A Philippine Legal Article
I. Introduction
Online harassment and cyberbullying have become common legal problems in the Philippines. A person may be insulted, threatened, shamed, impersonated, blackmailed, stalked, doxxed, sexually harassed, extorted, or repeatedly attacked through Facebook, Messenger, TikTok, Instagram, X, YouTube, email, text messages, online games, group chats, forums, dating apps, or anonymous accounts.
The internet often gives offenders a false sense of anonymity. But online abuse can leave digital traces: screenshots, URLs, account names, timestamps, IP-related information, device records, phone numbers, email addresses, transaction records, and platform data. These can be used in a complaint if preserved properly.
In the Philippine context, online harassment and cyberbullying may give rise to criminal, civil, administrative, school, employment, child protection, gender-based violence, or data privacy remedies, depending on the facts.
The correct legal approach depends on several questions:
- What exactly was done online?
- Was there a threat, libelous statement, sexual content, blackmail, impersonation, hacking, stalking, repeated harassment, or disclosure of private information?
- Is the victim a minor?
- Is the offender a student, employee, former partner, spouse, stranger, coworker, classmate, teacher, customer, or anonymous account?
- Did the harassment involve sexual images, intimate photos, or threats to post them?
- Did it involve identity theft, fake accounts, or unauthorized access?
- Did it involve a public post or private message?
- Did it cause fear, reputational harm, emotional distress, financial loss, or safety risk?
- Is immediate protection needed?
- Which agency or office should receive the complaint?
There is no single offense called “cyberbullying” that covers every online cruelty in all situations. Instead, Philippine law addresses online harassment through several overlapping laws, including cybercrime, libel, threats, unjust vexation, stalking-type conduct, violence against women and children, safe spaces or gender-based sexual harassment, child protection laws, anti-photo and video voyeurism, data privacy, identity theft, and school or workplace rules.
II. What Is Online Harassment?
Online harassment refers to abusive, threatening, humiliating, intrusive, or harmful conduct committed through digital means. It may happen once or repeatedly, publicly or privately, directly or through third parties.
It may include:
- sending threats through chat or text;
- posting humiliating accusations;
- spreading false statements;
- uploading edited or malicious photos;
- creating fake accounts;
- impersonating the victim;
- repeatedly messaging after being told to stop;
- publishing private information;
- sharing intimate images;
- threatening to leak photos or videos;
- encouraging others to attack the victim;
- cyberstalking;
- sexual comments or advances online;
- harassing a child or student;
- using group chats to shame someone;
- sending obscene materials;
- hacking or taking over accounts;
- blackmail or extortion;
- posting defamatory content;
- tagging employers, relatives, schools, or clients to shame the victim.
The legal classification depends on the exact conduct.
III. What Is Cyberbullying?
“Cyberbullying” is commonly used to describe online bullying, especially among minors, students, or peer groups. It may involve repeated humiliation, exclusion, ridicule, threats, rumor-spreading, impersonation, or social media attacks.
In the Philippines, cyberbullying may be addressed through:
- school anti-bullying policies;
- child protection mechanisms;
- cybercrime laws;
- criminal laws on threats, unjust vexation, coercion, slander, libel, or alarm and scandal;
- civil claims for damages;
- barangay intervention, where appropriate;
- administrative complaints against students, teachers, or employees;
- platform reporting tools;
- parental and school intervention;
- protection orders in certain cases.
If the victim is a child, the case should be treated more urgently and carefully because child protection laws and school duties may apply.
IV. First Principle: Identify the Specific Wrong
A complaint is stronger when it identifies the exact act rather than using only broad labels like “cyberbullying” or “harassment.”
Instead of saying only:
“They cyberbullied me.”
State specifically:
“On March 5, 2026, the respondent posted on Facebook that I stole company funds, tagged my employer, and attached my photo. The post was public and was shared 120 times.”
Or:
“The respondent sent me private messages threatening to upload my intimate photos unless I paid money.”
Or:
“A fake account using my name and photo was created and used to solicit money from my contacts.”
Different facts lead to different legal remedies.
V. Possible Criminal Offenses
Online harassment may fall under several criminal laws.
A. Cyberlibel
Cyberlibel may apply when a person publicly posts or publishes a defamatory statement online that identifies or tends to identify the victim.
The elements generally involve:
- an imputation of a crime, vice, defect, act, omission, condition, status, or circumstance;
- publication online;
- identification of the person defamed;
- malice, which may be presumed in some defamatory publications unless privileged.
Examples:
- “She stole company money,” posted publicly without proof.
- “He is a scammer,” posted with identifying details.
- “This teacher is a sexual predator,” posted online without proper basis.
- Edited photos implying immoral or criminal conduct.
Private insults sent only to the victim may not always be libel because publication to a third person is important. But if sent to group chats, posted publicly, or forwarded to others, publication may be present.
Truth may be a defense in some contexts, but truth alone is not always a complete practical shield if the publication is malicious, excessive, or not made for a justifiable purpose. Context matters.
B. Grave Threats, Light Threats, or Other Threat-Related Offenses
Online threats may be punishable if a person threatens another with harm.
Examples:
- “I will kill you.”
- “I will burn your house.”
- “I will hurt your child.”
- “I know where you live; watch your back.”
- “I will post your nude photos if you do not pay.”
The seriousness depends on the content, context, condition imposed, ability to carry out the threat, and surrounding conduct.
Threats should be treated as urgent if they involve physical harm, weapons, stalking, home address exposure, family members, sexual coercion, or repeated escalation.
C. Unjust Vexation
Unjust vexation may apply to conduct that unjustly annoys, irritates, torments, disturbs, or causes distress to another person without necessarily falling under a more specific offense.
Online examples may include:
- repeated unwanted messages;
- persistent harassment after being told to stop;
- malicious tagging;
- repeated insults;
- nuisance calls or texts;
- coordinated annoyance;
- intentionally disturbing someone’s peace.
Unjust vexation is often considered when the conduct is offensive and harassing but does not fit neatly into libel, threats, coercion, or other specific crimes.
