How to File a Complaint for Text Harassment in the Philippines

I. Introduction

Text harassment is a serious and increasingly common problem in the Philippines. It may involve repeated insulting messages, threats, sexual remarks, blackmail, intimidation, debt-collection abuse, stalking, impersonation, malicious accusations, or unwanted communications sent through SMS, messaging apps, or social media.

In Philippine law, “text harassment” is not always treated as one single offense. Depending on the words used, the intent of the sender, the relationship between the parties, and the surrounding circumstances, the same conduct may fall under several laws, including the Revised Penal Code, the Cybercrime Prevention Act, the Safe Spaces Act, the Anti-Violence Against Women and Their Children Act, data privacy laws, or special rules on obscene, threatening, or abusive communications.

A victim does not need to wait until physical harm occurs. Repeated threatening or abusive messages may already justify reporting the incident to the police, the barangay, the National Bureau of Investigation, the Philippine National Police Anti-Cybercrime Group, the prosecutor’s office, or other appropriate authorities.

This article explains the legal remedies, evidence needed, possible offenses, and step-by-step process for filing a complaint for text harassment in the Philippines.


II. What Is Text Harassment?

Text harassment refers to unwanted, abusive, threatening, offensive, or malicious messages sent through mobile phones or digital platforms. It may be done through ordinary SMS, calls, Facebook Messenger, Viber, WhatsApp, Telegram, Instagram, email, or other online messaging services.

Examples include:

  1. repeated insulting or degrading messages;
  2. threats to hurt, kill, expose, shame, or ruin someone;
  3. sexual comments, propositions, or obscene messages;
  4. threats to release private photos, videos, or conversations;
  5. repeated unwanted romantic or personal messages after being told to stop;
  6. abusive debt-collection texts;
  7. messages pretending to be from another person;
  8. spreading false accusations through text or chat;
  9. stalking, monitoring, or intimidation through repeated communication;
  10. sending private personal information to scare or embarrass someone.

The legal classification depends on the facts. A message saying “I will kill you” may be treated differently from repeated sexual remarks, defamatory accusations, or blackmail involving intimate photos.


III. Relevant Philippine Laws

A. Revised Penal Code

The Revised Penal Code may apply when the text message contains threats, coercion, unjust vexation, slanderous statements, or other punishable acts.

1. Grave Threats

A person may be liable for grave threats if they threaten another with a crime, such as killing, injuring, kidnapping, or destroying property, especially when the threat is serious and intended to cause fear.

Example:

“I will kill you when I see you.”

A victim receiving this type of message should preserve the text and report it immediately, especially if the sender knows the victim’s location or has shown capacity to carry out the threat.

2. Light Threats

Light threats may apply when the threat is less severe than grave threats but still intended to intimidate or pressure the victim.

Example:

“You better pay me or something bad will happen to you.”

The specific classification depends on the wording and circumstances.

3. Coercion

Coercion may be involved when the sender uses threats or intimidation to force the victim to do something against their will, or to stop the victim from doing something lawful.

Example:

“If you report me, I will expose your private photos.”

4. Unjust Vexation

Unjust vexation is often invoked when conduct annoys, irritates, disturbs, or causes distress without necessarily falling under a more specific crime. Repeated abusive texts may, depending on the facts, be treated as unjust vexation.

Example:

A person repeatedly sends insulting, annoying, or disturbing messages despite being told to stop.

5. Libel or Slander-Related Offenses

If the sender makes false and malicious accusations through text, group chats, social media posts, or online messages that damage another person’s reputation, the conduct may raise issues of libel, cyberlibel, or other related offenses.


B. Cybercrime Prevention Act

The Cybercrime Prevention Act may apply when harassment is committed through a computer system, internet platform, social media account, messaging app, or other digital means. Some offenses under the Revised Penal Code may carry heavier consequences when committed through information and communications technology.

Cyberlibel is one of the most commonly discussed cybercrime-related offenses. A message may become legally serious if it falsely accuses a person of a crime, dishonesty, immorality, or other damaging conduct and is sent or published through online means.

For private one-on-one texts, whether cybercrime laws apply depends on the platform, the nature of the act, and the specific offense alleged.


C. Safe Spaces Act

The Safe Spaces Act may apply when the harassment involves gender-based sexual harassment, including unwanted sexual remarks, sexist comments, misogynistic statements, homophobic or transphobic harassment, stalking, repeated unwanted sexual advances, or other gender-based conduct.

