and Texts

Victims may receive dozens or hundreds of calls or messages in one day. These may come from different numbers to avoid blocking. The tone may become abusive, obscene, threatening, or humiliating.

2. Threats of Arrest or Criminal Case

Collectors may say that the victim or borrower will be arrested, jailed, blacklisted, or sued immediately. They may claim that police are on the way. They may use fake case numbers or fake legal language.

Nonpayment of a simple civil debt is generally not, by itself, a criminal offense. A person cannot be arrested merely because someone alleges an unpaid app loan. There can be criminal cases if there is fraud, falsification, identity theft, or other criminal conduct, but collectors cannot invent criminal liability just to scare people.

3. Public Shaming

Some collectors send messages to relatives, co-workers, employers, or social media contacts accusing the person of being a scammer, thief, fraudster, or irresponsible debtor. In cases involving non-borrowers, this is especially harmful because the accusation is false.

4. Fake Posters and Edited Photos

Some apps create “wanted,” “scammer,” or “estafa” posters using the victim’s photo, name, phone number, or workplace. This may implicate privacy laws, cyberlibel, unjust vexation, harassment, and civil damages.

5. Contacting Employers or Co-Workers

Collectors sometimes message HR, supervisors, clients, or colleagues to embarrass the person. For non-borrowers, this may damage reputation and employment relationships despite the absence of any debt.

6. Accessing and Misusing Phone Contacts

Many illegal lending apps request excessive app permissions, including contacts, photos, messages, call logs, or location. The data may then be used for collection harassment. Even where a borrower gave app access, the people in that borrower’s contact list did not necessarily consent to be contacted, profiled, shamed, or threatened.

7. Impersonation of Authorities

Collectors may pretend to be lawyers, police officers, NBI agents, court sheriffs, barangay officials, prosecutors, or government employees. This may create separate legal consequences, especially when done to intimidate or extort payment.

8. Threats of Violence or Harm

Some messages threaten physical harm, home visits, abduction, workplace confrontation, or violence against family members. These may amount to criminal threats, coercion, or other offenses depending on the wording and circumstances.

9. Demands for Payment to Personal Accounts

Illegal apps sometimes demand payment through personal GCash, Maya, bank, or remittance accounts instead of official company channels. This may indicate fraud, lack of accountability, or unauthorized collection.

10. Harassment of Minors, Elderly Persons, or Vulnerable Persons

Collectors may contact children, parents, grandparents, or sick relatives of the alleged borrower. Harassing people who have no debt and no capacity to verify the matter can aggravate the wrongdoing.


VII. Legal Rights of a Person Who Does Not Owe the Debt

A person harassed by a lending app despite having no debt has several rights.

They have the right to deny liability. They have the right to demand that the collector stop contacting them. They have the right to ask for the name of the lending company, SEC registration details, collection authority, data source, and basis of the alleged obligation. They have the right to refuse payment. They have the right not to be threatened, shamed, defamed, or contacted in an abusive manner. They have the right to data privacy. They have the right to complain before regulators. They have the right to seek police or cybercrime assistance if threats, blackmail, identity theft, or online defamation occur. They may have the right to claim damages if they suffer injury, reputational harm, anxiety, lost work, or other losses due to unlawful acts.

A non-borrower should not admit liability just to stop harassment. A short, firm written denial is safer than long explanations.

Example:

“I did not borrow from your company. I did not authorize anyone to borrow on my behalf. I did not agree to be a guarantor, surety, co-maker, or co-borrower. Stop contacting, threatening, or publishing information about me. Provide your company name, SEC registration, authority to collect, and the legal basis for your claim. Further harassment will be reported to the proper authorities.”


VIII. Data Privacy Issues

The Data Privacy Act of 2012 protects personal information and sensitive personal information. Lending apps and collectors that collect, process, store, disclose, or use personal data must have a lawful basis, comply with transparency and proportionality, use data only for legitimate purposes, and protect it from unauthorized access or misuse.

Harassment of non-borrowers often raises serious data privacy questions.

How did the app obtain the victim’s number? Was the number taken from another person’s contact list? Was consent obtained from the non-borrower? Was the data used for a purpose compatible with the reason it was collected? Was the data disclosed to third parties? Was the victim’s photo, address, employer, or social media profile used without consent? Was the data retained despite a demand to stop processing?

Even when the actual borrower allowed the app to access contacts, that does not automatically mean every contact consented to debt collection calls, public shaming, profiling, or threats. The app’s processing of third-party contact data may be excessive, unfair, or unlawful, especially when used to pressure people who are not debtors.