D. Coercion
Coercion may arise when a person uses force, intimidation, or threats to compel someone to do something against their will or prevent them from doing something lawful.
Online examples:
- “Send me money or I will expose you.”
- “Break up with your partner or I will post your private messages.”
- “Resign from your job or I will destroy your reputation.”
- “Meet me or I will leak your photos.”
If money or property is demanded, extortion-related offenses may also be considered.
E. Extortion or Blackmail-Type Conduct
Philippine criminal law does not always use the everyday term “blackmail” as a standalone label, but blackmail-like conduct may fall under threats, coercion, robbery/extortion concepts, grave threats, unjust vexation, cybercrime, or other offenses depending on facts.
Online blackmail often involves:
- threats to release intimate photos;
- threats to expose private secrets;
- threats to damage reputation;
- threats to report false accusations;
- demands for money, sex, silence, or favors.
If intimate images are involved, special laws may apply.
F. Identity Theft
Identity theft may apply when someone uses another person’s identifying information online without authority.
Examples:
- creating a fake account using the victim’s name and photo;
- using another person’s identity to message people;
- pretending to be the victim to solicit money;
- using personal information to register accounts;
- taking over or using someone else’s online identity.
Identity theft may overlap with estafa, cybercrime, data privacy violations, or platform policy violations.
G. Unauthorized Access or Hacking
If the offender accessed the victim’s account, email, phone, cloud storage, or social media without consent, cybercrime offenses involving illegal access, data interference, or related acts may apply.
Examples:
- logging into someone’s Facebook without permission;
- changing passwords;
- reading private messages;
- downloading private photos;
- deleting posts or messages;
- using the account to harass others;
- accessing email to obtain private information.
Preserve login alerts, password reset emails, device notices, IP logs if available, and screenshots of unauthorized activity.
H. Anti-Photo and Video Voyeurism
If the harassment involves intimate photos or videos, a special law may apply.
This may involve:
- taking intimate images without consent;
- copying intimate images;
- sharing intimate images;
- threatening to share intimate images;
- uploading or distributing sexual photos or videos;
- using hidden camera recordings;
- spreading private sexual content after a breakup.
Consent to be photographed is not necessarily consent to distribution. A person who receives intimate content does not automatically have the right to share it.
I. Online Sexual Harassment and Gender-Based Online Harassment
Online sexual harassment may include:
- unwanted sexual remarks;
- sending obscene or sexual images;
- repeated sexual messages;
- demanding sexual favors;
- rape jokes or sexually degrading posts;
- threats to expose sexual information;
- misogynistic, homophobic, transphobic, or gender-based attacks;
- stalking or sexualized cyberbullying.
Depending on the context, remedies may exist under gender-based sexual harassment laws, workplace rules, school rules, cybercrime law, or criminal law.
J. Violence Against Women and Children
If the offender is a current or former spouse, partner, boyfriend, girlfriend, live-in partner, or person with whom the woman has or had a sexual or dating relationship, online harassment may fall under violence against women and children laws, especially if it causes mental, emotional, psychological, sexual, or economic abuse.
Examples:
- ex-partner repeatedly threatens the woman online;
- former boyfriend threatens to leak intimate photos;
- partner controls social media accounts;
- partner posts humiliating accusations;
- partner sends threats to the woman’s family;
- partner uses online harassment to force reconciliation;
- partner stalks or monitors the woman digitally.
A victim may seek criminal remedies and protection orders where applicable.
K. Child Abuse, Exploitation, or Online Sexual Abuse
If the victim is a minor, the case may involve child protection laws.
Serious situations include:
- sexual messages to a child;
- grooming;
- asking a child for nude photos;
- threatening a child online;
- spreading a child’s intimate image;
- online sexual exploitation;
- cyberbullying causing severe distress;
- encouraging self-harm;
- impersonating a child;
- adult harassment of a minor.
Cases involving children should be reported promptly to parents, guardians, school authorities, child protection offices, law enforcement, or appropriate agencies.
L. Slander, Oral Defamation, or Traditional Defamation Issues
If harassment includes spoken statements livestreamed or recorded online, the issue may involve oral defamation or related offenses, depending on publication and medium.
M. Alarms and Scandals or Public Disturbance
Some online conduct connected to public disturbance, panic, or scandal may be treated under public order provisions, but this depends heavily on facts.
N. Other Possible Offenses
Depending on the case, online harassment may also involve:
- estafa;
- malicious mischief;
- falsification;
- illegal access;
- illegal interception;
- data interference;
- computer-related fraud;
- computer-related forgery;
- grave coercion;
- stalking-type acts under related legal theories;
- obstruction or harassment of witnesses;
- contempt, if related to court proceedings;
- election-related offenses during campaign periods.
VI. Civil Liability
Even when a criminal complaint is not filed or does not prosper, a victim may have civil remedies.
Civil claims may involve:
- damages for injury to reputation;
- moral damages for mental anguish, anxiety, humiliation, or social humiliation;
- actual damages for therapy, lost income, business loss, relocation, security, or medical costs;
- exemplary damages in aggravated cases;
- injunction or takedown-related relief in proper cases;
- attorney’s fees where justified.
Civil liability may arise from abuse of rights, defamation, invasion of privacy, negligence, breach of duty, or other wrongful acts.
Civil action may be more appropriate when the main goal is compensation, takedown, apology, correction, or injunction rather than imprisonment.
VII. Administrative, School, and Workplace Remedies
Online harassment may occur in schools or workplaces. In that case, administrative remedies may be available in addition to criminal or civil complaints.
A. School Cyberbullying
If students are involved, the school may have duties under anti-bullying and child protection policies.
The victim or parent may file a complaint with:
- class adviser;
- guidance counselor;
- school principal;
- child protection committee;
- school discipline office;
- Department of Education office, for basic education issues;
- Commission on Higher Education or school administration, for higher education issues;
- law enforcement, if a crime is involved.
Schools should not dismiss cyberbullying merely because it happened online if it affects students, school safety, or the learning environment.