The law covers harassment in public spaces, workplaces, schools, streets, online spaces, and other settings.

Examples:

  1. repeated sexual messages;
  2. sending unwanted obscene photos;
  3. asking for sexual favors through text;
  4. repeated comments about someone’s body;
  5. threatening to spread intimate photos;
  6. gender-based insults through online messages.

Victims may report such conduct to law enforcement, barangay authorities, school officials, employers, or other relevant bodies depending on the setting.


D. Anti-Violence Against Women and Their Children Act

If the victim is a woman and the sender is a current or former spouse, partner, boyfriend, live-in partner, dating partner, or person with whom she has or had a sexual or dating relationship, the Anti-Violence Against Women and Their Children Act may apply.

Text harassment may constitute psychological violence when it causes emotional suffering, intimidation, humiliation, controlling behavior, threats, stalking, or harassment.

Examples:

  1. an ex-partner repeatedly sends threats;
  2. a boyfriend threatens to release private photos;
  3. a former live-in partner sends abusive messages daily;
  4. a husband uses text messages to control, insult, or intimidate;
  5. a partner threatens the victim or her children.

A victim may seek barangay protection, police assistance, a temporary protection order, or a permanent protection order depending on the circumstances.


E. Data Privacy Act

The Data Privacy Act may become relevant when the harasser unlawfully collects, uses, shares, publishes, or threatens to disclose the victim’s personal information, such as address, phone number, workplace, photos, private conversations, financial data, medical details, or identification documents.

Examples:

  1. sending the victim’s address to strangers;
  2. posting the victim’s phone number online to invite harassment;
  3. threatening to reveal private information;
  4. using personal data to intimidate or shame the victim.

Complaints involving misuse of personal information may be brought to the National Privacy Commission, depending on the facts.


F. Anti-Photo and Video Voyeurism Law

If the harassment involves intimate photos or videos, especially threats to share nude images or sexual content, the Anti-Photo and Video Voyeurism Law may apply.

A person may be liable for taking, copying, reproducing, selling, distributing, publishing, or broadcasting intimate images or recordings without consent. Threatening to release such material may also support other complaints such as coercion, threats, psychological abuse, or gender-based sexual harassment.


G. SIM Registration and Anonymous Harassment

The SIM Registration Act requires SIM users to register their subscriber identity. If the sender uses an unknown number, the victim may still report the matter. Law enforcement authorities may request subscriber information through proper legal processes.

Victims should not assume that anonymous numbers cannot be traced. However, private individuals usually cannot directly demand telecom subscriber details without lawful authority or appropriate procedure.


IV. Where to File a Complaint

A. Barangay

For less severe harassment, especially when the parties live in the same city or municipality, the victim may first go to the barangay.

The barangay may assist through mediation or barangay conciliation, particularly for disputes between residents of the same locality. However, barangay proceedings are not always required, especially for serious offenses, offenses punishable by imprisonment above the barangay conciliation threshold, cases involving urgent protection, violence against women and children, or cybercrime-related matters.

A barangay blotter may also help document the incident.

B. Philippine National Police

A victim may report text harassment to the nearest police station. The police may record the complaint in the blotter, assist in preparing a statement, and refer the case to the proper investigative unit.

For online or technology-related harassment, the victim may approach the PNP Anti-Cybercrime Group or a cybercrime desk where available.

C. National Bureau of Investigation

The NBI Cybercrime Division may receive complaints involving cyber harassment, online threats, cyberlibel, identity misuse, sextortion, hacking, phishing, or digital evidence.

Victims should bring screenshots, devices, phone numbers, account links, message logs, and identification documents.

D. Prosecutor’s Office

A criminal complaint may be filed before the Office of the City Prosecutor or Provincial Prosecutor. The prosecutor evaluates whether there is probable cause to charge the respondent in court.

The complainant usually submits:

  1. complaint-affidavit;
  2. sworn statements of witnesses;
  3. screenshots or printouts of messages;
  4. phone records or call logs;
  5. proof of ownership or use of the phone number or account;
  6. supporting documents;
  7. valid identification.

E. Court

In some cases, the victim may seek protection orders, injunctions, damages, or criminal prosecution through the courts. For VAWC cases, protection orders may be available. For civil claims, damages may be sought if the victim suffered injury, reputational harm, emotional distress, financial loss, or other legally compensable harm.

F. National Privacy Commission

If the harassment involves misuse, unauthorized sharing, or unlawful processing of personal data, a complaint may be considered before the National Privacy Commission.

