How to File a Cyber Libel Complaint in the Philippines

I. Introduction

Cyber libel is one of the most common legal complaints arising from online posts, social media comments, private messages, group chats, videos, blogs, online articles, and digital publications in the Philippines. It usually involves a person claiming that another person made a defamatory statement online that injured reputation, honor, dignity, business standing, profession, employment, or social relationships.

Cyber libel is not simply “offensive speech.” It is not every insult, disagreement, criticism, rant, joke, or negative review. To file a viable cyber libel complaint, the complainant must show that the online statement satisfies the legal elements of libel and that it was committed through a computer system or similar digital means.

This article explains the Philippine legal framework on cyber libel, its elements, who may file, where to file, how to preserve evidence, how to prepare a complaint-affidavit, possible defenses, procedure before law enforcement and the prosecutor, court proceedings, remedies, and practical considerations.


II. What Is Cyber Libel?

Cyber libel is libel committed through a computer system or other information and communications technology.

Traditional libel under the Revised Penal Code involves a public and malicious imputation of a crime, vice, defect, act, omission, condition, status, or circumstance that tends to dishonor, discredit, or cause contempt toward a person.

Cyber libel applies when the defamatory statement is made online or electronically, such as through:

  1. Facebook posts;
  2. X/Twitter posts;
  3. TikTok videos or captions;
  4. YouTube videos;
  5. Instagram posts or stories;
  6. Blog articles;
  7. Online news articles;
  8. Websites;
  9. Emails;
  10. Online forums;
  11. Reddit-style posts;
  12. Group chats;
  13. Messenger, Viber, Telegram, WhatsApp, or similar platforms;
  14. SMS or online messaging, depending on facts and legal framing;
  15. Shared images, memes, screenshots, or edited photos;
  16. Comments on social media;
  17. Online reviews;
  18. Livestream statements;
  19. Digital posters or online “wanted” notices.

Cyber libel is generally treated more seriously than ordinary libel because online publication can spread quickly, remain searchable, be shared repeatedly, and cause wider reputational damage.


III. Legal Basis

Cyber libel in the Philippines is based on:

  1. The Revised Penal Code provisions on libel, especially the definition and elements of libel;
  2. The Cybercrime Prevention Act of 2012, which penalizes libel committed through a computer system or similar means;
  3. Rules on criminal procedure, including preliminary investigation, filing of information, arraignment, trial, and judgment;
  4. Rules on electronic evidence, because the evidence is usually digital;
  5. Civil Code provisions, if the complainant also seeks damages;
  6. Constitutional protections, including freedom of speech, press freedom, privacy, and due process.

Cyber libel complaints require careful balance between reputation protection and free expression.


IV. Cyber Libel vs. Ordinary Libel

Ordinary libel is committed through traditional written or printed publication, such as newspapers, letters, posters, pamphlets, or printed materials.

Cyber libel is committed through digital or online means.

The main difference is the medium. The defamatory content may be similar, but cyber libel involves use of information and communications technology.

Examples:

  • Printed flyer accusing a person of theft: ordinary libel.
  • Facebook post accusing a person of theft: cyber libel.
  • Newspaper column published only in print: ordinary libel.
  • Same column uploaded to a website: possible cyber libel.
  • Group chat message accusing a co-worker of being an estafador: possible cyber libel, depending on publication and other elements.

V. Elements of Cyber Libel

To file a strong cyber libel complaint, the complainant must show the following core elements:

  1. Imputation — there was an allegation or statement against a person.
  2. Defamatory character — the statement tends to dishonor, discredit, or cause contempt.
  3. Publication — the statement was communicated to at least one person other than the complainant.
  4. Identifiability — the complainant is identified or identifiable.
  5. Malice — the statement was made with malice, either presumed or proven.
  6. Use of computer system or digital means — the statement was made online or through ICT.
  7. Authorship or participation by the respondent — the respondent made, posted, shared, caused, or participated in the defamatory publication.

If any essential element is missing, the complaint may fail.


VI. First Element: Imputation

There must be an imputation or assertion. It may be direct or indirect.

Examples of imputations:

  1. “She stole company funds.”
  2. “He is a scammer.”
  3. “This person is an estafador.”
  4. “Do not transact with her; she is a fraud.”
  5. “He is corrupt.”
  6. “She has a fake license.”
  7. “He is a drug addict.”
  8. “This business cheats customers.”
  9. “She has a contagious disease.”
  10. “He is immoral and abusive.”

The imputation may be made through words, images, memes, captions, hashtags, emojis, edited photos, or insinuations.

A statement need not say “crime” explicitly if the meaning is defamatory by implication.


VII. Second Element: Defamatory Character

A statement is defamatory if it tends to injure a person’s reputation, expose the person to public hatred, contempt, ridicule, or discredit, or damage the person’s profession, business, trade, or social standing.

Statements accusing someone of a crime, fraud, dishonesty, sexual misconduct, professional incompetence, corruption, abuse, or moral depravity may be defamatory.

However, not every unpleasant statement is defamatory.

Examples that may not automatically be cyber libel:

  1. Mere insult without factual imputation;
  2. Hyperbole or obvious exaggeration;
  3. Opinion based on disclosed facts;
  4. Fair criticism of public conduct;
  5. True statement made for a legitimate purpose;
  6. Private complaint made in good faith to proper authorities;
  7. Negative review based on actual experience, if factual and not malicious;
  8. Satire that no reasonable person would treat as factual.

The exact words and context matter.


VIII. Third Element: Publication

Publication means the defamatory statement was communicated to someone other than the complainant.

In cyber libel, publication may occur when the statement is:

  1. Posted publicly online;
  2. Sent to a group chat;
  3. Sent to the complainant’s employer;
  4. Emailed to multiple people;
  5. Published in a blog;
  6. Uploaded as a video;
  7. Shared on social media;
  8. Commented on a public post;
  9. Sent to relatives, co-workers, customers, clients, or friends;
  10. Made available through a website.