B. Workplace Online Harassment
If harassment occurs among employees or is connected to employment, the victim may report to:
- HR;
- immediate supervisor;
- company grievance committee;
- committee on decorum and investigation, for sexual harassment matters;
- labor authorities, depending on the issue;
- professional board, if respondent is licensed professional;
- law enforcement, if criminal.
Examples:
- coworker posts defamatory statements about another employee;
- supervisor sends sexual messages;
- employee creates fake account to harass colleague;
- group chat shaming;
- online threats related to workplace conflict;
- employer retaliates through online humiliation.
Employers may have a duty to investigate and prevent hostile or unsafe work environments.
VIII. Data Privacy Issues
Online harassment often involves personal data.
Data privacy concerns may arise when someone:
- posts the victim’s address;
- publishes phone number, workplace, school, or family details;
- shares IDs or documents;
- leaks medical, financial, or employment records;
- posts private messages;
- uses personal photos without consent;
- creates fake profiles using personal information;
- collects and spreads sensitive information.
The National Privacy Commission may be relevant if the issue involves unlawful processing, disclosure, or misuse of personal data, especially by companies, organizations, schools, employers, or persons acting as personal information controllers or processors.
Not every online insult is a data privacy case, but doxxing, unauthorized disclosure of sensitive personal information, and misuse of identity may raise privacy remedies.
IX. Where to File a Complaint
The correct office depends on the facts.
A. Philippine National Police Anti-Cybercrime Group
The PNP Anti-Cybercrime Group handles cybercrime and online-related criminal complaints. It is often appropriate for hacking, online threats, cyberlibel, identity theft, online scams, online sexual exploitation, and similar digital offenses.
B. National Bureau of Investigation Cybercrime Division
The NBI Cybercrime Division may also receive cybercrime complaints, especially for cases requiring digital investigation, tracing, preservation, or coordination with platforms.
C. Local Police Station
For immediate threats, violence, stalking, extortion, or harassment, the nearest police station may receive a complaint or refer it to the proper cybercrime unit.
If the victim is a woman or child, the Women and Children Protection Desk may be involved.
D. City or Provincial Prosecutor
A criminal complaint may be filed with the prosecutor’s office, supported by affidavits and evidence. The prosecutor determines whether there is probable cause to file an Information in court.
In many cases, police or NBI assists first in gathering evidence, but direct filing with the prosecutor may also be possible with sufficient documentation.
E. Barangay
Barangay intervention may be useful for minor harassment involving neighbors or local disputes. However, serious cybercrime, threats, sexual harassment, child abuse, VAWC, or cases requiring urgent protection should not be treated as mere barangay issues.
Barangay conciliation may be required for certain offenses between residents of the same city or municipality, subject to important exceptions. When violence, serious threats, minors, protection orders, or offenses above barangay authority are involved, direct law enforcement or prosecutor action may be proper.
F. School or Employer
If the respondent is a student, teacher, employee, manager, or coworker, administrative complaints may be filed with the school or employer.
G. National Privacy Commission
For unlawful disclosure or misuse of personal data, a privacy complaint may be considered.
H. Platform Reporting
The victim should also report the content to the platform, such as Facebook, TikTok, Instagram, X, YouTube, Google, Telegram, Discord, Reddit, or the app involved. Platform takedown does not replace legal action, but it may stop ongoing harm.
X. Immediate Safety Steps
If online harassment includes threats, stalking, extortion, sexual coercion, or release of private data, take safety steps immediately.
- Do not meet the harasser alone.
- Tell a trusted person.
- Preserve evidence before blocking.
- Strengthen account security.
- Change passwords.
- Turn on two-factor authentication.
- Log out of unknown devices.
- Check account recovery email and phone number.
- Save threatening messages.
- Avoid responding emotionally.
- Report urgent threats to police.
- If physical danger exists, go to a safe place.
If intimate images are involved, act quickly to preserve evidence and request takedown.
XI. Evidence: The Most Important Part of the Complaint
Online harassment complaints often fail or weaken because evidence was not preserved properly. A victim should collect and preserve evidence before content is deleted.
A. Screenshots
Take screenshots showing:
- full post or message;
- account name;
- profile URL if visible;
- date and time;
- comments and shares;
- reactions;
- group or page name;
- visible identifiers;
- message thread context;
- threats or demands;
- images or attachments.
Screenshots should not be cropped too aggressively. Include enough context.
B. URLs and Links
Copy and save:
- post URL;
- profile URL;
- page URL;
- group URL;
- video URL;
- image URL;
- comment link;
- message link, if available.
A screenshot without a link may still help, but links make verification easier.
C. Screen Recording
For disappearing stories, videos, live streams, or scrolling threads, a screen recording may help show context.
D. Download or Export Data
Where possible, download:
- chat history;
- email headers;
- platform data;
- account login alerts;
- transaction records;
- files sent by offender.
E. Preserve Original Files
Do not alter images, videos, audio, or documents. Keep original files with metadata where possible.
F. Witnesses
Ask witnesses to preserve screenshots too. A witness may later execute an affidavit stating what they saw and when.
G. Notarized Affidavit
The complainant’s affidavit should narrate the facts clearly and attach evidence.
H. Cybercrime Evidence Preservation
For serious cases, report promptly so law enforcement may request preservation of records from platforms before data disappears.
XII. How to Take Strong Screenshots
A strong screenshot should show:
- the offensive content;
- the name or username of the poster;
- profile photo, if relevant;
- date and time;
- platform;
- URL;
- number of reactions, comments, or shares, if relevant;
- surrounding comments;
- identifying information;
- your device date and time, if useful.
For private messages, capture:
- sender name;
- profile details;
- full conversation context;
- date and time of messages;
- threats or demands;
- attachments;
- phone number or email, if applicable.
After taking screenshots, back them up in:
- cloud storage;
- email to yourself;
- external drive;
- printed copies;
- lawyer’s file.
XIII. Avoid Destroying Evidence
Do not immediately delete messages, posts, accounts, or comments before preserving evidence.
