How to File a Cyberbullying Complaint Under RA 10627 and the Cybercrime Law (Philippines)

Practical guide for students, parents, educators, and citizens in the Philippines. This is general information and not a substitute for legal advice.


1) The Legal Landscape at a Glance

RA 10627 (Anti-Bullying Act of 2013)

  • Requires all elementary and secondary schools (public and private) to adopt anti-bullying policies that explicitly cover cyberbullying.
  • Creates school-based procedures for reporting, investigation, intervention, and discipline.
  • Schools that fail to implement compliant policies can be administratively sanctioned by the Department of Education (DepEd).

RA 10175 (Cybercrime Prevention Act of 2012)

  • Penalizes certain online offenses. Cyberbullying itself isn’t a single offense—but the harmful conduct often maps to specific crimes, e.g.:

    • Cyber libel (defamatory posts) anchored on the Revised Penal Code as carried out through ICT.
    • Computer-related identity theft or data interference.
    • Online gender-based harassment may also be addressed under other laws (see “Related laws” below).

Related laws commonly invoked with cyberbullying situations

  • RA 7610 (child abuse), when acts cause psychological abuse to minors.
  • RA 9775 (Anti-Child Pornography), if sexualized images of a child are involved.
  • RA 9995 (Anti-Photo and Video Voyeurism), for non-consensual intimate images.
  • RA 9262 (VAWC), for abuse—including online—against women and their children by an intimate partner.
  • RA 11313 (Safe Spaces Act), covering online gender-based sexual harassment.
  • Data privacy issues (unauthorized disclosure of personal data) may engage the Data Privacy Act.

Key idea: For students in basic education, start with the school procedure under RA 10627. For criminal conduct, or if you are not a K–12 student, use RA 10175 pathways via law enforcement and prosecutors. Many cases pursue both tracks.


2) Who May File and Against Whom

  • Victim (minor or adult) or their parent/guardian.
  • School personnel who witness or receive reports.
  • Any person with knowledge (e.g., classmates) may report to the school; disciplinary action, however, cannot rely solely on anonymous reports.
  • Respondents may be students, school staff, or non-students (outsiders) depending on context; outside actors are typically pursued under criminal/other laws.

3) Evidence: What to Preserve Immediately

  1. Screenshots of posts, messages, comments, profiles, timestamps, and full URLs.
  2. Device captures: Take screen recordings where relevant (showing navigation to the post).
  3. Context evidence: group chats, threads, reposts, tags, reaction counts.
  4. Identity links: profile IDs/handles, email addresses, phone numbers, user IDs used to contact you.
  5. Witness statements: names/contact info of classmates, teachers, or friends who saw the content.
  6. Impact documents: medical/psychological reports, guidance counselor notes, school incident logs.
  7. Chain of custody: save original files; back up to a drive; note date/time of capture; avoid editing.
  8. Do not engage further with the bully (prevents escalation and helps legally).

Tip: Preserve both content and metadata (date/time/URL). If content may be taken down, preserve first; you can request takedown after you’ve secured copies.


4) Path A — Filing Under RA 10627 (K–12 Schools)

When to use: The victim is a K–12 student and the bullying is connected to school, students, or school activities—even if the acts happen off-campus or online.

Step-by-Step (School Procedure)

  1. Report to the School Head or the Child Protection Committee (CPC).

    • Schools must have a written anti-bullying policy and a CPC.
    • Use the school’s incident form if available; otherwise, submit a written narrative (see template below).
  2. Immediate Measures by the School.

    • Safeguard the child (seating changes, schedule adjustments, supervision).
    • Notify parents/guardians of both parties.
    • Stop ongoing harassment (e.g., require deletion, restrict device use on campus as policy allows).
  3. Investigation.

    • CPC or designated officials gather statements, review evidence, and assess whether the acts fall under bullying/cyberbullying.
    • Anonymous tips may trigger inquiry, but sanctions require verified evidence.
  4. Interventions and Discipline.

    • Graduated sanctions (from admonition to suspension/expulsion in private schools), consistent with the school’s student handbook and due process.
    • Support services: counseling, mediation (when appropriate), safety plan.
  5. Documentation and Reporting.

    • The school must keep records, inform the Division Office when required, and monitor recurrence.
    • Non-compliance with RA 10627 policy/IRR can lead to administrative sanctions on the school.