A complaint may be filed with the National Privacy Commission when personal data is misused, disclosed, harvested, or processed without lawful basis.

Possible data privacy violations may include unauthorized processing, malicious disclosure, unauthorized disclosure, failure to secure personal information, excessive data collection, and processing for purposes not disclosed or consented to.


IX. SEC and Lending Regulation Issues

The Securities and Exchange Commission regulates lending and financing companies. Lending companies must generally be registered and authorized. Online lending platforms must comply with SEC rules and cannot use abusive collection practices.

Harassment may be reported to the SEC when the entity is a lending company, financing company, online lending platform, or collection agent connected to one. The SEC has acted against online lending operators for abusive practices, lack of authority, unfair collection, and improper disclosure of borrower information.

Even if the collector refuses to identify the company, screenshots, app names, payment channels, phone numbers, bank or e-wallet accounts, and message patterns may help regulators trace the operator.

Complaints may involve:

unauthorized lending activity; failure to disclose company identity; abusive collection; false representation; public shaming; harassment of third parties; data misuse; use of unregistered online lending platforms; deceptive loan terms; unreasonable charges; and threats or intimidation.


X. Cybercrime Issues

Harassment through digital means may fall under the Cybercrime Prevention Act of 2012 when the unlawful act is committed through a computer system, mobile device, internet platform, messaging app, social media, or other information and communications technology.

Possible cyber-related offenses may include cyberlibel, identity theft, illegal access, misuse of devices, computer-related fraud, or other offenses depending on the facts. If the collector posts false accusations online, sends defamatory messages through social media, uses fake accounts, creates edited posters, or impersonates the victim, cybercrime remedies may be relevant.

Victims may seek help from the Philippine National Police Anti-Cybercrime Group or the National Bureau of Investigation Cybercrime Division, especially where there are threats, fake accounts, doxxing, extortion, identity theft, or public online defamation.


XI. Criminal Law Issues

Depending on the conduct, harassment by lending apps may implicate several criminal offenses under Philippine law.

1. Grave Threats

If a collector threatens to inflict harm, injury, violence, or another serious wrong, this may constitute threats. The seriousness depends on the language used, context, and whether the threat is conditional.

2. Light Threats or Other Threats

Less serious threats may still be punishable if they create fear or pressure.

3. Grave Coercion

If a person is forced through violence, intimidation, or threat to do something against their will, such as paying a debt they do not owe, grave coercion may be relevant.

4. Unjust Vexation

Repeated annoying, disturbing, or harassing conduct may fall under unjust vexation. This is often considered when conduct is abusive but does not neatly fit a more specific offense.

5. Libel or Cyberlibel

False and malicious statements that dishonor or discredit a person may constitute libel. If done through online platforms or electronic means, cyberlibel may be considered. Accusing a non-borrower of being a scammer, criminal, thief, or debtor in messages sent to others may create defamation issues.

6. Slander or Oral Defamation

If collectors verbally accuse or insult a person in calls or in public, oral defamation may be considered.

7. Alarms and Scandals

Public disturbance, scandalous behavior, or threatening scenes may fall under related offenses depending on the facts.

8. Identity Theft or Misuse of Personal Information

If someone used the victim’s identity to obtain a loan, open an account, create a fake profile, or impersonate the victim, identity theft or related offenses may apply.

9. Estafa or Fraud

If collectors obtain payment from a non-borrower by deceit, false claims, or fraudulent representation, fraud-related issues may arise.

10. Usurpation or Impersonation

Pretending to be a police officer, court officer, lawyer, government official, or public authority may trigger separate liability depending on the act and representation.


XII. Civil Liability and Damages

A victim may have civil remedies if harassment causes damage. Civil liability may arise from abuse of rights, defamation, invasion of privacy, quasi-delict, breach of data privacy duties, or wrongful acts causing injury.

Possible damages may include:

actual damages, such as lost income, medical expenses, therapy costs, transportation, legal expenses, or business losses;

moral damages, for anxiety, humiliation, besmirched reputation, wounded feelings, social shame, or mental suffering;

exemplary damages, where the conduct is oppressive, malicious, or wanton;

attorney’s fees and litigation expenses, where allowed by law.

For non-borrowers, the strongest civil claim often comes from the combination of false debt accusation, reputational injury, privacy invasion, and emotional distress.


