Harassment Messages and Threats: How to Document Evidence and File a Complaint

A Philippine Legal Article

Harassment messages and threats are not “just online drama,” “away,” or ordinary rude behavior. In the Philippines, repeated abusive communications, intimidation, coercive threats, stalking-like conduct, non-consensual sharing of private material, and technology-facilitated attacks may trigger criminal, civil, administrative, workplace, school, or barangay-level remedies depending on the facts. The legal problem is often not the absence of a remedy, but the failure to preserve evidence properly and choose the correct complaint path.

This article explains, in Philippine context, how to identify legally significant harassment, how to document digital and physical evidence, where to file complaints, what laws may apply, what relief may be available, and the practical mistakes that commonly weaken a case.


I. What Counts as Harassment or Threats Under Philippine Law

Philippine law does not use a single universal offense called “harassment” that covers every situation. Instead, harmful conduct is addressed through a network of laws depending on what was said, how it was done, the relationship of the parties, and the harm caused.

A harassment situation may involve one or more of the following:

  • repeated abusive or insulting messages
  • threats to kill, injure, disgrace, expose, extort, or ruin someone
  • stalking or persistent unwanted contact
  • public shaming, humiliation, or malicious posting
  • cyberbullying
  • sexual harassment, including requests, comments, images, or coercive sexualized messages
  • doxxing or disclosure of private information
  • fake accounts used to harass or impersonate
  • non-consensual sharing of intimate images or videos
  • blackmail or sextortion
  • workplace harassment
  • school-based harassment
  • gender-based online sexual harassment
  • domestic or relationship-based harassment
  • harassment tied to identity, including gender or sexual orientation
  • coercion to silence, comply, pay money, resume a relationship, or withdraw a complaint

Not every offensive message is automatically criminal. The law generally becomes more interested when the conduct includes threat, coercion, fear, sexual exploitation, repeated unwanted contact, invasion of privacy, extortion, defamation, child protection concerns, discrimination, or abuse by someone in a position of authority.


II. The Main Philippine Laws That May Apply

A single incident can fall under several laws at once.

1. Revised Penal Code

The Revised Penal Code may apply where the acts constitute:

  • Grave threats or light threats
  • Grave coercion
  • Unjust vexation
  • Slander or libel, depending on the medium and facts
  • Intriguing against honor
  • Alarm and scandal
  • other related offenses depending on conduct

Threats are especially important. A statement need not always be carried out for it to be punishable. What matters is whether the communication conveys a real threat of harm, injury, or unlawful act, especially when used to frighten, control, or compel.

2. Cybercrime Prevention Act of 2012

Republic Act No. 10175 When the conduct is committed through computers, phones, messaging apps, email, websites, or social media, cybercrime implications arise. This law is especially relevant for:

  • cyber libel
  • illegal access or hacking connected to harassment
  • data-related offenses
  • other penal offenses committed through information and communications technologies where recognized by law

3. Safe Spaces Act

Republic Act No. 11313 This is one of the most important modern Philippine laws for harassment. It covers gender-based sexual harassment in:

  • streets and public spaces
  • online spaces
  • workplaces
  • educational and training institutions

Online acts covered can include misogynistic, transphobic, homophobic, sexist, or sexualized remarks; unwanted sexual comments; threats; relentless requests for sexual favors; circulation of sexual content without consent; and other conduct that causes fear, humiliation, or emotional distress.

4. Anti-Sexual Harassment Act

Republic Act No. 7877 This remains relevant particularly where sexual harassment is committed by someone with authority, influence, or moral ascendancy in a work, training, or education setting.

5. Violence Against Women and Their Children Act

Republic Act No. 9262 If the harasser is a current or former intimate partner, spouse, dating partner, live-in partner, or someone with whom the woman has or had a sexual or dating relationship, and the acts cause psychological violence, fear, emotional suffering, or coercion, VAWC may apply. Repeated threatening messages, stalking, humiliation, monitoring, and coercive digital abuse can fit within psychological violence in the proper factual setting.

6. Anti-Photo and Video Voyeurism Act

Republic Act No. 9995 This applies to recording, copying, reproducing, sharing, or publishing private sexual images or videos without consent, including threats to distribute them.