G. Workplace, School, or Institution

If the harassment happens in a workplace, school, university, organization, or professional setting, the victim may also file an administrative complaint with the employer, human resources department, school discipline office, or professional body.

This does not necessarily prevent filing a police or criminal complaint.


V. Evidence Needed

Strong evidence is critical. Victims should preserve everything.

A. Screenshots

Take clear screenshots showing:

  1. the sender’s phone number, name, username, or profile;
  2. the full message;
  3. the date and time;
  4. previous messages for context;
  5. profile photos or account links, if relevant.

Do not crop too much. A screenshot should show enough surrounding details to prove authenticity.

B. Original Messages

Do not delete the original texts, chats, or call logs. Screenshots are useful, but the original device and message thread may be needed for verification.

C. Screen Recording

A screen recording scrolling through the conversation may help show continuity, especially when there are many messages.

D. Call Logs

If the harassment includes repeated calls, preserve call logs showing dates, times, and frequency.

E. Witnesses

Witnesses may include people who saw the messages, heard the threats, helped identify the sender, or observed the victim’s distress.

F. Medical or Psychological Records

If the harassment caused anxiety, trauma, insomnia, panic attacks, or other harm, medical or psychological records may support the complaint.

G. Proof of Identity of Sender

Useful evidence may include:

  1. the sender’s admitted identity;
  2. matching phone number;
  3. prior conversations;
  4. screenshots of profiles;
  5. transaction records;
  6. mutual contacts;
  7. voice recordings, where lawfully obtained;
  8. emails or messages linking the person to the number or account.

H. Certification or Digital Forensics

For serious cases, law enforcement or a qualified digital forensic examiner may help preserve and authenticate electronic evidence.


VI. Step-by-Step Guide to Filing a Complaint

Step 1: Preserve the Evidence

Save screenshots, export chats where possible, back up messages, and keep the original device. Record the dates, times, phone numbers, account names, and context.

Prepare a chronological timeline of events.

Example format:

Date Time Sender Message/Incident Evidence
March 1 8:15 PM 09XX XXX XXXX Threatened to hurt me Screenshot 1
March 2 9:30 AM Same number Sent sexual message Screenshot 2
March 3 11:00 PM Same number Called 20 times Call log

Step 2: Do Not Engage Further

A victim may send one clear message such as:

“Stop contacting me. Your messages are unwanted. I am preserving these messages as evidence.”

After that, avoid arguments. Continued exchanges may complicate the complaint.

If there is an immediate threat, prioritize safety and contact authorities.

Step 3: Identify the Proper Legal Basis

The complaint may involve one or more of the following:

  1. threats;
  2. coercion;
  3. unjust vexation;
  4. cyberlibel;
  5. gender-based sexual harassment;
  6. psychological violence under VAWC;
  7. data privacy violation;
  8. voyeurism or sextortion-related conduct;
  9. stalking or repeated unwanted communication;
  10. administrative misconduct, if in school or workplace.

The exact offense should be assessed by a lawyer, prosecutor, police investigator, or appropriate agency.

Step 4: Execute a Complaint-Affidavit

A complaint-affidavit is a sworn written statement describing what happened. It should include:

  1. complainant’s full name and address;
  2. respondent’s name, if known;
  3. phone number, username, or account used;
  4. relationship between the parties;
  5. complete narration of events;
  6. specific messages received;
  7. effect on the victim;
  8. laws possibly violated;
  9. list of attached evidence;
  10. request for investigation or prosecution.

The affidavit must be signed under oath before a prosecutor, notary public, or authorized officer.

Step 5: Attach Evidence

Attach printed screenshots, message transcripts, call logs, IDs, witness statements, and other supporting documents. Mark them as annexes.

Example:

  1. Annex “A” — screenshot of first threatening message;
  2. Annex “B” — screenshot of repeated calls;
  3. Annex “C” — profile page of sender;
  4. Annex “D” — medical certificate;
  5. Annex “E” — witness affidavit.

Step 6: File with the Appropriate Office

Depending on the facts, file with:

  1. barangay;
  2. local police station;
  3. PNP Anti-Cybercrime Group;
  4. NBI Cybercrime Division;
  5. City or Provincial Prosecutor’s Office;
  6. National Privacy Commission;
  7. school, employer, or administrative body.

For urgent threats, go directly to law enforcement.