XIII. Barangay Remedies

Some victims consider filing a complaint before the barangay. Barangay proceedings may help if the harasser is identifiable and located in the same city or municipality, or if the issue involves local persons. However, illegal lending app harassment often involves unknown callers, fake names, foreign-based operators, or companies outside the locality. In those cases, barangay conciliation may be ineffective or inapplicable.

Barangay blotter or certification may still help document threats, repeated calls, or visits. It can support later complaints to police, prosecutors, SEC, NPC, or cybercrime authorities.


XIV. What To Do Immediately

The first priority is safety and evidence preservation.

Do not panic and do not pay a debt you do not owe merely because of threats. Do not click suspicious links. Do not download additional apps sent by the collector. Do not provide IDs, selfies, OTPs, passwords, banking details, or e-wallet codes. Do not negotiate as if you are liable. Do not admit responsibility.

Preserve all evidence. Take screenshots of messages, call logs, social media posts, payment demands, account numbers, fake posters, and threats. Save the sender’s phone number, username, profile link, app name, website, email address, and payment account details. Record the date and time. If legal and practical, preserve call recordings, but be cautious with privacy rules and admissibility. Ask recipients of defamatory messages to forward screenshots to you. Save original files, not just cropped images.

Then send one firm written denial. After that, avoid emotional exchanges. Repeated arguments often give collectors more material to manipulate.

A useful response is:

“I have no loan with you. I did not consent to be a borrower, co-borrower, guarantor, surety, or reference for collection purposes. Stop contacting me and stop using or disclosing my personal information. Identify your company, registration details, data source, and legal basis for contacting me. I am preserving your messages for complaints with the authorities.”

After sending this, block numbers if necessary, but keep records first.


XV. Where To Report

A victim may report to several agencies depending on the conduct.

1. National Privacy Commission

Report to the NPC if the app or collector misused personal data, accessed contacts, disclosed personal information, posted photos or personal details, contacted third parties without lawful basis, or refused to stop processing the victim’s data.

2. Securities and Exchange Commission

Report to the SEC if the harassment involves a lending company, financing company, online lending app, collection agency, or entity pretending to lend money. Include the app name, company name, phone numbers, screenshots, payment accounts, and any registration claims.

3. PNP Anti-Cybercrime Group

Report to the PNP ACG if there are online threats, fake accounts, cyberlibel, identity theft, doxxing, or digital harassment.

4. NBI Cybercrime Division

Report to the NBI Cybercrime Division for online extortion, fake accounts, identity theft, cyberlibel, hacking, or organized online harassment.

5. Local Police or Prosecutor’s Office

Report to local police or the prosecutor if there are threats, coercion, defamation, harassment, or attempts to extort money.

6. DICT, App Stores, and Platforms

Reports may also be made to app stores, social media platforms, e-wallet providers, banks, telecom providers, and messaging platforms. Removal of fake posts or suspension of abusive accounts may require platform reporting in addition to government complaints.

7. Bank, GCash, Maya, or Remittance Provider

If payment is demanded through a personal account, report the account as potentially involved in harassment, fraud, or unauthorized collection. This can help preserve transaction trails.


XVI. Evidence Checklist

A strong complaint should include:

Full name and contact details of the complainant; statement that the complainant has no loan with the app; explanation of how the harassment began; screenshots of all messages; call logs; recordings if available; social media posts or links; names and numbers of collectors; app name and download link if known; website if known; company name if claimed; SEC registration details if claimed; payment instructions and account numbers; names of persons contacted by the collector; screenshots from relatives, friends, co-workers, or employer; proof of reputational harm or work disruption; copy of any denial or cease-contact message sent; and a timeline of events.

The timeline should be simple:

Date and time. Sender. Platform. Message or act. Evidence file name. Effect on victim.

Example:

May 7, 2026, 9:15 a.m. — Unknown number 09xx xxx xxxx sent SMS accusing me of owing a loan to App X. Screenshot 1.

May 7, 2026, 9:27 a.m. — Same number threatened to message my employer. Screenshot 2.

May 7, 2026, 10:02 a.m. — My co-worker received a message calling me a scammer. Screenshot 3.

A clear timeline helps agencies understand the pattern.


XVII. What Not To Do

Do not pay just to “clear your name” unless you have confirmed a real legal obligation. Payment may encourage further demands.

Do not send your ID to the collector. This may expose you to identity theft.

Do not send an apology that sounds like an admission of debt.

Do not threaten the collector back. Keep your response factual.

Do not delete messages. Preserve them first.

Do not rely only on blocking. Blocking may stop immediate annoyance, but documentation is important if the harassment escalates.