A message sent only to the complainant, with no third-party recipient, may not satisfy publication for libel, although it may still be relevant to threats, harassment, unjust vexation, or other claims depending on content.

A group chat message may satisfy publication if at least one person other than the complainant received or saw it.


IX. Fourth Element: Identifiability

The complainant must be named or identifiable.

Identification may be direct:

  • Full name;
  • Photo;
  • Tag;
  • Username;
  • Business name;
  • Address;
  • Contact number;
  • Employer;
  • Face;
  • Document;
  • Account profile.

Identification may also be indirect if the surrounding details make it clear who is being referred to.

Examples:

  1. “The treasurer of XYZ Association who lives in Barangay 5.”
  2. “The female HR manager of ABC Company.”
  3. “The owner of the blue car with plate number ___.”
  4. Posting a blurred photo but enough details remain to identify the person.
  5. Mentioning a nickname known in the community.
  6. Posting screenshots of conversations with profile photos.

If no one can reasonably identify the complainant, a cyber libel complaint may fail.


X. Fifth Element: Malice

Malice is central to libel.

There are two broad concepts:

A. Malice in Law

Malice may be presumed from a defamatory publication. If the statement is defamatory on its face, the law may presume malice unless the respondent shows a valid defense or privileged communication.

B. Malice in Fact

Malice in fact means actual ill will, bad motive, knowledge of falsity, reckless disregard of truth, or intent to injure reputation.

Evidence of malice may include:

  1. Personal grudge;
  2. Repeated posting despite correction;
  3. Refusal to verify facts;
  4. Use of fake accounts;
  5. Edited screenshots;
  6. Threats before posting;
  7. Posting after settlement demand failed;
  8. Targeting employer, family, or clients;
  9. Exaggerated or fabricated accusations;
  10. Deleting context to mislead viewers.

Malice is especially important when the statement involves public figures, matters of public interest, or privileged communications.


XI. Sixth Element: Use of Computer System or ICT

Cyber libel requires use of a computer system or information and communications technology.

This includes:

  1. Smartphones;
  2. Computers;
  3. Tablets;
  4. Social media platforms;
  5. Websites;
  6. Messaging apps;
  7. Email systems;
  8. Online forums;
  9. Cloud-hosted content;
  10. Digital publication tools.

A Facebook post made through a mobile phone is still made through a computer system for cybercrime purposes.


XII. Seventh Element: Respondent’s Authorship or Participation

The complainant must link the defamatory publication to the respondent.

Proof may include:

  1. Screenshot showing the respondent’s account name;
  2. Profile URL;
  3. Admission by respondent;
  4. Witnesses who saw the post;
  5. Account ownership evidence;
  6. Phone number or email associated with the account;
  7. Chat logs;
  8. Prior messages showing intent;
  9. Metadata, where available;
  10. Platform records, if lawfully obtained;
  11. NBI or PNP cybercrime investigation;
  12. Circumstantial evidence connecting the respondent to the account.

This is especially important where fake accounts, dummy accounts, or hacked accounts are involved.

A complaint may be weak if it cannot show that the respondent actually made or controlled the post.


XIII. Common Examples of Cyber Libel

Potential cyber libel may include:

  1. Posting that a person is a scammer without proof;
  2. Uploading a “wanted” poster of a debtor;
  3. Accusing an employee of theft in a group chat;
  4. Posting that a business sells fake products when false;
  5. Sharing edited screenshots to make someone look guilty;
  6. Calling a professional fake or unlicensed without basis;
  7. Posting allegations of adultery, immorality, or disease to shame someone;
  8. Accusing a barangay official of stealing funds without evidence;
  9. Publishing false accusations against a teacher, doctor, lawyer, or accountant;
  10. Posting a person’s photo with claims of fraud to warn the public maliciously.

Each case still depends on truth, privilege, good faith, public interest, and evidence.


XIV. Online Debt Collection and Cyber Libel

Many cyber libel complaints arise from debt collection.

Collectors may post:

  • “Scammer ito.”
  • “Magnanakaw.”
  • “Hindi nagbabayad ng utang.”
  • “Estafador.”
  • “Wanted.”
  • “Do not hire this person.”
  • “Contact her employer.”

If these statements are posted online, sent to group chats, or transmitted to third parties, they may support cyber libel, privacy, harassment, and unfair collection complaints.

A debt may be real, but publicly branding a debtor as a criminal or scammer may still be defamatory if not legally established.


XV. Business Reviews and Cyber Libel

A negative review is not automatically cyber libel. Consumers may express honest opinions and describe actual experiences.

Potentially lawful review:

“My order arrived late, and customer service did not reply for three days.”

Potentially risky review:

“This restaurant steals customers’ money and is run by criminals.”

A review is safer when it is:

  1. Based on actual experience;
  2. Factually accurate;
  3. Limited to what happened;
  4. Not exaggerated into criminal accusations;
  5. Not motivated by extortion or revenge;
  6. Written as opinion where appropriate;
  7. Supported by receipts or records.

Businesses may file cyber libel complaints if false factual accusations damage reputation.


XVI. Public Officials and Matters of Public Interest

Criticism of public officials, public figures, and matters of public concern receives stronger free speech protection. However, false and malicious factual accusations may still be actionable.

A citizen may criticize:

  1. Government policies;
  2. Public performance;
  3. Public spending;
  4. Official conduct;
  5. Publicly relevant acts.

But a person should avoid knowingly false accusations, fabricated documents, or reckless claims of crimes without basis.

In public interest cases, malice, good faith, truth, and fair comment become especially important.