7. Data Privacy Act of 2012

Republic Act No. 10173 Where harassment involves unauthorized collection, disclosure, or posting of personal data, doxxing, misuse of sensitive personal information, or privacy breaches, the Data Privacy Act may be relevant, especially against organizations or individuals who mishandle personal information.

8. Anti-Wiretapping Act

Republic Act No. 4200 Illegally recorded private conversations can trigger separate legal issues. A victim preserving evidence should be careful not to commit a different violation while collecting proof.

9. Child Protection Laws

If the victim is a minor, or sexual content involving a minor is involved, far more serious offenses may arise, including child abuse and child sexual exploitation laws. Cases involving minors must be handled with particular urgency and care.

10. Special Workplace, School, and Administrative Rules

Even when criminal liability is uncertain, schools, employers, professional boards, and government agencies may have their own complaint systems, codes of conduct, anti-harassment rules, and disciplinary mechanisms.


III. Common Types of Harassment Messages and the Legal Theories Behind Them

Direct death or injury threats

Examples: “Papatayin kita,” “Sasaktan kita,” “Abangan kita,” or messages implying imminent violence. These can support criminal complaints for threats, and they justify urgent safety steps.

Blackmail and coercive threats

Examples: threats to leak intimate photos, report false accusations, expose private secrets, contact family or employer, or publish personal data unless the victim complies. These can involve threats, coercion, extortion-related theories depending on facts, Safe Spaces issues, voyeurism-related laws, or privacy violations.

Repeated abusive contact

Constant texting, calling, messaging, tagging, and using multiple accounts to continue contact after being told to stop may support claims involving unjust vexation, psychological violence, Safe Spaces violations, workplace or school harassment, or stalking-like behavior depending on context.

Sexualized harassment

Unwanted sexual comments, explicit propositions, obscene images, demands for nude photos, threats after rejection, or persistent sexual contact can fall under the Safe Spaces Act, the Anti-Sexual Harassment Act, VAWC, or child protection laws.

Public shaming and humiliating posts

Defamatory or humiliating posts, fake accusations, and malicious public exposure may raise libel or cyber libel issues, especially when published online to third parties.

Doxxing and privacy invasion

Posting a person’s address, school, workplace, phone number, IDs, family details, schedules, or private chats can trigger privacy concerns, coercion concerns, Safe Spaces concerns, and support restraining or protective action.

Intimate image abuse

Sending, threatening to send, or actually uploading nude or sexual content without consent is legally serious and should be treated as urgent evidence-preservation and safety matter.

Domestic digital abuse

Former partners often use messaging apps, social media, account access, location sharing, or fake accounts to monitor, threaten, shame, or control. In Philippine practice, this may be stronger as a VAWC case than as a generic harassment case, depending on the relationship and harm.


IV. Why Documentation Decides Cases

In harassment cases, the core dispute is usually not whether the victim feels harmed. It is whether the evidence can prove:

  • who sent or posted the message
  • what exactly was said or done
  • when it happened
  • how often it happened
  • whether the victim clearly objected or withdrew consent
  • whether the message caused fear, distress, reputational injury, or coercion
  • whether the message was sent publicly or privately
  • whether the accused can be linked to the account, device, number, or post
  • whether the evidence was altered, incomplete, or gathered unlawfully

Digital cases rise and fall on preservation. Many complaints are weakened because the victim took only a cropped screenshot, deleted the original conversation, failed to capture the account URL, or reported to the platform before creating a proper evidence file.


V. How to Document Harassment Messages Properly

1. Preserve the original content immediately

Do not delete messages, emails, voicemails, posts, direct messages, text threads, or call logs. Even if seeing them is painful, the original thread is often more persuasive than a retold summary.

Keep:

  • full conversation threads
  • profile names and usernames
  • account links or URLs
  • phone numbers and email addresses
  • timestamps and dates
  • the platform used
  • group names, if in a group chat
  • attachments, links, audio, images, and videos
  • call logs and missed calls
  • contact names as saved and the raw number if visible

2. Take complete screenshots, not selective snippets

A good screenshot should capture:

  • the full screen when possible
  • sender identity
  • date and time
  • the message content
  • the surrounding context
  • the platform interface showing where the message came from

Avoid screenshots that are:

  • cropped too tightly
  • edited with circles, arrows, or blur over key details
  • missing timestamps
  • missing the profile identifier
  • only partial excerpts that can be accused of being misleading

Take multiple screenshots if needed:

  • one showing the account profile
  • one showing the conversation
  • one showing the timestamp
  • one showing the URL or post details

3. Export or save the conversation where possible

Some apps allow chat export, data download, or email backup. Use built-in export tools when available. Preserve the raw file in addition to screenshots.