Do not post the collector’s personal information publicly unless legally advised. Public retaliation can create legal risk.

Do not assume that a demand letter sent by text is valid. Ask for formal identification, company details, and legal basis.

Do not ignore credible threats of physical harm. Report them immediately.


XVIII. Employer and Workplace Issues

If collectors contact an employer, HR, supervisor, or co-workers, the victim should act quickly to prevent reputational damage.

A brief notice to HR may be appropriate:

“I am being harassed by an online lending app regarding a loan I did not make and do not owe. They may send false messages using my name. I have preserved evidence and am reporting the matter. Please disregard any collection messages and forward any received screenshots to me for documentation.”

This protects the employee from misunderstanding and creates an internal record. If the harassment affects work performance, attendance, reputation, or employment status, this may support a later claim for damages.

Employers should avoid disciplining employees based only on unverified lending-app accusations. A debt allegation, especially from an illegal or abusive app, is not proof of misconduct.


XIX. Family Members and Contacts of Borrowers

Many victims are relatives or friends of an actual borrower. The collector may say, “Your child borrowed,” “Your sibling owes us,” or “You must tell them to pay.” The legal answer remains: unless the family member agreed to be liable, the family member does not owe the debt.

Parents are not automatically liable for adult children’s app loans. Children are not automatically liable for parents’ loans. Spouses are not automatically liable for each other’s personal loans unless the obligation falls under applicable rules on conjugal or community property, family expenses, or valid consent. Siblings, friends, classmates, and co-workers are not liable merely because of association.

The collector may ask the non-borrower to relay a message. The non-borrower may refuse, especially if the communication is abusive. A collector cannot legally use third parties as pressure tools.


XX. Identity Theft: When a Loan Was Made Using Your Name

A more serious situation arises when the app claims that the victim personally borrowed, but the victim never applied. This may indicate identity theft.

Immediate steps include:

Request proof of the loan application, including date, phone number, email, ID used, selfie verification, bank or e-wallet disbursement account, IP logs if available, and signed or electronic loan documents. State clearly that the debt is disputed due to identity misuse. File reports with police or cybercrime authorities. Notify banks, e-wallet providers, and telecom providers if accounts or SIMs were misused. Consider an affidavit of denial or affidavit of identity theft. Monitor credit records and financial accounts.

A victim should not simply pay a fraudulent loan because doing so may make future disputes harder.


XXI. Demand Letters, Court Threats, and “Final Notices”

Illegal collectors often use fake legal language. Common phrases include “final warning,” “legal department,” “cybercrime case,” “estafa case,” “subpoena,” “warrant,” “blacklist,” or “barangay warrant.”

A real court case follows formal procedure. A real subpoena, summons, court order, or prosecutor’s notice normally comes through official channels and contains verifiable details. A text message saying “you will be arrested today” is not the same as a lawful warrant. A private collector cannot issue a warrant of arrest. A barangay cannot issue a warrant of arrest for a private debt. Police do not arrest people merely because a lending app says so.

However, victims should not ignore genuine legal documents. If an official notice is received, verify it directly with the issuing court, prosecutor, barangay, or agency.


XXII. Can Collectors Contact Third Parties?

Legitimate debt collection may sometimes involve limited contact with references for location or verification purposes, but abusive disclosure of debt details, threats, repeated calls, public shaming, or pressure tactics against third parties are legally risky. For non-borrowers, repeated collection contact is especially improper because there is no debt to collect from them.

A collector should not disclose personal debt information to unrelated third parties. A collector should not shame a person in group chats. A collector should not threaten contacts. A collector should not call a workplace repeatedly. A collector should not falsely state that a non-borrower is liable.


XXIII. The Role of Consent in Lending Apps

Many lending apps rely on “consent” obtained through app permissions. But consent under privacy law must generally be informed, specific, freely given, and connected to a legitimate purpose. A borrower’s act of granting access to contacts does not automatically authorize abuse of those contacts. Consent is also not a license to commit harassment, threats, defamation, or coercion.

For non-borrowers, the issue is even clearer: they usually did not install the app, did not accept the privacy policy, did not agree to be contacted, and did not consent to collection pressure.


XXIV. Harassment Through Social Media

When collectors use Facebook, Messenger, Instagram, TikTok, Telegram, Viber, or other platforms, victims should preserve the profile URL, username, account ID, screenshots, timestamps, and message headers if visible. Do not only screenshot the message bubble; capture the sender’s profile and the full context. If the collector posts publicly, preserve the URL and ask trusted people to capture screenshots from their accounts as well.