XVII. Opinion vs. Statement of Fact

Opinion is generally more protected than false factual assertion.

Example of opinion:

“I think the service was terrible.”

Example of factual accusation:

“The owner stole my money.”

A statement framed as opinion may still be defamatory if it implies undisclosed false facts.

Example:

“In my opinion, he is a thief.”

This may still be defamatory because it imputes a crime.

The key question is whether the statement can reasonably be understood as asserting a fact capable of being proven true or false.


XVIII. Truth as a Defense

Truth may be a defense, especially when the statement was made with good motives and for justifiable ends.

But truth alone may not always be enough if the publication was malicious, unnecessary, or made to shame rather than inform.

A respondent claiming truth should be prepared to prove it.

Examples:

  1. If accused person was actually convicted of a crime, certified court records may support truth.
  2. If a business failed to deliver goods, receipts and chat records may support a factual review.
  3. If an official document supports the claim, it may help.

However, pending accusations, rumors, complaints, or unverified screenshots are not the same as proven truth.


XIX. Privileged Communication

Some communications are privileged and may not be actionable unless actual malice is proven.

Examples may include:

  1. Statements made in official proceedings;
  2. Fair and true reports of official proceedings;
  3. Complaints filed in good faith with proper authorities;
  4. Communications made in performance of legal, moral, or social duty;
  5. Statements made to a person with a legitimate interest in the matter.

For example, reporting suspected misconduct to HR, police, school administration, or a regulator may be privileged if done in good faith and limited to proper channels.

But posting the same accusations publicly on Facebook may not be privileged.


XX. Fair Comment

Fair comment protects honest expressions of opinion on matters of public interest or public concern, provided they are based on true or privileged facts and are not made with actual malice.

This defense is relevant to:

  1. Political commentary;
  2. Reviews of public services;
  3. Criticism of public officials;
  4. Commentary on public controversies;
  5. Consumer warnings based on actual experience;
  6. Professional criticism made in good faith.

Fair comment does not protect fabricated facts.


XXI. Retraction and Apology

Retraction or apology may reduce damage, show remorse, or help settlement. But it does not automatically erase criminal liability once the offense is complete.

A complainant may still proceed despite deletion, apology, or correction.

However, in practice, a sincere public correction, apology, removal of content, and settlement may help resolve the dispute before or during preliminary investigation.


XXII. Deleting the Post

Deleting the post does not automatically destroy liability. If the complainant already preserved screenshots, witnesses, archives, or platform records, deletion may not prevent the complaint.

Deletion may also be interpreted in different ways:

  1. As remorse;
  2. As an attempt to mitigate harm;
  3. As consciousness of wrongdoing;
  4. As destruction of evidence, depending on circumstances.

A respondent should preserve records and seek legal advice before deleting or altering material if a complaint is likely.


XXIII. Sharing or Reposting Defamatory Content

A person who did not write the original defamatory statement may still face risk if he or she knowingly shared, reposted, republished, or amplified it with defamatory intent or endorsement.

Examples:

  1. Sharing a defamatory post with caption “Totoo ito, scammer siya.”
  2. Reposting a fake accusation to a larger audience.
  3. Uploading screenshots from a private conversation to shame someone.
  4. Creating a compilation video repeating defamatory allegations.

Mere passive receipt is different from active republication.


XXIV. Liking, Reacting, or Commenting

A mere “like” or emoji reaction is generally less likely to be treated as cyber libel than a post or share, but context matters.

A comment may be defamatory if it adds an accusation.

Example:

  • Original post: “Do not trust Juan.”
  • Comment: “Yes, magnanakaw talaga iyan.”

The commenter may be liable for the comment.


XXV. Group Chats and Private Messages

Cyber libel can occur in group chats if the defamatory statement is communicated to third persons.

A private message sent only to the complainant is usually not libel because there is no third-party publication, but it may still be harassment, threat, or unjust vexation depending on content.

A message sent to a group chat of co-workers accusing a person of theft may satisfy publication.


XXVI. Anonymous or Dummy Accounts

Cyber libel complaints involving dummy accounts require additional investigation.

The complainant may:

  1. Preserve screenshots;
  2. Copy profile links;
  3. Record usernames and account IDs;
  4. Identify phone numbers or emails if visible;
  5. Note mutual friends or behavior linking the account to a person;
  6. Report to NBI Cybercrime Division or PNP Anti-Cybercrime Group;
  7. Ask investigators to preserve digital evidence;
  8. Seek subpoenas or platform information through legal channels where available.

A complainant should avoid accusing someone without sufficient basis. The complaint must show why the respondent is believed to be behind the account.


XXVII. Hacked Accounts

A respondent may defend by claiming the account was hacked.

Relevant evidence includes:

  1. Login alerts;
  2. Password reset emails;
  3. Report to platform;
  4. Report to authorities;
  5. Device logs;
  6. Prior or subsequent account activity;
  7. Whether the respondent promptly disowned the post;
  8. Whether the writing style matches the respondent;
  9. Whether the respondent benefited from the post;
  10. Whether the respondent deleted or repeated the statement.

A hacking claim should be supported by evidence.


XXVIII. Jurisdiction and Venue

Cyber libel complaints may involve questions of where to file.

Possible venues may include places where:

  1. The complainant resides or is located;
  2. The defamatory content was accessed;
  3. The respondent resides;
  4. The content was posted;
  5. The damage occurred;
  6. The cybercrime unit or prosecutor has jurisdiction under applicable rules.

For practical purposes, many complainants begin with the NBI Cybercrime Division, PNP Anti-Cybercrime Group, or the Office of the City/Provincial Prosecutor in the relevant locality.

Venue can be technical. If the case is filed in the wrong place, it may be dismissed or transferred.


XXIX. Prescription Period

Cyber libel complaints must be filed within the applicable prescriptive period.