Do not:
- edit screenshots;
- add marks that cover important details;
- delete the thread;
- block before capturing profile links, unless safety requires immediate blocking;
- respond with threats;
- hack back;
- impersonate the harasser;
- post the harasser’s personal data publicly;
- spread the intimate image further as “proof.”
Preserve evidence lawfully.
XIV. If the Harasser Is Anonymous
Many online harassers use fake accounts. A complaint may still be filed.
Evidence that may help identify them:
- username;
- profile URL;
- phone number linked to account;
- email address;
- writing style;
- mutual friends;
- profile photos;
- payment details;
- IP-related platform logs;
- login alerts;
- threats mentioning personal details only certain people know;
- prior messages;
- screenshots from witnesses;
- reused usernames;
- links to other accounts;
- account creation clues;
- timing of posts;
- admissions.
Law enforcement may request data from platforms, subject to legal process and platform policies. Identification may take time and is not always guaranteed, but fake accounts do not make a complaint impossible.
XV. If the Harasser Is Abroad
If the offender is outside the Philippines, the case becomes more complicated but may still be pursued if there is a Philippine connection, such as:
- victim is in the Philippines;
- harmful content is accessed in the Philippines;
- offender is Filipino;
- platform conduct affects Philippine resident;
- crime is punishable under Philippine law;
- evidence or witnesses are in the Philippines.
Practical challenges include jurisdiction, identification, service of legal processes, foreign platform data, extradition, and enforcement.
A complaint may still be filed with Philippine cybercrime authorities, especially for serious threats, extortion, sexual exploitation, identity theft, or cyberlibel affecting a Philippine victim.
XVI. If the Victim Is a Minor
Cyberbullying of minors must be handled with special care.
Parents or guardians should:
- preserve evidence;
- report to the school if classmates are involved;
- report serious threats or sexual content to law enforcement;
- avoid public shaming of other minors;
- seek guidance counseling or psychological support;
- request protective measures from the school;
- document the child’s emotional and academic impact;
- protect the child from retaliation.
If the offender is also a minor, the case may involve juvenile justice principles. The goal may include protection, accountability, counseling, diversion, school discipline, or child welfare intervention, depending on severity.
If an adult is harassing a minor online, especially sexually, treat it as urgent.
XVII. If the Harassment Involves Intimate Images
This is one of the most serious online harassment situations.
Examples:
- ex-partner threatens to post nude photos;
- intimate video is uploaded;
- private sexual images are sent to relatives;
- offender demands money or sex to prevent posting;
- hidden camera images are shared;
- altered sexual images are circulated;
- AI-generated sexualized images are used to humiliate the victim.
Immediate steps:
- Save evidence of the threat or upload.
- Do not pay without legal advice; payment may not stop the offender.
- Report to the platform for urgent takedown.
- Report to NBI or PNP cybercrime unit.
- If victim is a woman or child, seek appropriate protection assistance.
- Preserve the URL and screenshots before takedown.
- Tell trusted family or counsel if safety is at risk.
- Consider protection order remedies if the offender is a partner or ex-partner.
Do not repost the intimate image publicly to prove the offense.
XVIII. If the Harassment Is From an Ex-Partner
Online harassment by an ex-partner may involve:
- threats;
- stalking;
- monitoring;
- fake accounts;
- posting private conversations;
- sexual blackmail;
- humiliation;
- repeated unwanted messages;
- contacting employer or family;
- threatening self-harm to manipulate;
- threatening to expose intimate images;
- controlling accounts.
If the victim is a woman and the respondent is a current or former sexual or dating partner, VAWC remedies may apply. Protection orders may be available depending on facts.
Preserve evidence showing the relationship and the abusive conduct.
XIX. If the Harassment Is in a Group Chat
Group chat harassment can be legally significant because there is publication to multiple persons.
Evidence should show:
- group name;
- members, if visible;
- offending messages;
- sender identity;
- date and time;
- reactions or replies;
- whether the victim was tagged or identified;
- whether screenshots spread outside the group.
If defamatory statements were made in a group chat, cyberlibel may be considered depending on identification, defamatory content, and publication.
If sexual harassment occurred in a work or school group chat, administrative remedies may also apply.
XX. If the Harassment Is Through Comments
Comment harassment may include insults, threats, doxxing, sexual comments, or defamatory accusations.
Preserve:
- original post;
- comment;
- commenter profile;
- URL;
- date and time;
- replies;
- public visibility;
- shares.
If there are many comments from different people, identify the worst and most legally relevant statements.
XXI. If the Harassment Is Through Fake Reviews or Business Attacks
Businesses and professionals may be harassed through fake reviews, defamatory posts, accusations of scams, or coordinated online attacks.
Possible remedies include:
- platform reporting;
- cyberlibel complaint;
- civil damages;
- demand letter;
- unfair competition or business-related claims, if applicable;
- administrative complaint if competitor is regulated;
- documentation of business losses.
Businesses should distinguish legitimate negative reviews from false and malicious statements. A customer may complain honestly, but false factual accusations made maliciously may be actionable.
XXII. If the Harassment Is Political or Public Commentary
Public officials, candidates, influencers, and public figures may face harsh criticism. Philippine law recognizes that public issues invite wider comment, but false and malicious factual accusations may still have legal consequences.
The line between criticism and cyberlibel depends on:
- whether the statement is fact or opinion;
- whether it imputes a crime or defect;
- whether it is false;
- whether it identifies the victim;
- whether it was made with malice;
- whether it concerns public interest;
- whether it is fair comment or abusive attack.
Not every offensive political post is a criminal case. But threats, doxxing, sexual harassment, and false factual accusations may still be actionable.
XXIII. Demand Letter: Should You Send One?
A demand letter may help in some cases, especially cyberlibel, takedown, apology, correction, or civil settlement.
A demand letter may ask the offender to:
- delete the post;
- stop contacting the victim;
- issue public apology;
- preserve evidence;
- cease threats;
- pay damages;
- stop using the victim’s name or photos.
However, do not send a demand letter if:
- there is immediate danger;
- the offender may delete evidence before you preserve it;
- the offender may escalate;
- the case involves child sexual exploitation;
- the case involves serious extortion;
- law enforcement needs to act first;
- counsel advises against it.
