I. Introduction
Forged documents are no longer limited to paper contracts, handwritten signatures, printed certificates, or notarized instruments. In the digital setting, forged documents may appear as scanned files, edited PDFs, fake IDs, altered screenshots, falsified e-mails, digitally manipulated contracts, fabricated receipts, forged electronic signatures, fake government documents, fake school records, fraudulent bank documents, or documents uploaded to online platforms to deceive another person.
In the Philippines, a forged document may give rise to several possible legal actions. It may involve falsification under the Revised Penal Code, cybercrime under the Cybercrime Prevention Act, fraud or estafa, identity theft, data privacy violations, electronic evidence issues, or administrative complaints depending on the facts.
This article explains how to file a cybercrime-related complaint for forged documents online in the Philippine context, what laws may apply, what evidence to preserve, where to report, what happens after filing, and what practical precautions complainants should observe.
II. What Is a Forged Document?
A forged document is a document that has been falsely made, altered, simulated, manipulated, or presented as genuine when it is not. Forgery may involve making a fake document from scratch, changing an existing document, copying or simulating a signature, misusing a seal, inserting false information, or making it appear that a person or institution issued, signed, approved, received, or authenticated something when they did not.
Examples include:
- A fake deed of sale;
- A falsified employment certificate;
- A forged school diploma or transcript;
- A fake government ID;
- A manipulated screenshot of a payment;
- A fake bank transfer receipt;
- A digitally altered contract;
- A forged electronic signature;
- A fake notarized document;
- A falsified medical certificate;
- A fake authorization letter;
- An altered land title or tax declaration;
- A fabricated business permit;
- A fake certificate of employment and compensation;
- A false affidavit;
- A forged waiver, consent form, or undertaking;
- A fake court, police, barangay, or government document;
- A manipulated invoice or official receipt;
- A falsified loan document;
- A fake online seller receipt used to obtain payment or avoid liability.
A document may be forged even if it is digital, scanned, photocopied, or electronically transmitted. What matters is whether it was falsely made or altered and used or intended to be used as genuine.
III. When Does Forgery Become a Cybercrime?
Not every forged document automatically becomes a cybercrime. A forged document becomes cybercrime-related when a computer system, internet platform, digital device, online account, electronic communication, or digital file is used as part of the offense.
Cybercrime may be involved when the forged document was:
- Created using digital tools;
- Edited or manipulated as a digital file;
- Sent through e-mail, messaging apps, or social media;
- Uploaded to an online platform;
- Used to open an online account;
- Used to obtain loans, credit, money, goods, or services online;
- Used to impersonate another person online;
- Used in an online scam;
- Used to access a digital account or service;
- Used to mislead a government, bank, school, employer, or business through electronic means;
- Used with fake digital signatures or electronic records;
- Stored, transmitted, or published through a computer system.
The cybercrime element usually comes from the use of information and communications technology. If the falsification happened only on paper and was never connected to digital transmission, an ordinary criminal complaint for falsification or fraud may be more appropriate. If the forged document was created, transmitted, or used online, cybercrime authorities may become involved.
IV. Possible Philippine Laws Involved
A forged document online may implicate several laws. The exact legal classification depends on the facts, the type of document, how it was forged, who used it, and what damage was caused.
A. Revised Penal Code: Falsification of Documents
The Revised Penal Code punishes falsification of public, official, commercial, and private documents. Acts of falsification may include counterfeiting or imitating signatures, causing it to appear that persons participated in an act when they did not, making untruthful statements in a narration of facts, altering true dates, making alterations or intercalations in a genuine document, issuing documents in an unauthorized manner, or using falsified documents.
The kind of document matters:
- Public document — a document notarized or issued with public authority;
- Official document — a document issued by a public officer in official functions;
- Commercial document — a document used in trade or commerce, such as invoices, receipts, checks, or business records;
- Private document — a document made by private persons without public or commercial character.
Falsification of public or official documents is generally treated more seriously than falsification of private documents.