Escalation: If the school fails or refuses to act, or the conduct constitutes a crime, proceed with Path B (criminal/cybercrime) and consider reporting the school’s non-compliance to DepEd’s division/regional office.


5) Path B — Filing a Cybercrime/Criminal Complaint (RA 10175 and related laws)

When to use:

  • The acts constitute crimes (e.g., defamatory posts, threats, non-consensual intimate images, identity theft).
  • The respondent is outside the school system or the conduct is serious.

Option 1: Law Enforcement Intake (Recommended for technical preservation)

  1. Go to the PNP Anti-Cybercrime Group (ACG) or NBI Cybercrime Division.
  2. Bring valid ID, sworn statement (or be ready to execute one), and evidence (digital copies).
  3. Request technical assistance (e.g., trace requests, digital forensics).
  4. They may conduct initial investigation and refer/coordinate with the Office of the City/Provincial Prosecutor.

Option 2: Direct Filing with the Prosecutor’s Office

  1. Prepare a Complaint-Affidavit describing:

    • Parties (with ages if minors), relationship, and jurisdictional facts;
    • Specific online acts, dates, platforms, URLs;
    • Why conduct is unlawful (cite provisions reasonably);
    • Damages suffered (emotional, reputational, academic);
    • Witnesses and evidence list (Annexes).
  2. Attach Annexes: screenshots/printouts with URLs and timestamps, device photos, certificate of e-mail/FB page ownership (if relevant), medical/psych notes.

  3. Verification and notarization: Sign before a prosecutor or notary, as required.

  4. Prosecutor will issue subpoena for counter-affidavits; case proceeds to resolution (dismissal or filing of Information in court).

  5. If probable cause is found, an Information is filed and the court process begins. Law enforcement may seek warrants for computer data and other digital evidence during investigation (handled by trained units).

Venue/Jurisdiction basics: Generally, anywhere an element occurred, or where the content was accessed/published and caused damage, can be proper. If unsure, file with law enforcement; they will route it appropriately.


6) Parallel and Protective Remedies

  • Platform takedowns: Use in-app/reporting tools to remove abusive content after preserving proof.
  • Protection Orders (if intimate partner or family-related) under RA 9262—Barangay or court may issue BPO/TPO/PPO.
  • School safety measures: schedule/class changes, monitored pick-ups, device restrictions in campus.
  • Civil actions: damages for defamation, invasion of privacy, or emotional distress.
  • Data Privacy complaints (if personal data was misused or disclosed without basis).
  • Counseling and psychosocial support through school or LGU offices.

7) Do’s and Don’ts

Do

  • Preserve evidence before takedown.
  • Keep a timeline of incidents.
  • Use neutral language in complaints; stick to facts.
  • Seek help from guidance counselors or psychologists for minors.

Don’t

  • Retaliate or publicly “name and shame” (may expose you to counter-claims).
  • Alter screenshots or crop out identifying data.
  • Coordinate stings or unauthorized “tracing” yourself.

8) What Schools Must Have (Checklist for Compliance with RA 10627)

  • A written Anti-Bullying Policy covering cyberbullying (definitions, prohibited acts).
  • Clear reporting channels (CPC focal persons, email/box/hotline).
  • Time-bound investigation steps and due process for both parties.
  • Intervention programs (counseling, peer mediation, restorative practices when suitable).
  • Record-keeping and periodic reporting to DepEd as required.
  • Orientation for students, staff, and parents every school year.
  • Integration into student handbooks and discipline codes.

9) Sample Templates (You May Copy/Paste and Adapt)

A) School Incident Report (RA 10627)

[Date]

[Name of School Head/Child Protection Committee]
[School Name]
[Address]

Subject: Report of Cyberbullying Incident under RA 10627

I, [Name], [parent/guardian/student/teacher], hereby report a cyberbullying incident involving:
Victim: [Name, Grade/Section, Age]
Alleged Bully/Bullies: [Name(s), Grade/Section, if known]

Facts:
- On [date/time], at [platform/app], user [handle/URL] posted/sent [describe content].
- The content included [insults/threats/defamatory statements/edited images/etc.].
- Screenshots and links are attached as Annexes “A–__”.
- Impact: [anxiety, missed classes, grade decline, etc.]

Requested Actions:
- Immediate safety measures (specify).
- Formal investigation by the CPC pursuant to the school’s Anti-Bullying Policy.
- Coordination with parents/guardians and appropriate interventions.