Preserve evidence before sending any warning.
XXIV. Sample Demand Letter for Online Harassment
[Date]
To: [Name / Username, if known] Address / Account: [Details, if known]
Subject: Demand to Cease Online Harassment and Remove Defamatory/Abusive Content
Dear [Name]:
This refers to your online posts/messages/comments concerning me, particularly the following:
- [Date] — [Platform] — [Description of post/message]
- [Date] — [Platform] — [Description]
These acts are false, malicious, harassing, threatening, defamatory, and/or violative of my rights. They have caused distress, reputational harm, and continuing injury.
I demand that you immediately:
- cease and desist from further harassment;
- remove the offending posts, comments, messages, images, or videos;
- stop contacting me except through lawful channels;
- refrain from posting or sharing any further statements, images, or personal information about me;
- preserve all related records, accounts, messages, and files.
This letter is sent without waiver of my right to file criminal, civil, administrative, data privacy, or other complaints before the proper authorities.
Sincerely, [Name]
XXV. Filing a Complaint: General Step-by-Step Guide
Step 1: Secure Safety
If there is a physical threat, stalking, extortion, sexual coercion, or exposure of private information, prioritize safety. Contact police or trusted persons immediately.
Step 2: Preserve Evidence
Take screenshots, copy links, save messages, download files, record timelines, and preserve original data.
Step 3: Identify the Offender
Gather all known details:
- name;
- username;
- profile URL;
- phone number;
- email address;
- address, if known;
- school or workplace;
- relationship to victim;
- previous accounts;
- mutual contacts.
If unknown, record all clues.
Step 4: Prepare a Chronology
Make a timeline of events. Include dates, platforms, posts, messages, witnesses, and impact.
Step 5: Prepare an Affidavit
The complaint-affidavit should state facts in chronological order and attach evidence.
Step 6: File With the Appropriate Office
Depending on the case, file with NBI Cybercrime, PNP Anti-Cybercrime Group, local police, prosecutor, school, employer, or privacy authority.
Step 7: Cooperate With Investigation
Attend hearings, submit additional evidence, identify witnesses, and respond to requests.
Step 8: Monitor the Complaint
Get docket numbers, reference numbers, and copies of filings.
Step 9: Seek Protection or Takedown
If content remains online, request platform takedown and consider legal remedies for protection.
Step 10: Consider Civil or Administrative Remedies
Criminal complaint is not the only remedy. School, employment, civil, and privacy actions may be useful.
XXVI. Complaint-Affidavit: What It Should Contain
A complaint-affidavit should include:
- full name of complainant;
- address and contact details;
- identity of respondent, if known;
- relationship between parties;
- platform used;
- account names and URLs;
- exact acts complained of;
- dates and times;
- screenshots and links;
- explanation of why the content refers to the complainant;
- harm suffered;
- witnesses;
- prior demands or warnings, if any;
- request for investigation and prosecution;
- sworn statement of truth.
Avoid exaggeration. State facts clearly.
XXVII. Sample Complaint-Affidavit
Republic of the Philippines [City/Municipality]
COMPLAINT-AFFIDAVIT
I, [Name], of legal age, Filipino, with address at [address], after being sworn in accordance with law, state:
I am the complainant in this case.
The respondent is [name, if known], using the online account [username/profile link] on [platform]. If the respondent’s true identity is unknown, the account details are attached as evidence.
On [date], respondent posted/sent/published the following statement/message/content: [quote or describe briefly].
The content was posted/sent through [platform] and was visible to [public/group chat/specific persons]. A screenshot and URL are attached as Annex “A.”
On [date], respondent again [describe next act], attached as Annex “B.”
The posts/messages refer to me because [explain identification: name, photo, tag, workplace, details, context].
The acts of respondent caused me fear, humiliation, anxiety, reputational harm, and disturbance of my peace. [Add specific effects, if any: missed work, threats, family distress, school impact, etc.]
I preserved screenshots, links, and related records. The relevant evidence is attached as annexes.
I am filing this complaint to request investigation and the filing of appropriate charges for violations of applicable Philippine laws, including cybercrime, threats, harassment, defamation, identity theft, privacy, or other offenses as may be determined by the authorities.
IN WITNESS WHEREOF, I have signed this affidavit on [date] at [place].
[Signature] [Name]
SUBSCRIBED AND SWORN to before me this [date], affiant exhibiting competent proof of identity: [ID details].
Notary Public
XXVIII. Evidence Annex Checklist
Attach copies of:
- screenshots;
- URLs;
- profile pages;
- chat logs;
- email headers;
- phone numbers;
- call logs;
- photos or videos;
- witness screenshots;
- platform reports;
- demand letter, if any;
- proof of identity;
- medical or psychological records, if relevant;
- school or employment reports, if relevant;
- police blotter, if any;
- prior complaints;
- account recovery alerts;
- proof of damage.
Label annexes clearly.
Example:
- Annex A — Screenshot of Facebook post dated March 1, 2026
- Annex B — URL printout of respondent’s profile
- Annex C — Messenger threat dated March 2, 2026
- Annex D — Witness screenshot from group chat
- Annex E — Medical certificate
XXIX. Filing With PNP or NBI Cybercrime
When filing, bring:
- valid government ID;
- printed complaint-affidavit;
- digital and printed evidence;
- screenshots with links;
- device used, if needed;
- USB drive or storage containing files;
- contact details of witnesses;
- timeline of events;
- copy of demand letter, if any.
The investigator may ask for additional details or may guide the complainant in preparing documents.
For hacking, bring the affected device if requested, but avoid tampering with it.
XXX. Filing With the Prosecutor
A complaint filed with the prosecutor typically needs:
- complaint-affidavit;
- affidavits of witnesses;
- documentary evidence;
- screenshots and URLs;
- proof of identity of respondent, if known;
- certification or investigation report, if available;
- evidence of publication or harm;
- copies of supporting documents.
The prosecutor may issue a subpoena to the respondent, who may file a counter-affidavit. The prosecutor then determines probable cause.