B. Cybercrime Prevention Act
The Cybercrime Prevention Act may apply when the offense is committed by, through, or with the use of information and communications technology. It recognizes cyber-related offenses and may also affect crimes under the Revised Penal Code when committed through a computer system.
In practical terms, if the falsified document was created, transmitted, uploaded, sent, or used online, the complainant may frame the case as a cybercrime-related falsification, computer-related fraud, identity misuse, online scam, or related offense depending on the circumstances.
C. Computer-Related Forgery
Computer-related forgery may involve the input, alteration, or deletion of computer data resulting in inauthentic data, with intent that it be considered or acted upon for legal purposes as if it were authentic.
This is especially relevant when the forged item exists as data: a PDF, digital certificate, electronic record, edited transaction slip, falsified database entry, electronic form, e-mail confirmation, or digitally altered image.
Examples:
- Editing a PDF contract to insert a fake signature;
- Fabricating an electronic receipt to claim payment;
- Altering a digital certificate to make it appear valid;
- Creating a fake employment record and submitting it online;
- Modifying an online form to create false approval;
- Uploading a fake ID to pass verification.
D. Computer-Related Fraud
Computer-related fraud may be involved when the forged document is used to obtain money, property, credit, services, access, or benefit through deceit using a computer system.
Examples:
- Sending a fake payment confirmation to make a seller release goods;
- Using a forged ID to open an online wallet account;
- Uploading falsified documents to obtain a loan;
- Using a fake invoice to collect payment;
- Sending a forged authorization letter by e-mail to withdraw funds;
- Using falsified corporate documents to deceive a business partner.
E. Identity Theft or Misuse of Personal Information
If the forged document contains another person’s name, signature, photograph, ID number, address, account details, or other identifying information, the case may also involve identity theft, unauthorized use of personal data, or violations of data privacy rules.
Examples:
- Using another person’s ID photo in a fake document;
- Forging someone’s signature on a digital contract;
- Creating a fake authorization letter under another person’s name;
- Using someone else’s identification documents for online verification;
- Submitting another person’s personal information in an online application.
F. Estafa or Fraud
If the forged document was used to deceive another person and cause damage, the case may also involve estafa or fraud. The forged document may be the means by which the deceit was carried out.
Examples:
- Fake bank transfer receipt used to obtain goods;
- Fake lease contract used to collect rent or deposit;
- Forged authority to sell property;
- Fake employment certificate used to obtain a loan;
- Fake shipping document used in an online selling scam.
G. Data Privacy Violations
If personal information was collected, used, disclosed, altered, or processed without authority in connection with the forged document, a complaint may also be possible under data privacy laws. This may apply when the offender misuses IDs, signatures, photos, addresses, contact numbers, financial information, or sensitive personal data.
H. Electronic Commerce and Electronic Evidence Issues
Digital documents and electronic signatures may have legal recognition, but their authenticity may be contested. When a forged document is electronic, questions may arise regarding authorship, integrity, timestamps, metadata, digital signatures, audit logs, device ownership, IP addresses, and chain of custody.
The complainant must be prepared to show why the document is fake and how it was used.
V. Where to File a Complaint
A complainant may consider several possible reporting channels depending on the situation.
A. Philippine National Police Anti-Cybercrime Group
Cybercrime-related complaints may be filed with the appropriate cybercrime unit of the police. This is often suitable for online scams, forged digital documents, fake online identities, cyber fraud, phishing, account misuse, or forged documents transmitted electronically.
B. National Bureau of Investigation Cybercrime Division
The NBI may also receive cybercrime complaints, particularly when the matter involves online fraud, identity misuse, complex digital evidence, large-scale scams, or cases requiring specialized investigation.
C. Local Police Station
A local police station may receive the initial report, record the matter in the blotter, assist in preparing documents, and refer the complainant to the appropriate cybercrime unit if needed.