Step 7: Attend Hearings or Preliminary Investigation

If filed with the prosecutor, the respondent may be required to submit a counter-affidavit. The complainant may submit a reply-affidavit. The prosecutor will determine whether probable cause exists.

Step 8: Follow Through

Keep copies of everything. Attend scheduled proceedings. Notify authorities if harassment continues. New incidents may be added through supplemental affidavits.


VII. Sample Complaint-Affidavit Format

Below is a simplified sample. It should be adapted to the facts of the case.

Republic of the Philippines City/Province of __________ Office of the City/Provincial Prosecutor

Complaint-Affidavit

I, [Name], of legal age, Filipino, single/married, and residing at [Address], after being duly sworn, state:

  1. I am filing this complaint against [Name of Respondent, if known], who may be contacted or identified through mobile number/account [number/account].

  2. On or about [date], I received a text/message from the respondent stating: “[quote exact message]”. A screenshot of this message is attached as Annex “A.”

  3. On [date], the respondent again sent me messages saying: “[quote exact message]”. Copies are attached as Annexes “B” and “C.”

  4. The respondent’s messages were unwanted, abusive, threatening, and caused me fear, anxiety, humiliation, and emotional distress.

  5. I told the respondent to stop contacting me, but the respondent continued sending messages.

  6. I respectfully request that this complaint be investigated and that the respondent be charged with the proper offense under applicable Philippine law.

  7. I am executing this affidavit to attest to the truth of the foregoing and to support my complaint for text harassment and related offenses.

[Name of Complainant] Affiant

SUBSCRIBED AND SWORN to before me this ___ day of _______ 20__, in __________, Philippines.


VIII. Practical Tips for Victims

A. Save Evidence Immediately

Harassers may delete accounts, unsend messages, change usernames, or discard SIM cards. Preserve evidence as soon as possible.

B. Back Up the Evidence

Save copies in cloud storage, email, USB drive, or another secure device.

C. Do Not Edit Screenshots

Editing screenshots may affect credibility. Keep original files.

D. Record the Context

Write down why the harassment started, how the sender knows you, whether there were prior conflicts, and whether the sender has access to your home, school, or workplace.

E. Block Only After Preserving Evidence

Blocking may stop the harassment, but preserve proof first. If threats are ongoing, consider keeping records while prioritizing safety.

F. Use Privacy Controls

Change passwords, enable two-factor authentication, review social media privacy settings, and avoid sharing your location publicly.

G. Report Platform Abuse

Report the account to Facebook, Instagram, TikTok, Telegram, Viber, or the relevant platform. Platform reports do not replace legal complaints but may stop further abuse.

H. Seek Protection if There Is Danger

If the sender threatens physical harm, stalking, sexual violence, extortion, or exposure of intimate images, seek urgent police assistance.


IX. Special Situations

A. Harassment by an Ex-Partner

If the sender is a former spouse, boyfriend, girlfriend, live-in partner, or dating partner, the conduct may be more than ordinary harassment. It may constitute psychological abuse, stalking, coercive control, or violence under special laws.

Women and children may have additional remedies under VAWC, including protection orders.

B. Harassment by a Debt Collector

Debt collectors may contact debtors, but they cannot use threats, insults, public shaming, false accusations, or abusive language. Harassing texts from lending apps, collectors, or agents may also involve data privacy violations, unfair collection practices, cyber harassment, or other administrative and criminal issues.

Victims may document:

  1. threatening messages;
  2. public shaming;
  3. messages sent to contacts;
  4. unauthorized access to phone contacts;
  5. false accusations;
  6. disclosure of personal debt information.

Possible complaint venues include police, prosecutors, the National Privacy Commission, and regulators depending on the lender.

C. Harassment Involving Nude Photos or Videos

If the sender threatens to publish intimate images, this is serious. Preserve the messages and report immediately. Possible legal issues include coercion, threats, gender-based sexual harassment, psychological violence, data privacy violations, and photo/video voyeurism offenses.

Do not send additional images to “stop” the threat. Do not pay extortion money without seeking help, because payment may encourage further demands.

D. Anonymous Numbers

Even if the sender uses an unregistered-looking or unknown number, report the incident. Law enforcement may have means to trace the number through lawful procedures.

E. Harassment in Group Chats

If defamatory, sexual, threatening, or abusive statements are sent in a group chat, preserve the entire conversation. A group chat may strengthen the publication element in reputation-related complaints because third persons saw the message.