XXXI. Filing With a School
For cyberbullying involving students, the complaint should include:
- names and sections/grade levels;
- screenshots;
- group chat names;
- dates;
- witnesses;
- effect on student;
- prior reports;
- requested protective measures.
Parents may request:
- immediate takedown;
- no-contact measures;
- guidance intervention;
- discipline under school rules;
- anti-retaliation measures;
- monitoring of class group chats;
- counseling;
- written action plan.
If the school fails to act, escalation to education authorities may be considered.
XXXII. Filing With an Employer
For workplace online harassment, submit:
- written complaint;
- screenshots;
- offender’s employment details;
- platform or group chat used;
- connection to work;
- witnesses;
- impact on work;
- requested interim protection.
Ask HR to preserve digital evidence in company systems, if applicable.
For sexual harassment, request referral to the proper internal committee or procedure.
XXXIII. Filing a Data Privacy Complaint
A privacy complaint may be appropriate if the issue involves misuse or unauthorized disclosure of personal data.
Prepare:
- personal data disclosed;
- who disclosed it;
- where it was posted;
- why disclosure was unauthorized;
- screenshots;
- links;
- harm caused;
- prior request for takedown, if any;
- identity of organization or individual responsible.
Data privacy remedies may be especially relevant where a company, school, employer, clinic, bank, or organization leaked information.
XXXIV. Platform Takedown Requests
Report abusive content directly to the platform. Use categories such as:
- harassment;
- bullying;
- hate;
- threats;
- impersonation;
- nudity or sexual content;
- non-consensual intimate image;
- private information;
- fake account;
- scam;
- child exploitation;
- violence.
Before requesting takedown, preserve evidence. Once content is removed, it may become harder to prove unless already captured.
XXXV. Protection Orders
Protection orders may be relevant if the harassment involves domestic or dating violence, abuse against women or children, stalking, threats, or repeated contact by a current or former partner.
A protection order may prohibit:
- contacting the victim;
- harassing online;
- approaching the victim;
- communicating through third parties;
- posting harmful content;
- threatening or intimidating the victim.
The exact remedy depends on the applicable law and relationship between parties.
XXXVI. If the Harassment Causes Mental Health Harm
Online harassment can cause anxiety, depression, panic attacks, sleep disturbance, humiliation, trauma, and fear.
The victim may seek:
- counseling;
- medical certificate;
- psychological evaluation;
- therapy records;
- school or workplace support;
- safety planning.
Medical or psychological records may support claims for damages or show seriousness of harm. However, the victim should balance evidence gathering with privacy.
XXXVII. Cyberlibel: Special Considerations
Cyberlibel complaints are common, but they require careful analysis.
A. Public or Third-Party Publication
The defamatory content must be communicated to someone other than the complainant. Public posts, group chats, comments, emails to third parties, and shared content may satisfy publication.
B. Identification
The victim need not always be named if identifiable through photo, tag, initials, position, context, or details.
C. Defamatory Imputation
The statement must tend to dishonor, discredit, or damage the reputation of the person.
D. Malice
Malice may be presumed in defamatory statements, but privileged communication and good motives may be raised as defenses.
E. Opinion vs. Fact
Insults and opinions may be treated differently from false factual accusations. “I dislike him” is different from “He stole money.”
F. Evidence
Screenshots must show the post, account, URL, date, and audience if possible.
XXXVIII. Threats: Special Considerations
For threats, preserve exact words. The seriousness may depend on whether the threat is:
- specific;
- immediate;
- repeated;
- directed at victim or family;
- connected to known location;
- accompanied by weapons or stalking;
- conditional on payment or action;
- made by someone capable of carrying it out;
- connected to prior violence.
Report threats quickly, especially if physical safety is at risk.
XXXIX. Doxxing
Doxxing means publishing private personal information to expose, shame, intimidate, or endanger someone.
Examples:
- home address;
- phone number;
- workplace;
- school;
- family names;
- government IDs;
- medical information;
- bank details;
- private photos;
- location data.
Doxxing may involve data privacy violations, harassment, threats, or other crimes depending on content and intent.
Immediate action:
- capture evidence;
- request takedown;
- warn family or workplace if safety is at risk;
- report threats;
- strengthen account privacy;
- consider privacy complaint.
XL. Impersonation and Fake Accounts
If someone creates a fake account pretending to be you:
- screenshot the fake profile;
- copy the profile URL;
- capture posts and messages;
- report impersonation to the platform;
- warn contacts if fraud is involved;
- file complaint if used for harassment, scams, sexual content, or reputational harm.
If the fake account solicits money, victims of the scam should also preserve payment records.
XLI. Online Stalking
Online stalking may include:
- monitoring posts;
- repeated unwanted messages;
- tracking location;
- contacting friends and family;
- creating new accounts after being blocked;
- sending gifts or threats;
- appearing at places after online monitoring;
- using spyware or account access;
- threatening self-harm to force response.
While stalking may not always be labeled as a single offense, conduct may fall under threats, unjust vexation, coercion, VAWC, data privacy, cybercrime, or protection order remedies.
XLII. Harassment Through Multiple Accounts
A harasser may use many accounts. Preserve evidence linking them, such as:
- same writing style;
- same threats;
- same photos;
- same phone number;
- same timing;
- same personal details;
- admissions;
- cross-posting;
- common friends;
- identical usernames.
Explain in the affidavit why you believe the accounts are connected.
XLIII. Harassment by Minors
If the offender is a minor, the response may involve school discipline, parental intervention, child welfare mechanisms, or juvenile justice procedures.
Do not retaliate by publicly shaming a minor. Report properly to the school, parents, or authorities.
If the minor committed serious acts, especially sexual image sharing, threats, or extortion, law enforcement may still be involved, but the treatment of child offenders follows special rules.
XLIV. Harassment by Teachers, Professors, or School Staff
If a teacher or school staff member harasses a student online, possible remedies include:
- school administrative complaint;
- child protection complaint;
- professional or licensing complaint;
- criminal complaint;
- sexual harassment complaint;
- civil damages.