D. Office of the City or Provincial Prosecutor
A criminal complaint may ultimately be filed before the prosecutor’s office, especially when the complainant already has evidence and affidavits. The prosecutor determines whether probable cause exists to file a case in court.
E. Barangay
Barangay conciliation may apply only in limited cases involving disputes between individuals who reside in the same city or municipality and where the offense is within the scope of barangay conciliation rules. However, serious cybercrime, fraud, identity theft, or falsification involving public documents may not be suitable for barangay settlement.
F. Regulatory Agencies or Institutions
Depending on the forged document, a report may also be made to the concerned agency or institution, such as a bank, school, employer, government office, online platform, payment service provider, insurance company, or professional regulatory body.
VI. Can a Cybercrime Case for Forged Documents Be Filed Online?
In many situations, the initial report may be made online. However, the full complaint process may still require personal appearance, sworn affidavits, physical submission of evidence, device inspection, notarization, or attendance at investigation proceedings.
Online filing may involve:
- Sending an initial complaint by e-mail;
- Filling out an official online complaint form;
- Contacting a cybercrime unit through official channels;
- Submitting evidence electronically;
- Requesting an appointment for complaint filing;
- Reporting to a platform or institution;
- Filing a police blotter online or requesting assistance;
- Coordinating with an investigator before personal filing.
An online report is usually not the same as a fully filed criminal case. It is often the first step toward formal investigation.
VII. Difference Between Online Reporting and Filing a Criminal Complaint
It is important to distinguish between reporting an incident and filing a criminal complaint.
A. Online Reporting
Online reporting means informing authorities about the incident. It may result in acknowledgment, investigation, preservation request, referral, or scheduling.
B. Police Blotter
A police blotter records that an incident was reported. It does not automatically mean that a criminal case has been filed in court.
C. Cybercrime Complaint
A cybercrime complaint may involve submission of a complaint sheet, affidavits, evidence, digital files, and identification documents to a cybercrime unit.
D. Prosecutor’s Complaint
A criminal complaint before the prosecutor is the formal process that may lead to preliminary investigation and, eventually, the filing of an Information in court if probable cause is found.
VIII. Step-by-Step Guide to Filing a Cybercrime Case for Forged Documents Online
Step 1: Determine the Nature of the Forged Document
Identify exactly what document was forged.
Ask:
- Is it a public, official, commercial, or private document?
- Is it a scanned copy, PDF, photo, screenshot, e-mail, or online form?
- Was a signature forged?
- Was a document altered?
- Was a fake document created from scratch?
- Was it notarized or made to appear notarized?
- Was it submitted to a bank, employer, school, government agency, or online platform?
- Was it used to obtain money, property, access, approval, or advantage?
- Was another person’s identity used?
- Was the document transmitted or used online?
The answers help determine whether the case is falsification, cybercrime, fraud, identity theft, data privacy violation, or a combination.
Step 2: Preserve the Digital Evidence Immediately
Digital evidence can disappear quickly. The person who used the forged document may delete messages, remove uploads, deactivate accounts, change usernames, edit files, or block the complainant.
Preserve:
- Original files received;
- E-mails with full headers, if available;
- Message threads;
- Screenshots showing date, time, account name, and URL;
- Downloaded PDFs or attachments;
- Metadata, if available;
- File properties;
- URLs and profile links;
- Transaction records;
- Bank or e-wallet references;
- Delivery or shipping records;
- Platform notifications;
- Login alerts;
- IP logs, if available through the platform or institution;
- Names and contact details of witnesses;
- Records from the institution that supposedly issued the document.
Do not rely only on cropped screenshots. Keep the original file and the device where the file was received or accessed.
Step 3: Avoid Editing or Altering the Evidence
Do not rename files unnecessarily, edit screenshots, crop images, add markings, forward compressed versions, or delete messages. If you need to make annotations, make separate copies and preserve the originals.
For evidentiary purposes, the original digital file is usually stronger than a screenshot. An investigator may need to examine timestamps, metadata, file origin, e-mail headers, device logs, account activity, or platform records.