Prescription rules for cyber libel have been the subject of legal discussion because cyber libel is related to libel under the Revised Penal Code but penalized under the Cybercrime Prevention Act. The complainant should not delay. The safest approach is to file as soon as possible after discovering the defamatory publication.

Delay creates practical and legal risks:

  1. Evidence may disappear;
  2. Posts may be deleted;
  3. Witnesses may forget;
  4. Platform records may be lost;
  5. The respondent may become harder to identify;
  6. Prescription defenses may be raised.

Prompt action is essential.


XXX. First Step: Preserve Evidence

Before confronting the respondent, filing publicly, or sending threats, preserve evidence.

Evidence preservation should include:

  1. Screenshots of the post or message;
  2. Full-page screenshots showing date, time, username, profile, and URL;
  3. Screen recording scrolling through the post, comments, and profile;
  4. Copy of the post URL;
  5. Comments, shares, reactions, and captions;
  6. Screenshots of the respondent’s profile;
  7. Group chat details;
  8. List of people who saw the post;
  9. Archived link if possible;
  10. Downloaded video or image files;
  11. Metadata, where available;
  12. Affidavits of witnesses who saw the post;
  13. Notarized printouts, if available;
  14. Certification by a qualified person or investigator, if needed.

Screenshots should not be edited except for making copies. Keep originals.


XXXI. How to Make Strong Screenshots

A useful screenshot should show:

  1. The defamatory statement;
  2. Name or username of poster;
  3. Profile picture or account identifier;
  4. Date and time;
  5. URL or platform details;
  6. Comments or context;
  7. Public visibility or group members if relevant;
  8. The complainant’s identity if tagged or referred to;
  9. Number of shares or reactions if relevant.

A cropped screenshot showing only the words may be challenged because it lacks context and account identity.


XXXII. Use of Screen Recording

Screen recording helps show authenticity because it can capture:

  1. Opening the app or browser;
  2. Navigating to the account;
  3. Opening the post;
  4. Showing the URL;
  5. Showing comments;
  6. Showing date and time;
  7. Showing that the post exists and is not fabricated.

A screen recording may be useful especially where the respondent is likely to delete the post.


XXXIII. Witnesses

Witnesses can strengthen the complaint.

Witnesses may include:

  1. People who saw the post;
  2. Group chat members who received the message;
  3. Co-workers who saw employer-directed posts;
  4. Customers who saw business accusations;
  5. Friends who recognized the complainant from indirect references;
  6. IT personnel who helped preserve the evidence;
  7. People who received screenshots or shared posts.

Witnesses may execute affidavits stating what they saw, when they saw it, and how they identified the complainant.


XXXIV. Digital Evidence and Authentication

Because cyber libel evidence is electronic, authenticity matters.

The respondent may claim:

  1. Screenshot is fake;
  2. Account is fake;
  3. Post was edited;
  4. Context was omitted;
  5. Account was hacked;
  6. The respondent did not make the post;
  7. The post was private and not published;
  8. The complainant fabricated the evidence.

To strengthen authenticity, preserve:

  1. URLs;
  2. Original files;
  3. Device screenshots;
  4. Screen recordings;
  5. Witness affidavits;
  6. Platform notifications;
  7. Chat exports;
  8. Email headers, for emails;
  9. Police or NBI cybercrime certification where available;
  10. Notarized or certified printouts.

XXXV. Avoid Entrapment or Retaliatory Posts

A complainant should not respond by posting equally defamatory statements.

Do not post:

  • “I will file cyber libel against this criminal.”
  • “This person is a fake lawyer and scammer.”
  • “Wanted: cyber libel suspect.”
  • “Please share until arrested.”

Such posts may expose the complainant to counterclaims.

The better approach is to preserve evidence, send a formal demand if appropriate, and file a complaint.


XXXVI. Demand Letter Before Filing

A demand letter is not always required, but it may help.

A demand letter may ask the respondent to:

  1. Delete the post;
  2. Publish a retraction;
  3. Issue an apology;
  4. Stop further publication;
  5. Preserve evidence;
  6. Pay damages or settle, where appropriate.

A demand letter should be professional. It should not threaten unlawful action.

Sample demand language:

You published statements online accusing me of __________. These statements are false, defamatory, and have caused damage to my reputation. I demand that you immediately remove the post, issue a written retraction and apology, and cease further publication. This is without prejudice to my right to file criminal, civil, and other appropriate actions.

A demand letter can show that the respondent was notified of falsity and continued publication despite warning, which may support malice.


XXXVII. Is a Demand Letter Required?

A demand letter is generally not an element of cyber libel. A complainant may file directly if evidence is strong.

However, a demand letter may be useful when:

  1. The complainant wants quick takedown;
  2. The parties know each other;
  3. Settlement is possible;
  4. The post is still spreading;
  5. The complainant wants to show respondent’s refusal to correct;
  6. The complainant wants to avoid litigation if possible.

In urgent cases, especially where the post is viral or highly damaging, immediate complaint may be preferable.


XXXVIII. Where to File a Cyber Libel Complaint

A cyber libel complaint may be initiated through:

  1. Office of the City or Provincial Prosecutor;
  2. NBI Cybercrime Division;
  3. PNP Anti-Cybercrime Group;
  4. Local police cybercrime desk, if available;
  5. Court, after prosecutor finds probable cause and files information.

The prosecutor determines whether there is probable cause for filing a criminal case in court.

Law enforcement agencies may assist in digital evidence preservation, identification of anonymous accounts, and technical investigation.


XXXIX. Filing Directly With the Prosecutor

A complainant may file a complaint-affidavit before the Office of the Prosecutor.