Report the content to the platform for harassment, bullying, impersonation, doxxing, scam, or privacy violation. Platform removal does not replace legal remedies, but it can limit the spread of harm.


XXV. Sample Cease-and-Desist Message

A non-borrower may send a simple message like this:

I am not your borrower. I did not receive any loan from you. I did not authorize anyone to borrow using my name or number. I did not agree to be a co-borrower, guarantor, surety, co-maker, or collection reference.

Stop contacting me, my family, my workplace, and my contacts. Stop using, processing, publishing, or disclosing my personal information. Send your company name, SEC registration, business address, name of your data protection officer, proof of your authority to collect, and the legal basis for your claim.

I am preserving all messages, calls, numbers, account details, and screenshots for complaints with the National Privacy Commission, Securities and Exchange Commission, PNP Anti-Cybercrime Group, NBI Cybercrime Division, and other proper authorities.

This message should be sent once or only as needed. Endless conversation with collectors is usually unhelpful.


XXVI. Sample Affidavit Points

An affidavit for complaint purposes may include:

The complainant’s identity and address. A statement that the complainant never borrowed from the lending app. A statement that the complainant did not authorize anyone to borrow on their behalf. A statement that the complainant did not consent to be a guarantor, surety, co-maker, co-borrower, or collection reference. A description of the harassment. A list of phone numbers, names, accounts, app names, and payment channels used. A description of messages sent to third parties. A statement of emotional distress, reputational harm, work disruption, or fear. A statement that screenshots and records are attached. A request for investigation.

An affidavit should be truthful, factual, and chronological. Avoid exaggeration. Attach evidence.


XXVII. Remedies Against App Stores and Platforms

Victims may report abusive lending apps to the Google Play Store, Apple App Store, Facebook, and other platforms. Reports should mention that the app is engaging in harassment, unauthorized use of contacts, threats, impersonation, or privacy violations. If the app is already removed but collectors continue operating, preserve the app package name, screenshots, old download links, advertisements, and company details.

Removal from an app store does not erase liability for past acts, but it may prevent further victimization.


XXVIII. Telecom and SIM-Related Measures

Because harassment often comes from disposable SIM cards, victims may report abusive numbers to their telecom provider. The SIM Registration Act may help authorities trace registered users, though ordinary private individuals cannot simply demand subscriber identity without proper legal process. Screenshots and call logs can support police or cybercrime complaints.

Victims may also use phone features to silence unknown callers, block numbers, filter spam, or route unknown messages to a separate folder. These are practical protections, not substitutes for legal action.


XXIX. E-Wallet and Payment Account Trails

Illegal collectors often instruct payment to GCash, Maya, bank, or remittance accounts. Those account details are important evidence. Victims should preserve:

account name; account number or mobile number; QR code; screenshots of payment instructions; collector messages linking the account to the demand; date and time of demand; and any reference number.

If money was paid under threat despite no debt, report the payment channel to the provider and consider legal action for fraud, coercion, or recovery of payment.


XXX. Special Concerns for Public Employees, Teachers, OFWs, and Professionals

Harassment can be especially damaging for public employees, teachers, seafarers, OFWs, medical workers, lawyers, accountants, and other professionals because collectors may threaten to contact agencies, employers, licensing bodies, or foreign employers.

False accusations may affect professional reputation. Victims should document the harassment and notify relevant workplace authorities calmly before the collector’s messages cause confusion. A person should not be disciplined or professionally judged based only on unverified messages from an illegal lending app.

OFWs may also face harassment through relatives in the Philippines. Their families should preserve evidence and file complaints locally where appropriate.


XXXI. When the Actual Borrower Is Someone You Know

If the harassment is connected to a person you know, you may tell the borrower that their app may have accessed their contacts and is harassing people. But you are not required to pay. You should not let the collector pressure you into becoming a mediator or guarantor.

A safe message to the borrower is:

“I am receiving harassment from a lending app about your alleged loan. I am not liable for your loan and did not consent to be contacted. Please deal with them directly. I am documenting all messages and may file complaints.”

Avoid threatening the borrower. The wrongdoing may be primarily by the lending app, although the borrower may have contributed by submitting names or contacts without consent.


XXXII. Prescription and Timing

Victims should act promptly. Some remedies have deadlines, and digital evidence can disappear quickly. Social media posts may be deleted. Numbers may be deactivated. Apps may change names. Collectors may erase accounts. The sooner the evidence is preserved, the stronger the complaint.