Schools must take complaints seriously, especially when there is a power imbalance.
XLV. Harassment by Police, Public Officials, or Government Employees
If the offender is a public official or employee, remedies may include:
- criminal complaint;
- administrative complaint with the agency;
- complaint before the Ombudsman, depending on position and act;
- civil claim;
- cybercrime complaint;
- data privacy complaint.
Online harassment by a public officer may also involve abuse of authority, misconduct, or conduct prejudicial to the service.
XLVI. Harassment by Debt Collectors
Some debt collectors use online harassment, public shaming, threats, or messages to contacts.
Possible issues include:
- unfair collection practices;
- data privacy violations;
- threats;
- unjust vexation;
- cyberlibel;
- harassment;
- unauthorized disclosure of debt.
Preserve messages, call logs, screenshots, and proof that collectors contacted third parties.
XLVII. Harassment Connected to Online Lending Apps
Online lending harassment may include:
- contacting phone contacts;
- public shaming;
- threats of arrest;
- fake legal notices;
- abusive messages;
- posting edited photos;
- disclosing debt to others;
- excessive collection calls.
Possible remedies include complaints to financial regulators, privacy authorities, police, and cybercrime units depending on the conduct.
XLVIII. Harassment in Online Games
Online game harassment may involve threats, sexual harassment, doxxing, stalking, or repeated abuse through voice chat and messages.
Preserve:
- usernames;
- game ID;
- server;
- chat logs;
- recordings;
- screenshots;
- platform profile;
- transaction or account details.
Report to the game platform and, if serious threats or sexual abuse exist, to law enforcement.
XLIX. Harassment in Dating Apps
Dating app harassment may involve:
- threats after rejection;
- sexual coercion;
- identity theft;
- catfishing;
- extortion;
- intimate image threats;
- stalking;
- fake profiles.
Preserve the profile, chat, photos, phone numbers, and any linked social media.
If meeting was planned or physical danger exists, report immediately.
L. Harassment Through Email
Email harassment may include threats, defamatory messages sent to employers, extortion, impersonation, or spam harassment.
Preserve:
- full email;
- sender address;
- email headers;
- attachments;
- timestamps;
- recipients;
- replies.
Email headers may help investigators trace technical information.
LI. Harassment Through SMS or Calls
For text or call harassment:
- screenshot messages;
- save sender number;
- export messages, if possible;
- record call logs;
- avoid deleting voicemails;
- note date, time, and content of calls;
- request telco assistance through authorities if needed.
Threats by SMS may support a criminal complaint even if not on social media.
LII. Responding to the Harasser
In many cases, the best response is short and firm:
“Stop contacting me. I do not consent to further communication. I am preserving these messages.”
After that, avoid prolonged argument. More replies may encourage escalation or create statements that can be used against you.
Do not threaten violence, insult back, or post revenge content.
LIII. Blocking the Harasser
Blocking may protect the victim, but preserve evidence first if safe. If the harasser continues through new accounts, each attempt should be documented.
If a protection order or complaint is needed, the history of repeated attempts matters.
LIV. Publicly Posting About the Harasser
Victims often want to “expose” the harasser. This can be risky.
Publicly accusing someone of a crime may expose the victim to counterclaims if the post is excessive, inaccurate, or malicious. Instead, consider:
- filing a formal complaint;
- reporting to platform;
- sending demand through counsel;
- warning close contacts privately if safety requires;
- making carefully worded public safety statements without unnecessary accusations.
Do not post intimate images, private data, addresses, or threats.
LV. If You Are Accused of Online Harassment
A respondent should take the complaint seriously.
Do not:
- delete evidence without legal advice;
- threaten the complainant;
- contact the complainant if told to stop;
- create new accounts;
- retaliate online;
- ignore subpoenas;
- submit false affidavits.
Do:
- preserve your own evidence;
- consult counsel;
- prepare a counter-affidavit if subpoenaed;
- identify context, truth, privilege, consent, or mistaken identity if applicable;
- comply with lawful orders;
- avoid further posts.
LVI. Defenses and Counterarguments
Possible defenses depend on the complaint.
A. Truth
In defamation cases, truth may be relevant, especially if publication was made with good motives and justifiable ends. But truth does not automatically excuse all forms of harassment.
B. Opinion or Fair Comment
A statement of opinion may be treated differently from a false factual accusation. But “opinion” cannot be used to disguise defamatory factual claims.
C. Privileged Communication
Some communications may be privileged, such as good-faith complaints to proper authorities. Posting publicly is different from filing a confidential complaint.
D. Lack of Identification
If the complainant was not named or identifiable, cyberlibel may be harder to prove.
E. No Publication
If a message was sent only to the complainant, cyberlibel may be difficult, though threats, unjust vexation, or harassment may still apply.
F. No Intent or Mistake
Mistake, misunderstanding, or lack of malicious intent may be relevant depending on offense.
G. Account Was Hacked
A respondent may claim their account was hacked. They should provide evidence, such as login alerts, password reset emails, police report, or platform recovery records.
H. Fabricated Screenshots
Screenshots can be faked. Authentication and corroboration matter. URLs, platform data, witnesses, and device records help.
LVII. Importance of Authentication
Digital evidence must be shown to be genuine and connected to the respondent. Helpful authentication includes:
- witness testimony from person who captured screenshot;
- URL verification;
- account ownership proof;
- admissions;
- phone number linkage;
- email linkage;
- platform records;
- device examination;
- metadata;
- corroborating witnesses;
- consistent conversation history.
A screenshot alone may start a complaint, but stronger proof improves the case.
LVIII. Time Limits and Prompt Action
Do not delay. Online evidence may disappear, accounts may be deleted, and witnesses may forget.
Prompt action helps because:
- platforms may retain data for limited periods;
- law enforcement can request preservation;
- threats can be addressed early;
- takedown is faster;
- the chronology is clearer;
- prescription periods may apply.
The applicable prescriptive period depends on the offense. Legal advice is recommended if time has passed.