4. Save URLs and account identifiers

For social media and online postings, note:

  • profile URL
  • post URL
  • comment URL
  • video URL
  • username and display name
  • account ID if visible
  • date accessed

A screenshot without a URL is still useful, but a screenshot plus an identifiable link is stronger.

5. Record a chronology

Make a written incident log. This is one of the most underrated pieces of evidence.

For each incident, record:

  • date
  • time
  • platform or location
  • exact act committed
  • names of witnesses, if any
  • your response, if any
  • impact on you
  • whether reported to platform, employer, school, or police
  • copies attached

Do this as soon as possible while memory is fresh.

6. Preserve voicemail, audio, and video

If threats were made through calls, save voicemails or message recordings where lawfully available. Keep the original file format and make a backup copy.

7. Save evidence of impact

Harassment cases are stronger when harm is documented. Keep:

  • medical records
  • psychological consultations
  • therapy records
  • prescriptions
  • absences from work or school
  • security incident reports
  • affidavits of witnesses
  • screenshots showing fear, account lockouts, fake reports, or reputation damage

This is especially important for VAWC, Safe Spaces, civil damages, and administrative complaints.

8. Preserve device-level information

Useful supporting material may include:

  • screenshots showing device date and time
  • phone logs
  • email headers
  • message info screens
  • platform notifications
  • cloud backups
  • storage metadata

Do not tamper with metadata.

9. Make secure backups

Store copies in at least two safe places:

  • a password-protected cloud folder
  • an external storage device
  • a trusted lawyer’s or trusted relative’s secure copy

Do not rely on a single device.

10. Keep the evidence in native form

Where possible, keep original files:

  • original screenshots
  • original images and videos
  • original downloads
  • original email files
  • exported chat files
  • uncropped copies

Converting everything into compressed forwarded images may weaken authenticity.


VI. What Not to Do When Preserving Evidence

Do not alter screenshots

Avoid editing, filtering, annotating, or stitching screenshots in a way that could create authenticity issues. If you want an annotated copy for reference, keep the unedited original separately.

Do not provoke the harasser for “more evidence”

Do not bait the other person into escalating. It can increase danger and complicate the narrative.

Do not unlawfully hack, impersonate, or install spyware

Evidence gathered through illegal access can create separate liability.

Do not publicly post all your evidence first

Publicly posting everything may:

  • expose you to retaliation
  • compromise investigation
  • create privacy issues
  • alert the harasser to delete accounts or fabricate defenses

Do not rely on disappearing content without capture

Stories, disappearing messages, temporary posts, and auto-delete chats must be preserved quickly.

Do not hand over your only copy

Always keep copies of everything submitted to police, prosecutor, school, or employer.


VII. Is a Screenshot Enough?

A screenshot is often a starting point, not always the end point.

It can be enough to initiate:

  • a police blotter
  • a barangay complaint
  • a workplace or school complaint
  • a platform report
  • a request for assistance

But for stronger criminal prosecution, corroboration helps:

  • multiple screenshots
  • account URLs
  • witness statements
  • device possession evidence
  • subscriber or account information, if obtainable through lawful investigation
  • forensic extraction in serious cases
  • admissions by the accused
  • repeated pattern of messages
  • records showing fear or psychological harm

A common defense is that screenshots were fabricated, incomplete, or sent by someone else using the account. That does not automatically defeat a complaint, but it means the complainant should preserve as many authenticating details as possible.


VIII. Affidavits: Turning Evidence Into a Legally Useful Narrative

When filing a complaint, evidence must usually be supported by a clear sworn statement.

A good affidavit should state:

  • who you are
  • who the respondent is
  • how you know the respondent
  • the relationship and background, if relevant
  • specific dates and incidents
  • exact or near-exact threatening or harassing words used
  • the platforms or places used
  • whether you told the respondent to stop
  • how the acts affected you
  • what evidence you are attaching
  • what action you took afterward

Avoid vague statements like “he kept harassing me for months.” Instead, describe the actual incidents and attach the evidence in sequence.