The complaint should include:

  1. Full name and address of complainant;
  2. Full name and address of respondent, if known;
  3. Description of defamatory post or message;
  4. Date and time of publication;
  5. Platform used;
  6. Explanation of why the statement is defamatory;
  7. Explanation of how complainant is identified;
  8. Evidence linking respondent to the post;
  9. Evidence of publication to third persons;
  10. Evidence of malice;
  11. Screenshots and URLs;
  12. Witness affidavits;
  13. Copies of demand letters, if any;
  14. Statement of damages or harm;
  15. Certification and verification requirements.

The prosecutor may require multiple copies and subscribed affidavits.


XL. Filing With NBI Cybercrime Division

Filing with the NBI Cybercrime Division is useful when:

  1. The respondent uses a fake account;
  2. Technical investigation is needed;
  3. Evidence must be preserved;
  4. Platform or device tracing may be required;
  5. The complainant needs assistance preparing evidence;
  6. There are related hacking, identity theft, threats, or online extortion issues.

The complainant should bring:

  1. Valid ID;
  2. Screenshots;
  3. URLs;
  4. Screen recordings;
  5. Printed copies;
  6. Device used to access the content;
  7. Names of witnesses;
  8. Details of respondent if known;
  9. Timeline;
  10. Copies of demand messages or replies.

NBI may evaluate the complaint, assist with evidence preservation, and refer or file appropriate complaints.


XLI. Filing With PNP Anti-Cybercrime Group

The PNP Anti-Cybercrime Group may also assist with cyber libel complaints, particularly where there are threats, harassment, fake accounts, identity theft, or ongoing online attacks.

The complainant should prepare the same evidence: screenshots, URLs, account details, witness statements, and timeline.

The PNP may conduct investigation and assist in preparing materials for the prosecutor.


XLII. Complaint-Affidavit: What It Should Contain

The complaint-affidavit is the core document.

It should clearly state:

  1. Who the complainant is;
  2. Who the respondent is;
  3. Relationship between parties, if any;
  4. Exact defamatory words or content;
  5. Translation if in Filipino, dialect, slang, or mixed language;
  6. Date and time of posting;
  7. Platform and URL;
  8. How the complainant discovered the post;
  9. Who saw the post;
  10. How the complainant is identified;
  11. Why the statement is false;
  12. Why it is defamatory;
  13. Why it was malicious;
  14. Harm suffered;
  15. Evidence attached.

The affidavit should be factual, chronological, and specific.

Avoid vague statements such as “Respondent cyberbullied me.” Instead, quote or describe the exact defamatory content.


XLIII. Sample Complaint-Affidavit Structure

A cyber libel complaint-affidavit may be organized as follows:

  1. Personal circumstances

    • Name, age, address, occupation, and identification.
  2. Respondent’s identity

    • Name, address, account name, relationship to complainant.
  3. Background

    • Brief facts explaining context.
  4. Defamatory publication

    • Exact date, platform, post content, screenshots.
  5. Identification

    • Explain how the post refers to the complainant.
  6. Publication

    • Explain who saw it and how it was accessible.
  7. Falsity

    • State why the accusation is false.
  8. Malice

    • Explain motive, prior conflict, lack of verification, or refusal to retract.
  9. Damage

    • State harm to reputation, work, business, family, or emotional well-being.
  10. Evidence

  • List annexes.
  1. Prayer
  • Request prosecution for cyber libel and other appropriate offenses.

XLIV. Sample Complaint-Affidavit Paragraph

On 10 March 2026, at around 8:30 p.m., I discovered that respondent Juan Dela Cruz, using the Facebook account “Juan DC,” posted a public statement on Facebook saying: “Huwag kayong magtiwala kay Maria Santos. Scammer yan at nagnakaw ng pera ng kliyente.” A screenshot of the post showing the account name, date, and URL is attached as Annex “A.”

The statement clearly refers to me because it mentions my full name, includes my profile photo, and tags my business page. Several clients and relatives saw the post and messaged me about it, as shown in Annexes “B” to “D.” The accusation is false. I have never stolen client money, and no criminal or civil case for theft or fraud has been filed against me. Respondent made the statement after I refused his demand for a refund on a completed transaction, showing malice and intent to damage my reputation.

This level of specificity is stronger than general accusations.


XLV. Annexes to the Complaint

Useful annexes include:

  1. Screenshot of post;
  2. Screenshot of URL;
  3. Screenshot of respondent profile;
  4. Screen recording file;
  5. Printed copy of post;
  6. Affidavit of witness who saw post;
  7. Messages from people who reacted to the post;
  8. Demand letter;
  9. Respondent’s reply;
  10. Proof of falsity, such as receipts, clearances, records, or certifications;
  11. Proof of damage, such as lost clients, HR notices, business cancellations, medical records, or public reactions;
  12. ID of complainant;
  13. NBI or PNP report, if any.

Label annexes clearly.


XLVI. Filing Fees and Notarization

Complaint-affidavits must usually be subscribed and sworn to before a prosecutor, authorized officer, or notary.

There may be filing, notarization, certification, printing, and copying costs. Requirements vary by office.

Bring valid government ID and multiple copies.


XLVII. Preliminary Investigation

After filing, the prosecutor conducts preliminary investigation.

The usual process includes:

  1. Filing of complaint-affidavit and supporting evidence;
  2. Prosecutor issues subpoena to respondent;
  3. Respondent files counter-affidavit;
  4. Complainant may file reply-affidavit;
  5. Respondent may file rejoinder, if allowed;
  6. Prosecutor evaluates probable cause;
  7. Resolution is issued;
  8. If probable cause exists, information is filed in court;
  9. If dismissed, complainant may seek reconsideration or other remedies.

Preliminary investigation is not yet trial. The prosecutor only determines probable cause.