LIX. Remedies You May Request
Depending on the case, a complainant may seek:
- investigation;
- filing of criminal charges;
- takedown of content;
- preservation of digital evidence;
- protection order;
- no-contact order through proper proceedings;
- school discipline;
- workplace discipline;
- apology or correction;
- damages;
- injunction;
- privacy remedies;
- account suspension;
- identity verification;
- return or deletion of private materials;
- reimbursement of costs;
- mental health support.
LX. Practical Complaint Timeline Format
Use a timeline like this:
| Date | Platform | Act | Evidence | Effect |
|---|---|---|---|---|
| Jan. 3 | Respondent posted false accusation | Annex A screenshot and URL | Friends and coworkers saw it | |
| Jan. 4 | Messenger | Respondent threatened to leak photos | Annex B screenshot | Victim feared exposure |
| Jan. 5 | Fake account used victim’s photo | Annex C profile screenshot | Contacts were confused | |
| Jan. 6 | Respondent sent accusation to employer | Annex D email | HR called victim |
This makes the complaint easier to understand.
LXI. Practical Strategy for Victims
A victim should:
- preserve evidence immediately;
- avoid emotional retaliation;
- identify the legal nature of the conduct;
- report urgent threats to police;
- report cybercrime to NBI or PNP cybercrime units;
- report school or workplace harassment internally;
- request platform takedown;
- seek protection order if partner abuse is involved;
- consult counsel for serious cases;
- maintain a clear timeline.
LXII. Practical Strategy for Parents
Parents of cyberbullied minors should:
- talk to the child calmly;
- preserve evidence;
- do not force the child to confront the bully alone;
- inform the school in writing;
- request protective measures;
- monitor retaliation;
- report serious threats or sexual content to authorities;
- consider counseling;
- avoid public retaliation against other children;
- follow up regularly.
LXIII. Practical Strategy for Schools
Schools should:
- receive complaints seriously;
- preserve evidence;
- protect the victim from retaliation;
- notify parents where appropriate;
- conduct fair investigation;
- provide counseling;
- impose discipline where warranted;
- refer criminal conduct to authorities;
- educate students on digital citizenship;
- update anti-bullying policies to include online conduct.
LXIV. Practical Strategy for Employers
Employers should:
- maintain policies on online harassment;
- investigate work-related online abuse;
- protect complainants from retaliation;
- preserve company chat records where lawful;
- handle sexual harassment through proper channels;
- discipline employees for misconduct;
- avoid unlawful surveillance;
- protect employee data;
- coordinate with law enforcement for serious threats;
- train employees on digital conduct.
LXV. Frequently Asked Questions
1. Is cyberbullying a crime in the Philippines?
Cyberbullying as a broad term may not always be a single standalone crime, but the acts involved may be punishable as cyberlibel, threats, unjust vexation, identity theft, sexual harassment, VAWC, child abuse, voyeurism, data privacy violations, or other offenses.
2. Where should I file a complaint?
For cybercrime-related harassment, file with the PNP Anti-Cybercrime Group, NBI Cybercrime Division, local police, or prosecutor’s office. For school or workplace harassment, also file with the school or employer. For data privacy issues, consider the National Privacy Commission.
3. Are screenshots enough?
Screenshots are important but stronger evidence includes URLs, full context, profile links, witnesses, original files, message exports, and platform data.
4. Can I file a complaint if the account is fake?
Yes. File using the fake account details, URLs, screenshots, and any clues. Investigators may seek platform data where legally available.
5. What if the harasser deleted the post?
If you preserved screenshots, links, witnesses, or cached copies, you may still proceed. This is why early preservation is important.
6. Can private messages be a crime?
Yes, depending on content. Private messages may involve threats, coercion, unjust vexation, sexual harassment, extortion, or VAWC. For libel, publication to a third person is usually important.
7. Can I sue for cyberlibel over a group chat?
Possibly, if the message is defamatory, identifies you, and was published to others in the group. Context matters.
8. What if the post is true?
Truth may be a defense in some defamation contexts, but it does not automatically excuse threats, harassment, doxxing, sexual image sharing, or malicious conduct.
9. Can I demand takedown and damages?
Yes, depending on the facts. You may request takedown from the platform and pursue legal remedies separately.
10. Should I reply to the harasser?
Usually, preserve evidence first, send one clear stop message if safe, then avoid further engagement. Report through proper channels.
LXVI. Key Legal Principles
The main principles are:
- Online harassment is legally analyzed by the specific act committed.
- Cyberbullying may trigger criminal, civil, school, workplace, or child protection remedies.
- Screenshots, URLs, timestamps, and account details are critical.
- Fake accounts do not prevent filing a complaint.
- Threats and intimate image blackmail require urgent action.
- Cyberlibel requires defamatory publication and identification.
- Private messages may still be punishable if they contain threats, coercion, sexual harassment, or extortion.
- Children and women in abusive relationships may have special protections.
- Platform takedown does not replace legal remedies.
- Victims should avoid retaliation and preserve evidence lawfully.
LXVII. Conclusion
Filing a complaint for online harassment and cyberbullying in the Philippines requires more than saying that someone was abusive online. The victim must identify the specific acts, preserve digital evidence, determine the correct legal theory, and file with the proper office.
The same online conduct may involve cyberlibel, threats, unjust vexation, identity theft, hacking, sexual harassment, VAWC, child protection violations, anti-voyeurism violations, data privacy violations, school discipline, workplace discipline, or civil damages. The strongest complaints are those supported by screenshots, URLs, account details, timestamps, witness affidavits, platform reports, and a clear timeline.
Victims should act quickly, especially where there are threats, sexual images, minors, doxxing, fake accounts, or ongoing harassment. Serious cases may be reported to the PNP Anti-Cybercrime Group, NBI Cybercrime Division, local police, prosecutor’s office, school, employer, or privacy authority, depending on the facts.
Online abuse is not “just internet drama” when it threatens safety, dignity, privacy, reputation, mental health, or livelihood. Philippine law provides remedies, but the victim’s first and most important step is to preserve evidence, stay safe, and proceed through the proper legal channels.