IX. Where to File a Complaint in the Philippines

There is no single universal office for all harassment cases. The proper forum depends on the facts.

1. Philippine National Police

Women and Children Protection Desk

If the victim is a woman or child, or the case involves sexual harassment, domestic abuse, intimate partner threats, psychological violence, or sexual exploitation, the Women and Children Protection Desk is often the most appropriate first stop at the police station.

This is especially important for:

  • VAWC-related harassment
  • sexual threats
  • intimate image abuse
  • child victims
  • ex-partner stalking or coercion

Cybercrime Units

If the conduct happened online, the victim may also approach:

  • local police for initial reporting
  • specialized cybercrime units
  • the PNP Anti-Cybercrime Group, where appropriate

Online threats, fake accounts, cyber libel, data misuse, and technology-based abuse often benefit from cyber-focused intake because digital preservation issues matter early.

What police can do

Police can:

  • record a blotter
  • receive your complaint
  • advise on affidavits and supporting documents
  • refer you to appropriate units
  • conduct initial investigation
  • coordinate for digital leads
  • help in urgent threat situations

A police blotter is not the same as a court judgment, but it is useful as early documentation.


2. National Bureau of Investigation

The NBI, especially cybercrime-focused components, may be approached in serious online harassment cases involving:

  • anonymous threats
  • fake accounts
  • image-based abuse
  • blackmail
  • widespread malicious publication
  • hacking-related harassment
  • complex digital tracing concerns

Where there is a strong cyber element, the NBI may be particularly useful.


3. Prosecutor’s Office

For criminal cases, the complaint-affidavit and supporting evidence are usually brought to the Office of the City or Provincial Prosecutor for preliminary investigation, unless the specific procedure in the locality first routes through law enforcement intake.

The prosecutor evaluates whether there is probable cause to file a criminal case in court.

This stage is critical. Many harassment complaints fail not because the conduct was harmless, but because the complaint-affidavit is weak, scattered, or legally mismatched.


4. Barangay

A barangay complaint may be relevant if:

  • both parties live in the same city or municipality and barangay conciliation is required before certain actions
  • there are neighborhood-based disputes
  • immediate local intervention may calm the situation
  • the acts are not excluded from barangay processes

But barangay conciliation is not always proper or required, especially in more serious criminal matters, urgent threat situations, cases involving violence against women and children, and situations where safety is at risk. Where the matter involves serious threats, sexual abuse, VAWC, or urgent risk, formal law enforcement action is generally more important than local mediation.


5. Courts for Protection Orders

Where the harassment is tied to VAWC, the victim may seek:

  • Barangay Protection Order where applicable
  • Temporary Protection Order
  • Permanent Protection Order

These are especially important where the messages are part of a pattern of intimidation, stalking, surveillance, or coercive control by an intimate partner or former partner.


6. Employer or HR

If the harassment is workplace-related, file an internal complaint with:

  • Human Resources
  • the committee on decorum and investigation, where applicable
  • ethics or compliance office
  • management
  • union channels, if any

Workplace sexual or gender-based harassment may create both internal administrative liability and external criminal or civil exposure. Internal reporting should be prompt and documented.

When reporting to HR, submit:

  • a written complaint
  • evidence package
  • timeline
  • names of witnesses
  • requested interim measures such as no-contact directives, work reassignment, schedule adjustment, or access restrictions

7. School, College, or University

Students may file before:

  • discipline office
  • anti-sexual harassment office
  • guidance office
  • title IX-like or gender office, where existing
  • school administration

Schools have obligations under law and institutional rules to address sexual and gender-based harassment. Educational institutions can impose sanctions even where criminal prosecution is separate.


8. Professional and Government Administrative Bodies

If the harasser is:

  • a public official
  • government employee
  • teacher
  • lawyer
  • doctor
  • licensed professional
  • regulated officer

Separate administrative or disciplinary remedies may exist before the relevant office, commission, department, or professional board.


9. Online Platforms

Platform reporting is not a substitute for legal action, but it matters. Report the account, post, image, or threat using built-in tools and save proof of the report.