XLVIII. Respondent’s Counter-Affidavit

The respondent may deny liability and raise defenses such as:

  1. Statement is true;
  2. Statement is opinion;
  3. No malice;
  4. Privileged communication;
  5. Complainant is not identifiable;
  6. No publication;
  7. Respondent did not post it;
  8. Account was hacked;
  9. Screenshot is fake;
  10. Complaint was filed out of time;
  11. Venue is improper;
  12. Statement was fair comment;
  13. Post was private and not seen by third parties;
  14. Complainant is using cyber libel to silence criticism.

The complainant should be prepared to respond with evidence.


XLIX. Probable Cause

Probable cause means there is sufficient reason to believe that a crime was committed and that the respondent is probably guilty.

The prosecutor does not need proof beyond reasonable doubt at this stage. But the complaint must be more than speculation.

A strong complaint shows:

  1. Exact defamatory content;
  2. Publication through a digital platform;
  3. Complainant’s identity;
  4. Respondent’s connection to the post;
  5. Malice or defamatory nature;
  6. Evidence of falsity or reputational harm;
  7. Proper venue and timely filing.

L. If the Prosecutor Dismisses the Complaint

If dismissed, the complainant may consider:

  1. Motion for reconsideration;
  2. Appeal or petition for review to the proper Department of Justice office, if available and appropriate;
  3. Filing a civil case for damages;
  4. Filing another complaint for different offenses if supported by facts;
  5. Correcting evidentiary gaps if dismissal was due to lack of proof;
  6. Settlement or non-litigation remedies.

The proper remedy depends on the reason for dismissal.


LI. If the Prosecutor Files the Case in Court

If probable cause is found, the prosecutor files an information in court.

The court process may include:

  1. Filing of information;
  2. Issuance of warrant or summons, depending on procedure and court action;
  3. Bail issues, if applicable;
  4. Arraignment;
  5. Pre-trial;
  6. Trial;
  7. Presentation of prosecution evidence;
  8. Presentation of defense evidence;
  9. Memoranda, if required;
  10. Judgment;
  11. Appeal, if any.

The complainant becomes a private complainant. The case is prosecuted in the name of the People of the Philippines by the public prosecutor, although private counsel may assist.


LII. Bail and Arrest Concerns

Cyber libel is a criminal offense. Once filed in court, the accused may need to post bail depending on the court’s action and procedural circumstances.

However, complainants should avoid using threats of arrest as leverage outside proper legal process. The court, not the complainant, controls warrants and bail.

Respondents should not ignore subpoenas, notices, or court papers.


LIII. Civil Liability in Cyber Libel

A cyber libel case may include civil liability.

The complainant may seek damages for:

  1. Injury to reputation;
  2. Emotional distress;
  3. Humiliation;
  4. Loss of clients or employment opportunities;
  5. Business damage;
  6. Medical or psychological treatment costs;
  7. Attorney’s fees;
  8. Other actual damages.

Civil claims may be pursued with the criminal case or separately, subject to procedural rules.


LIV. Evidence of Damages

To prove damages, the complainant may present:

  1. Messages from people who saw the post;
  2. Lost customer records;
  3. Cancelled contracts;
  4. HR notices;
  5. Business income decline;
  6. Medical or counseling records;
  7. Witness testimony;
  8. Public comments showing ridicule;
  9. Proof that family, friends, or colleagues believed the accusation;
  10. Receipts for expenses.

Reputation damage can be difficult to quantify, so evidence is important.


LV. Takedown of Defamatory Content

Filing a complaint does not automatically remove the online content.

Possible takedown steps include:

  1. Reporting the post to the platform;
  2. Sending a demand letter;
  3. Asking the respondent to remove it;
  4. Seeking court relief in serious cases;
  5. Asking law enforcement for preservation before takedown if evidence is needed;
  6. Requesting removal of reposts or mirrors.

Before requesting takedown, preserve evidence. Once removed, evidence may be harder to prove.


LVI. Platform Reports

Most platforms allow reporting for harassment, bullying, impersonation, privacy violation, or defamation.

Platform takedown is separate from legal liability. A platform may remove content even without a court case, or refuse to remove content despite a complaint.

Keep copies of platform reports and responses.


LVII. Preservation Requests

If content may be deleted or account identity is unknown, law enforcement may help preserve relevant digital data through proper legal channels.

A private complainant’s screenshots are useful but may not be enough where account ownership is disputed. Prompt investigation helps.


LVIII. Common Mistakes by Complainants

  1. Failing to save the URL;
  2. Taking cropped screenshots only;
  3. Not showing date and account name;
  4. Not preserving comments and shares;
  5. Filing without proving respondent owns the account;
  6. Confusing insult with libel;
  7. Filing in the wrong venue;
  8. Waiting too long;
  9. Posting retaliatory defamatory statements;
  10. Demanding money in a way that appears extortionate;
  11. Failing to show how the complainant is identifiable;
  12. Not showing that third parties saw the statement;
  13. Not translating slang or dialect;
  14. Filing cyber libel for mere private messages sent only to the complainant;
  15. Ignoring possible privilege or public interest defenses.

LIX. Common Mistakes by Respondents

  1. Ignoring prosecutor subpoena;
  2. Deleting posts without preserving evidence;
  3. Posting more attacks after receiving a demand letter;
  4. Claiming “opinion” while making factual accusations;
  5. Failing to prove truth;
  6. Using fake accounts;
  7. Sharing defamatory content repeatedly;
  8. Threatening the complainant;
  9. Apologizing ambiguously while repeating the accusation;
  10. Assuming online posts are not legally serious;
  11. Failing to consult counsel;
  12. Submitting unsworn explanations instead of proper counter-affidavit.

LX. Cyber Libel and Privacy Complaints

Some online attacks involve both cyber libel and privacy violations.