I declare the truth of the foregoing and am willing to cooperate with the investigation.

[Signature over Printed Name]
[Contact Information]

B) Complaint-Affidavit (Criminal/Cybercrime)

REPUBLIC OF THE PHILIPPINES )
[City/Province]                ) S.S.

COMPLAINT-AFFIDAVIT

I, [Name], [nationality], of legal age, [civil status], with address at [address], after having been duly sworn, depose and state:

1. I am the victim of cyberbullying in the form of [cyber libel/identity theft/online harassment], committed by [Name/Unknown].
2. On [date], at [time], using [platform/app/URL], respondent(s) posted/sent the following [statements/images], which are false/defamatory/threatening: [quote or describe].
3. The acts were publicly accessible to [followers/public], causing me [humiliation/anxiety/ reputational damage]. Attached as Annexes “A–__” are screenshots with timestamps and URLs, chat exports, and device logs.
4. [If known:] I can identify Respondent as [basis for identification].
5. I request the filing of appropriate charges under [cite provisions reasonably, e.g., RA 10175 in relation to Article 355 RPC for cyber libel; RA 9995; RA 9775; RA 11313; RA 7610; RA 9262 (if applicable)].
6. I am willing to testify and to turn over my devices or copies for forensic examination if required.

[Signature over Printed Name]
Affiant

SUBSCRIBED AND SWORN to before me this [date] at [place], affiant exhibiting [valid ID].

C) Preservation/Takedown Request to Platform (After Evidence Capture)

[Date]

Legal/Support Team
[Platform]
Re: Request to remove harmful content and preserve related data

I am reporting harmful content targeting [me/my minor child], accessible at: [URL]. 
Please remove/disable access and preserve associated logs/metadata pending investigation.

Reporter: [Name, contact]
Attachments: Screenshots, report numbers (police/NBI if any)

10) Possible Outcomes and Penalties (Illustrative)

  • School discipline under student handbooks: written reprimand, guidance interventions, suspension, or (in private schools) exclusion/expulsion for grave offenses, with due process.
  • Criminal liability under RA 10175 and related laws (e.g., cyber libel, identity theft, online gender-based harassment, child pornography, voyeurism). Penalties vary by offense and may include fines and imprisonment.
  • Civil liability (damages, injunctions).
  • Administrative consequences for schools that fail to implement RA 10627 policies.

11) Practical Scenarios

  • Group chat “roasting” a classmate with doctored images → Report under RA 10627; consider cyber libel and child abuse if severe.
  • Non-consensual sharing of a minor’s intimate photo → Possible RA 9775 and RA 9995, plus school action if students are involved.
  • Impersonation account posting insultsIdentity theft/computer-related offenses under RA 10175; school action if it targets a student.

12) Frequently Asked Questions

Q: Can I file both with the school and with law enforcement? Yes. School processes do not bar criminal or civil actions.

Q: What if I don’t know who’s behind the account? File with PNP-ACG/NBI. They can request legal process to obtain subscriber and traffic data from platforms/ISPs.

Q: Should I confront the bully online? No. Preserve evidence and use official channels.

Q: What if the school refuses to accept my report? Submit a written report and obtain a receiving copy. You may escalate to the DepEd Division/Regional Office and pursue the criminal route.

Q: Can I be liable for false accusations? Knowingly false reports may expose you to counter-claims (e.g., libel, perjury). Stick to facts and evidence.


13) Quick Checklists

For Victims/Parents

  • Screenshots with timestamps and URLs saved
  • Written timeline of incidents
  • Witness names and contact details
  • School report filed (if K–12)
  • Law enforcement/prosecutor filing (if criminal)
  • Counseling/support accessed

For Schools

  • Policy explicitly covers cyberbullying
  • CPC and clear reporting channels in place
  • Time-bound investigation and due process
  • Interventions documented; parents notified
  • Records kept and reports submitted as required

14) Final Notes

  • RA 10627 gives students a fast, school-centered response to cyberbullying.
  • RA 10175 and related laws address the criminal and civil dimensions, especially for serious, persistent, or out-of-school perpetrators.
  • The strongest cases combine good evidence preservation, prompt reporting, and appropriate legal framing (defamation, identity theft, child protection, voyeurism, or online gender-based harassment as applicable).

If you want, tell me your situation (anonymized details are fine), and I can map your facts to the exact provisions and draft filings tailored to you.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.