This can:

  • stop further spread
  • trigger account suspension
  • create a timestamped record that you objected and sought removal

Take screenshots before and after reporting.


X. A Practical Filing Roadmap

Step 1: Secure immediate safety

If there is an imminent threat of violence, prioritize physical safety, contact authorities, and alert trusted persons.

Step 2: Preserve evidence

Capture screenshots, export chats, save URLs, record dates, back up files.

Step 3: Identify the nature of the case

Ask:

  • Is there a real threat of harm?
  • Is it sexual in nature?
  • Is it online?
  • Is it from a current or former partner?
  • Is the victim a minor?
  • Is it happening at work or school?
  • Is private sexual material involved?
  • Is there blackmail or extortion?

Step 4: Prepare a chronology and evidence index

Organize files by date and label them clearly.

Step 5: Execute a complaint-affidavit

The affidavit should match the facts and legal theory.

Step 6: File with the appropriate forum

Police, NBI, prosecutor, HR, school, barangay, or court as appropriate.

Step 7: Keep proof of filing

Save receiving copies, case numbers, blotter entries, email acknowledgments, referral slips, and screenshots.

Step 8: Continue documenting new incidents

After filing, harassment sometimes escalates. Preserve all post-complaint retaliation.


XI. How to Organize an Evidence File

A clean evidence file often makes a major difference.

Use a folder structure like:

Folder 1: Incident Log

  • chronology
  • summary sheet
  • list of evidence

Folder 2: Screenshots

  • arranged by date
  • original unedited files

Folder 3: URLs and Account Details

  • links
  • usernames
  • account identifiers

Folder 4: Supporting Harm

  • medical notes
  • counseling records
  • leave records
  • witness statements

Folder 5: Reports and Filings

  • police blotter
  • barangay records
  • HR complaint
  • school complaint
  • platform reports

Folder 6: Affidavits

  • your affidavit
  • witness affidavits

Name files systematically, for example: 2026-03-01_FBMessage_Threat_01.png 2026-03-02_IGProfile_URL.txt


XII. Threats Versus Mere Insults

This distinction matters.

A rude insult may not always be a prosecutable threat. But a statement can become legally significant when it:

  • threatens death or bodily harm
  • threatens to release private sexual material
  • threatens reputation ruin to force compliance
  • threatens workplace or school sabotage through false accusations
  • threatens family members
  • threatens ongoing stalking or surveillance
  • is repeated in a way that causes serious fear or distress
  • forms part of domestic abuse or sexual harassment

The law does not require perfect wording. Threats can be explicit or implied. Context matters: prior violence, obsessive contact, access to the victim’s location, possession of intimate material, or use of multiple accounts can all make a message more serious.


XIII. Anonymous or Fake Account Harassment

Many victims face harassment from dummy accounts. Filing is still possible.

Document:

  • username
  • display name
  • profile URL
  • profile photos
  • content history
  • times of contact
  • linked accounts
  • similarities with known persons
  • admissions or circumstantial links

Do not assume anonymity makes a case impossible. Digital tracing may or may not succeed depending on evidence, platform cooperation, device history, and investigative resources, but victims should still preserve everything and report promptly.


XIV. Harassment by Ex-Partners and Dating Partners

This is one of the most common and legally significant categories.

Red flags include:

  • nonstop messaging after breakup
  • threats of self-harm to manipulate
  • threats to leak intimate content
  • insults meant to control or punish
  • fake accusations to employer or family
  • monitoring location or accounts
  • posting private details
  • contacting friends and relatives to pressure the victim

Where the victim is a woman and the respondent is a current or former intimate partner within the coverage of the law, the facts may support a VAWC complaint based on psychological violence. In practice, this can be much more powerful than characterizing the matter as mere annoyance.


XV. Workplace Harassment

Workplace harassment can involve supervisors, peers, clients, contractors, or subordinates. It may occur through:

  • office chat tools
  • email
  • text messages
  • social media
  • after-hours communication linked to work
  • retaliation after rejection or complaint

Document:

  • job positions of the parties
  • work-related context
  • prior complaints
  • policy violations
  • witnesses
  • impact on work performance or attendance
  • retaliation such as reassignment, exclusion, or poor evaluations

A workplace complaint does not bar criminal action if the same facts amount to an offense.