Examples:

  1. Posting a person’s ID with false accusations;
  2. Uploading medical records with defamatory comments;
  3. Posting private chats out of context;
  4. Publishing home address and accusing the person of fraud;
  5. Posting employer information to shame the person;
  6. Sharing intimate or sensitive information.

In such cases, the complainant may consider both:

  1. Cyber libel complaint;
  2. Data privacy complaint;
  3. Civil action for damages;
  4. Other cybercrime complaints depending on the content.

LXI. Cyber Libel and Violence Against Women or Gender-Based Online Abuse

Some defamatory online posts involve gender-based harassment, sexual accusations, threats, or intimate content.

Depending on the facts, other laws may also apply, such as those dealing with violence against women, photo or video voyeurism, safe spaces, threats, coercion, or privacy violations.

The complainant should not limit the analysis to cyber libel if the content includes sexual harassment, intimate images, stalking, or threats.


LXII. Cyber Libel and Employees

Workplace cyber libel may involve:

  1. Co-worker accusing another of theft in group chat;
  2. Former employee posting false allegations against employer;
  3. Employer posting accusations against former employee;
  4. HR-related accusations leaked online;
  5. Business competitors spreading false claims;
  6. Employees posting false accusations about supervisors.

Possible remedies may include:

  1. Cyber libel complaint;
  2. Labor complaint, if employment rights are affected;
  3. Company disciplinary process;
  4. Civil damages;
  5. Data privacy complaint;
  6. Internal grievance.

Workplace complaints made confidentially and in good faith to proper HR channels may be privileged, but public posting may not be.


LXIII. Cyber Libel and Businesses

A business, corporation, partnership, or sole proprietorship may be affected by defamatory posts.

Examples:

  1. “This shop sells fake products.”
  2. “This clinic scams patients.”
  3. “This contractor steals down payments.”
  4. “This restaurant uses spoiled meat.”
  5. “This school sells diplomas.”

A juridical entity may pursue remedies if the statement damages business reputation, trade, or goodwill. Authorized representatives may need board resolutions or proof of authority to file.


LXIV. Cyber Libel Against Deceased Persons

Defamatory statements against a deceased person may still affect the memory of the dead and reputation of heirs or family, depending on the law and facts. The proper complainant and remedy may require careful legal analysis.

If the post also defames living relatives, they may have their own cause of action.


LXV. Children and Minors

Cyber libel involving minors requires special care.

If a minor is the complainant, parents or guardians may act on the child’s behalf.

If a minor is the respondent, juvenile justice rules and child-sensitive procedures may apply.

Online posts involving minors may also trigger child protection, privacy, bullying, school discipline, or special protection laws.


LXVI. Cyberbullying vs. Cyber Libel

Cyberbullying is a broader concept. It may include insults, exclusion, threats, harassment, impersonation, humiliation, or spreading rumors online.

Cyber libel is more specific. It requires defamatory imputation, publication, identifiability, malice, and use of digital means.

A cyberbullying incident may or may not be cyber libel. It may instead involve threats, unjust vexation, child protection rules, school discipline, privacy violations, or other remedies.


LXVII. Cyber Libel vs. Threats

A threat is different from libel.

Example of threat:

“I will hurt you if you do not pay.”

Example of libel:

“He is a thief and scammer.”

A post may contain both. For example:

“This thief deserves to be beaten. I will expose him everywhere.”

This may support multiple complaints.


LXVIII. Cyber Libel vs. Unjust Vexation

Unjust vexation may involve conduct that annoys, irritates, torments, or disturbs another without necessarily imputing a defamatory fact.

If the online statement is insulting or harassing but not defamatory, unjust vexation or other offenses may be considered.


LXIX. Cyber Libel vs. Slander

Slander or oral defamation involves spoken defamatory words. Cyber libel involves written or similar defamatory publication online.

A livestream may raise issues because it includes spoken words transmitted online. The legal classification may depend on how it was recorded, published, and charged.


LXX. Cyber Libel vs. Data Privacy Violation

Cyber libel protects reputation from defamatory false imputations.

Data privacy law protects personal information from unauthorized processing, disclosure, and misuse.

Example:

  • Posting a true but private address may not be libel if no defamatory imputation is made, but it may be a privacy issue.
  • Posting a false accusation that a person is a thief may be cyber libel.
  • Posting a person’s ID with the caption “scammer” may be both.

LXXI. Cyber Libel and Settlement

Cyber libel cases may be settled depending on the parties and prosecutor or court stage.

Settlement may include:

  1. Deletion of post;
  2. Public apology;
  3. Retraction;
  4. Undertaking not to repost;
  5. Payment of damages;
  6. Confidentiality clause;
  7. Withdrawal or desistance, where procedurally considered;
  8. Mutual non-disparagement;
  9. Clarification post;
  10. Platform takedown.

However, criminal liability is not always automatically extinguished by settlement. The prosecutor or court may still act depending on stage and law.

A desistance affidavit may influence the case but does not always guarantee dismissal.


LXXII. Sample Retraction and Apology

I retract my previous online statement posted on __________ regarding __________. I acknowledge that the statement was inaccurate and should not have been published. I apologize to __________ for the harm and distress caused. I have removed the post and undertake not to repeat or republish the same accusation.

A clear apology is better than a vague statement such as “Sorry if you were offended.”


LXXIII. Sample Undertaking

I undertake not to publish, repost, share, or cause the publication of any defamatory statement against __________, including accusations of __________, unless made in a proper legal proceeding and supported by lawful evidence. I further undertake to delete existing posts and request removal of reposts within my control.


LXXIV. Risks of Filing Cyber Libel

A complainant should consider risks before filing:

  1. The respondent may raise truth and expose evidence;
  2. The dispute may become public;
  3. The respondent may file counterclaims;
  4. Litigation may be costly and slow;
  5. Criminal prosecution requires proof;
  6. Free speech defenses may apply;
  7. Public interest issues may weaken the complaint;
  8. The complaint may be criticized as harassment if used to silence legitimate criticism.