F. Harassment by a Co-Worker

If the harassment is work-related, the victim may file an internal complaint with HR or management, especially if the conduct is sexual, discriminatory, threatening, or retaliatory. This may be pursued alongside criminal remedies.

G. Harassment by a Student, Teacher, or School Official

Schools may have disciplinary rules and obligations under anti-sexual harassment and child protection policies. Victims may report to school authorities and law enforcement, depending on the facts.


X. Can a Victim Sue for Damages?

Yes, depending on the circumstances. A victim may consider civil action for damages if the harassment caused emotional distress, reputational harm, financial loss, mental suffering, or other injury.

Possible damages may include:

  1. moral damages;
  2. exemplary damages;
  3. actual damages;
  4. attorney’s fees;
  5. litigation expenses.

Civil remedies may be pursued separately or alongside criminal proceedings depending on the case.


XI. Common Mistakes to Avoid

  1. deleting messages;
  2. replying with threats;
  3. posting the sender’s private information online;
  4. editing screenshots;
  5. relying only on verbal reports without evidence;
  6. waiting too long when threats are serious;
  7. sending money or intimate content to stop blackmail;
  8. confronting the harasser alone;
  9. failing to preserve the original device;
  10. assuming anonymous accounts cannot be traced.

XII. What Happens After Filing?

After a complaint is filed, authorities may:

  1. record the complaint;
  2. interview the complainant;
  3. review screenshots and devices;
  4. require affidavits;
  5. identify the sender;
  6. invite or summon the respondent;
  7. refer the case for inquest or preliminary investigation;
  8. recommend filing of criminal charges;
  9. dismiss the complaint if evidence is insufficient;
  10. direct further investigation.

If filed with the prosecutor, the process may involve submission of affidavits and counter-affidavits. If probable cause is found, an information may be filed in court.


XIII. Is Barangay Conciliation Required?

Sometimes, but not always.

Barangay conciliation may be required for certain disputes between individuals living in the same city or municipality, particularly for less serious offenses. However, it may not be required in cases involving serious crimes, urgent legal action, offenses beyond the barangay’s authority, cybercrime, VAWC, protection orders, or circumstances where immediate police or prosecutorial intervention is necessary.

When in doubt, victims may still go to the police, prosecutor, or legal aid office to ask where the complaint should properly be filed.


XIV. Filing Against Unknown Persons

A complaint may be filed even if the sender’s real name is unknown. The complaint may describe the respondent as:

“John/Jane Doe using mobile number _______” “Unknown person using Facebook account _______” “Unknown person using Telegram username _______”

The complaint should include all available identifiers, such as phone number, username, profile link, screenshots, photos, payment account, email address, or other clues.


XV. Remedies Aside from Criminal Complaint

A victim may consider several remedies:

  1. police blotter;
  2. barangay blotter;
  3. criminal complaint;
  4. protection order;
  5. school or workplace complaint;
  6. data privacy complaint;
  7. platform report;
  8. civil action for damages;
  9. cease-and-desist demand through counsel;
  10. account security measures.

The best remedy depends on the urgency, severity, relationship of the parties, and available evidence.


XVI. When to Seek Immediate Help

Seek urgent help if the messages include:

  1. threats to kill or injure;
  2. stalking or surveillance;
  3. threats to go to your home, school, or workplace;
  4. sexual extortion;
  5. threats to release intimate photos or videos;
  6. threats against children or family members;
  7. repeated harassment by a former partner;
  8. signs that the sender knows your location;
  9. demands for money under threat;
  10. encouragement of self-harm.

In these situations, a police report should be made as soon as possible.


XVII. Conclusion

Filing a complaint for text harassment in the Philippines requires careful preservation of evidence, identification of the proper legal basis, and filing with the appropriate authority. Text harassment may involve several laws, including those on threats, coercion, unjust vexation, cybercrime, gender-based sexual harassment, violence against women and children, data privacy, and voyeurism.

The most important first step is documentation. Save the messages, screenshots, call logs, account details, and all related evidence. Then report the matter to the barangay, police, PNP Anti-Cybercrime Group, NBI Cybercrime Division, prosecutor’s office, National Privacy Commission, school, employer, or court, depending on the facts.

Because the correct legal remedy depends heavily on the exact wording of the messages, the relationship between the parties, and the available evidence, a victim should consider consulting a lawyer, public attorney, women and children protection desk, cybercrime investigator, or legal aid office for guidance tailored to the case.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.