XVI. School-Based Harassment

Students are often told to “settle it privately,” especially when evidence is in chat threads. That is often the wrong approach in serious cases.

School complaints are especially important where the acts involve:

  • sexual messages
  • circulation of private images
  • online humiliation
  • persistent unwanted contact
  • teacher-to-student power imbalance
  • peer harassment affecting education or safety

Keep copies of:

  • school emails
  • class group chats
  • disciplinary notices
  • submissions to administrators
  • attendance or grade impact records

XVII. Gender-Based Online Sexual Harassment

The Safe Spaces Act significantly modernized Philippine protection in online settings. Conduct need not occur in person. Online sexualized harassment can be punishable even without physical contact.

Examples include:

  • sending sexual remarks repeatedly
  • posting sexist or degrading statements
  • threatening sexual violence
  • making unwanted comments about body or sexuality
  • sharing altered intimate images
  • harassing based on sexual orientation or gender identity
  • threatening publication of private sexual material

The victim should preserve both the offending content and the broader pattern, especially repeated messages and evidence of objection.


XVIII. Non-Consensual Intimate Content and Sextortion

This category demands urgency.

If someone threatens to release intimate photos or videos unless the victim sends money, sex, more images, silence, or reconciliation, the victim should:

  • preserve the threats immediately
  • stop sending more content
  • avoid negotiating beyond what is needed for safety
  • report to law enforcement promptly
  • report the content or account to the platform
  • alert trusted persons if physical danger exists

Where intimate content has already been distributed, preserve:

  • the original threat
  • the first upload
  • reposts
  • URLs
  • user comments
  • account names
  • the spread pattern
  • who received it, if known

This is often emotionally devastating. The law can treat it very seriously.


XIX. Civil Remedies and Damages

A victim may also consider civil claims where the acts caused:

  • moral damages
  • mental anguish
  • anxiety
  • besmirched reputation
  • social humiliation
  • wounded feelings
  • actual expenses
  • exemplary damages in proper cases

Even where criminal prosecution is difficult, civil action or civil aspects of a criminal case may remain significant.


XX. Protective and Practical Safety Measures

Legal action is only one part of response. Victims should also consider:

  • changing passwords
  • enabling two-factor authentication
  • reviewing logged-in devices
  • preserving but muting conversations
  • blocking after evidence capture, where safe
  • warning family or employer if impersonation is likely
  • tightening privacy settings
  • reviewing location-sharing permissions
  • documenting physical sightings or stalking incidents
  • arranging safe transport if threats are credible

In some cases, blocking immediately is not ideal until enough identifying evidence is captured. In others, immediate blocking is necessary for safety. That judgment depends on the facts.


XXI. Can the Victim Record Calls or Conversations?

This is legally sensitive. Not every recording method is safe under Philippine law. Secret interception of private communications can raise separate legal problems. Victims should avoid assuming that any recording is automatically lawful. In many cases, preserving existing messages, voicemails, call logs, platform records, and witness accounts is safer than engaging in legally risky surveillance.


XXII. Standard of Proof at Different Stages

The victim does not need to prove guilt beyond reasonable doubt at the initial reporting stage. But the burden grows over time.

Initial reporting stage

Enough detail and evidence to justify intake and investigation.

Prosecutor stage

Enough to establish probable cause.

Trial stage

Proof beyond reasonable doubt for criminal conviction.

This means a case can be worth filing even if it is not yet perfect. Still, organized evidence improves the odds significantly.


XXIII. Common Defense Tactics Used by Harassers

Victims should expect arguments such as:

  • “It was a joke.”
  • “My account was hacked.”
  • “The screenshot is fake.”
  • “The message was taken out of context.”
  • “We were both arguing.”
  • “She/He replied too, so it was mutual.”
  • “I never meant to act on it.”
  • “That was not sexual harassment.”
  • “I only reposted what others sent.”
  • “I was just expressing an opinion.”

These defenses are evaluated against the full evidence, not the accused’s label. Repeated conduct, context, prior warnings to stop, corroboration, and actual fear or humiliation matter greatly.


XXIV. The Importance of Telling the Harasser to Stop

It is often useful, though not always legally required, to communicate clearly once that the contact is unwanted.