Cyber libel should be filed when the statement is truly defamatory, false, malicious, and supported by evidence.


LXXV. Risks for Respondents

A respondent accused of cyber libel should take the matter seriously.

Possible consequences include:

  1. Criminal prosecution;
  2. Bail and court appearances;
  3. Civil damages;
  4. Legal expenses;
  5. Employment consequences;
  6. Professional discipline;
  7. Reputational harm;
  8. Travel or clearance complications depending on case status;
  9. Settlement obligations;
  10. Court judgment.

Online speech can create real legal consequences.


LXXVI. Practical Checklist for Complainants

Before filing, prepare:

  1. Exact defamatory statement;
  2. Screenshots with date, time, account, and URL;
  3. Screen recording;
  4. Respondent profile screenshots;
  5. Proof respondent owns or controls the account;
  6. Proof complainant is identifiable;
  7. Proof third parties saw the statement;
  8. Witness affidavits;
  9. Proof statement is false;
  10. Proof of malice;
  11. Proof of damage;
  12. Demand letter, if sent;
  13. Valid ID;
  14. Chronology of events;
  15. Multiple copies of complaint-affidavit.

LXXVII. Practical Checklist for Respondents

If accused, prepare:

  1. Copy of the complained post;
  2. Full context;
  3. Proof of truth, if applicable;
  4. Proof that statement was opinion;
  5. Proof of good faith;
  6. Proof of privileged communication;
  7. Evidence that complainant was not identifiable;
  8. Evidence no third party saw it, if applicable;
  9. Evidence account was hacked, if true;
  10. Witness affidavits;
  11. Retraction or apology, if appropriate;
  12. Counter-affidavit;
  13. Legal counsel for serious cases.

LXXVIII. Frequently Asked Questions

1. Can I file cyber libel for a Facebook post?

Yes, if the post contains a defamatory imputation, identifies you, was published to others, was malicious, and can be linked to the respondent.

2. Is calling someone a “scammer” cyber libel?

It can be, especially if posted online, directed at an identifiable person, false, malicious, and seen by others.

3. Is a private message cyber libel?

If sent only to you, publication to a third person may be lacking. If sent to a group chat or other people, it may be cyber libel.

4. Do I need a lawyer to file?

You may file a complaint-affidavit yourself, but legal counsel is strongly advisable, especially if the case is serious, evidence is complex, or the respondent is represented.

5. Can I file if the post was deleted?

Yes, if you preserved evidence such as screenshots, screen recordings, URLs, witnesses, or law enforcement records.

6. Can I file against a dummy account?

You may file and request cybercrime investigation, but you need evidence identifying or linking the account to a real person.

7. Is truth a defense?

Truth may be a defense, especially if published with good motives and justifiable ends. The respondent must be able to prove it.

8. Is opinion protected?

Generally, honest opinion is more protected, but calling someone a criminal or dishonest person may still be defamatory if it implies false facts.

9. Can a business file cyber libel?

Yes, if the defamatory statement injures its trade, business reputation, or goodwill. Proper authorization is needed.

10. Can I demand takedown before filing?

Yes. Preserve evidence first, then send a demand or report to the platform.

11. Can I file both cyber libel and data privacy complaint?

Yes, if the facts support both, such as posting personal information with defamatory accusations.

12. What if the post is true but embarrassing?

Truth may be a defense, but context, motive, public interest, and privilege matter. Privacy issues may still arise if sensitive personal data was disclosed.

13. Can sharing a defamatory post make me liable?

Possibly, especially if you endorse, repeat, or amplify the defamatory accusation.

14. What if I apologized?

An apology may help settlement or mitigation but does not automatically erase liability.

15. What if the statement was made during a heated argument?

Heat of anger may explain motive, but it does not automatically excuse defamatory publication.


LXXIX. Best Practices Before Posting Online

To avoid cyber libel liability:

  1. Verify facts before posting.
  2. Avoid accusing people of crimes unless legally established.
  3. Use neutral factual language.
  4. Separate opinion from fact.
  5. Avoid posting personal data.
  6. Use proper complaint channels.
  7. Avoid public shaming.
  8. Do not repost unverified accusations.
  9. Avoid edited screenshots without context.
  10. Think before naming a person or business.

Safer wording:

“I had a bad experience with this transaction and am seeking a refund.”

Riskier wording:

“This person is a thief and scammer.”


LXXX. Best Practices Before Filing a Complaint

Before filing:

  1. Preserve evidence immediately.
  2. Confirm the post identifies you.
  3. Confirm others saw it.
  4. Confirm the statement is false or malicious.
  5. Consider whether it is opinion or privileged communication.
  6. Send a demand letter if settlement is possible.
  7. Organize evidence chronologically.
  8. Prepare witness affidavits.
  9. Consult counsel if possible.
  10. File promptly.

LXXXI. Conclusion

Filing a cyber libel complaint in the Philippines requires more than hurt feelings or online disagreement. The complainant must show a defamatory imputation, publication to third persons, identification of the complainant, malice, use of digital means, and a link between the respondent and the online publication.

The strongest complaints are built on clear screenshots, URLs, screen recordings, witness affidavits, proof of falsity, proof of publication, and evidence of malice. The process may begin with evidence preservation, demand letter, NBI or PNP cybercrime assistance, or direct filing of a complaint-affidavit before the prosecutor.

Cyber libel law protects reputation, but it must be balanced with freedom of expression, fair comment, truth, privileged communication, and public interest. A person who has been falsely and maliciously attacked online has remedies. A person who posts online should understand that digital words are not legally weightless. Once published, an online accusation can become evidence in a criminal case.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.