For cybercrime or criminal complaints, prompt reporting also helps authorities trace accounts, platforms, devices, and financial trails.


XXXIII. Frequently Asked Legal Questions

1. Can I be forced to pay because I am listed as a contact?

No. Being listed as a phone contact does not make you liable.

2. Can I be liable because I am a relative of the borrower?

Not automatically. Family relationship alone does not create loan liability.

3. Can I be liable because I was listed as a reference?

Not unless you clearly agreed to be a guarantor, surety, co-maker, co-borrower, or otherwise legally bound.

4. Can they arrest me?

A private collector cannot arrest you. Nonpayment of a simple debt is generally civil, not criminal. If you did not borrow at all, the claim is even weaker. Real criminal processes require lawful procedure.

5. Should I pay to stop the harassment?

Generally, no, if you truly do not owe the debt. Payment may encourage more demands.

6. Can I sue them?

Depending on the facts, you may have criminal, civil, administrative, privacy, and regulatory remedies.

7. What if they used my photo?

That may raise privacy, defamation, cybercrime, and civil damages issues.

8. What if they messaged my employer?

Preserve the message, inform HR that the claim is false, and include it in complaints.

9. What if they are using different numbers?

Document each number. The pattern itself is evidence of harassment.

10. What if I do not know the company name?

Use the app name, screenshots, phone numbers, payment accounts, URLs, and message content. Regulators and cybercrime authorities may use these details to trace the operator.


XXXIV. Legal Theories That May Apply

A complaint may be framed under multiple overlapping theories:

No contractual obligation exists because the complainant did not borrow, consent, or guarantee the loan.

The collector engaged in harassment, intimidation, threats, or coercion.

The collector made false statements damaging the complainant’s reputation.

The collector unlawfully processed personal data.

The app harvested or misused contact information.

The collector disclosed alleged debt information to unauthorized third parties.

The collector impersonated authorities or used deceptive legal threats.

The collector attempted to obtain money from a person who had no debt.

The collector’s acts caused mental anguish, reputational injury, work disruption, and other damages.

The app or company operated without proper authority or violated online lending rules.


XXXV. Practical Complaint Structure

A well-organized complaint may follow this structure:

1. Introduction State that you are filing a complaint for harassment, unlawful collection, data privacy violation, and related acts by an online lending app despite having no debt.

2. Parties Identify yourself and all known respondents: app name, company name, collector names, numbers, social media accounts, e-wallet accounts, and websites.

3. Statement of No Debt Clearly state that you never borrowed, never received money, never signed or agreed, and never guaranteed the alleged loan.

4. Facts Narrate events chronologically.

5. Harassing Acts List calls, threats, public shaming, messages to third parties, fake posters, employer contact, or impersonation.

6. Privacy Violations Explain how your personal data was used without consent.

7. Harm Suffered Describe anxiety, humiliation, reputational damage, work disruption, fear, or financial loss.

8. Evidence Attach screenshots, call logs, messages, URLs, affidavits from people contacted, and payment details.

9. Relief Requested Request investigation, takedown or cessation, sanctions, prosecution if warranted, data deletion, and other appropriate remedies.


XXXVI. Preventive Measures

To reduce risk from lending app harassment:

Limit public exposure of phone numbers on social media. Review privacy settings. Avoid sharing IDs and selfies with unknown apps. Warn family members not to install suspicious lending apps. Disable unnecessary app permissions. Use separate numbers for public transactions when possible. Monitor whether your name or photo is being used online. Be cautious when someone asks to list you as a reference. Never share OTPs. Report suspicious app links.

Borrowers should also avoid apps that request excessive permissions, hide fees, refuse to disclose company identity, or use threats. One person’s app installation can expose many innocent contacts.


XXXVII. Key Takeaways

A person with no loan is not liable merely because a lending app says so. A contact, reference, relative, co-worker, or friend is not a debtor. Debt cannot be created by harassment.

Illegal lending apps often violate more than one area of law: lending regulation, data privacy, criminal law, cybercrime law, and civil liability. The strongest response is evidence preservation, a clear denial of liability, refusal to provide sensitive information, and complaints to the proper agencies.

The victim should focus on three points: I did not borrow. I did not consent. I am preserving evidence and reporting the harassment.

In the Philippine context, harassment by illegal lending apps without existing debt is not merely a private inconvenience. It is a legal wrong that may justify regulatory action, privacy complaints, criminal investigation, civil damages, and platform enforcement.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.