Examples:

  • “Do not contact me again.”
  • “Stop sending me messages.”
  • “Do not post or share my photos.”
  • “Any further contact will be reported.”

This helps prove lack of consent and a continued pattern after objection. But in dangerous situations, direct confrontation may not be safe. Safety comes first.


XXV. What to Bring When Filing

Bring:

  • government ID
  • printed affidavit if available
  • screenshots in print and digital copy
  • USB or secure digital file, if accepted
  • incident chronology
  • witness details
  • URLs and account information
  • medical or psychological records if relevant
  • previous reports to platform, HR, school, or barangay
  • proof of relationship if relevant to VAWC
  • proof of authorship or account linkage if available

Printed and digital copies together are ideal.


XXVI. Special Concerns When the Victim Is a Minor

Where minors are involved:

  • protect identity and privacy strictly
  • involve parents or guardians where appropriate
  • report urgently to proper authorities
  • do not circulate the harmful material for “proof”
  • preserve evidence carefully without re-sharing it
  • coordinate with child-protection mechanisms

A minor’s case is never something to downplay as ordinary teenage conflict when sexual content, coercion, or threats are present.


XXVII. Are Apologies or Retractions Enough?

Not necessarily.

An apology may be relevant but does not automatically erase liability. It may help in settlement or mitigation, but it does not automatically extinguish criminal, civil, or administrative consequences.

Victims should preserve the apology too. Sometimes apologies contain admissions that help authenticate the prior conduct.


XXVIII. Settlement, Mediation, and Withdrawal

Some harassment cases end in settlement, desistance, apology, or takedown agreements. But victims should understand:

  • not all cases are purely private matters
  • prosecutors and courts are not always bound by private settlement in the same way across all offenses
  • desistance is not always a guaranteed end to criminal proceedings
  • informal settlement without proper safeguards may expose the victim to further coercion

Any settlement involving intimate content, threats, or repeated abuse should be handled with care and documented.


XXIX. A Model Evidence Checklist

Use this checklist for a complaint file:

  • full name of respondent
  • aliases, usernames, account names
  • phone number or email
  • screenshots of each incident
  • account/profile screenshots
  • URLs to posts or profiles
  • exported chats
  • call logs
  • voicemails
  • original images/videos sent
  • timeline of incidents
  • your written statement
  • witness statements
  • proof you told the respondent to stop, if applicable
  • proof of impact
  • proof of reporting to platform or institution
  • backup copy stored securely

XXX. A Practical Drafting Structure for a Complaint-Affidavit

A complaint-affidavit may be structured as follows:

  1. Personal circumstances of complainant
  2. Identity of respondent
  3. Relationship/background
  4. First incident
  5. Subsequent incidents in chronological order
  6. Exact threats/harassing messages
  7. How the conduct affected you
  8. Evidence attached and marked
  9. Statement seeking appropriate action
  10. Verification and oath

The strongest affidavits are specific, chronological, and exhibit-driven.


XXXI. When a Case Is Urgent

Treat the matter as urgent when there is:

  • a death threat
  • threat of immediate assault
  • mention of weapons
  • stalking near home, school, or workplace
  • threat against children or family
  • release threat involving sexual content
  • impersonation causing real-world danger
  • hacking or lockout of accounts
  • domestic abuse history
  • suicidal or homicidal language tied to coercion
  • escalation after being reported

In urgent situations, evidence preservation should happen alongside immediate safety action, not instead of it.


XXXII. Final Legal Takeaways

In Philippine law, harassment messages and threats are not governed by one label but by overlapping legal frameworks. The key questions are: what exactly happened, through what medium, in what relationship, and with what harm. A victim who preserves complete evidence, prepares a coherent chronology, and files in the proper forum is in a far stronger position than one who relies on memory or fragmented screenshots.

The most important practical rules are these:

Preserve first. Organize second. File in the correct forum. Match the facts to the right law. Keep documenting after the complaint. Prioritize safety over confrontation.

Where the conduct involves real threats, sexual coercion, intimate image abuse, online targeting, or ex-partner control, Philippine law may offer stronger remedies than many victims initially assume. The difference between a dismissed complaint and an actionable case is often the quality of documentation and the legal framing used from the beginning.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.