Step 4: Verify the Document With the Supposed Issuer
When possible, obtain confirmation from the person, institution, office, or company whose name appears on the document.
Examples:
- Ask the alleged signatory whether the signature is genuine;
- Ask the school if the transcript or diploma is authentic;
- Ask the bank if the receipt or certification is genuine;
- Ask the notary if the notarization was actually made;
- Ask the company if the employment certificate was issued;
- Ask the government agency if the document number exists;
- Ask the platform if the document was uploaded by a particular account.
A written certification or denial from the supposed issuer can be powerful evidence.
Step 5: Identify the Person Who Used or Uploaded the Forged Document
The offender may be:
- The person who created the forged document;
- The person who used the document;
- The person who uploaded the document;
- The person who sent the document;
- The person who benefited from the document;
- A person who conspired with others;
- An unknown person using a fake account.
Even if the actual creator is unknown, the person who knowingly used the forged document may still be legally liable.
If the suspect is unknown, preserve identifiers such as usernames, mobile numbers, e-mail addresses, account numbers, wallet IDs, IP logs, profile links, bank accounts, transaction IDs, and delivery addresses.
Step 6: Prepare a Chronological Narrative
The complaint should tell the story clearly and in order.
Include:
- How you discovered the forged document;
- Who sent, uploaded, presented, or used it;
- When and where it was used;
- How it was transmitted online;
- Why you believe it is forged;
- Who the real issuer or signatory is;
- What damage or risk resulted;
- What evidence supports your claim;
- What action you are requesting.
A clear narrative helps investigators understand the elements of falsification, cybercrime, fraud, and identity misuse.
Step 7: Prepare Your Complaint-Affidavit
A complaint-affidavit is often required for formal filing. It is a sworn statement narrating the facts based on personal knowledge and attaching supporting documents.
A complaint-affidavit should generally include:
- The complainant’s identity and address;
- The respondent’s identity, if known;
- A detailed narration of facts;
- Description of the forged document;
- Explanation of why the document is false;
- Explanation of how the document was used online;
- Damage suffered or risk created;
- List of attached evidence;
- Prayer or request for investigation and prosecution;
- Signature before an authorized officer or notary, if required.
The affidavit must be truthful. False statements in an affidavit may create legal liability.
Step 8: Contact the Appropriate Cybercrime Office Through Official Channels
The complainant may contact the appropriate cybercrime unit through official e-mail, online form, hotline, or official page. The initial message should be concise and complete.
The message may state:
- The nature of the complaint;
- The forged document involved;
- How it was created, sent, uploaded, or used online;
- The suspect’s identity or online identifiers;
- Evidence available;
- Whether there is urgent harm;
- Request for instructions on formal filing.
Attach only what is necessary at first, especially if documents contain sensitive personal data. Ask how evidence should be submitted securely.
Step 9: Submit Evidence in the Required Format
Cybercrime offices may request digital and printed copies. Common requirements may include:
- Complaint-affidavit;
- Valid government-issued ID;
- Printed screenshots;
- Digital copies stored in a USB drive or other medium;
- URLs and profile links;
- Transaction records;
- E-mails with headers;
- Certification from the real issuer;
- Witness affidavits;
- Police blotter, if available;
- Proof of damage;
- Proof of ownership or identity;
- Device used to receive or access the forged document.
When submitting screenshots, include full-page screenshots where possible, not only cropped portions.
Step 10: Secure a Receiving Copy, Reference Number, or Case Number
After submission, ask for proof that the complaint or report was received.
This may include:
- A receiving stamp;
- A reference number;
- A complaint number;
- A blotter number;
- An acknowledgment e-mail;
- The name and rank of the receiving officer;
- Instructions for follow-up.
Keep copies of everything submitted.
Step 11: Cooperate With Investigation
After filing, investigators may ask for:
- Clarificatory questions;
- Additional screenshots or files;
- Original device for examination;
- Witness information;
- Certifications from institutions;
- Bank or platform records;
- More affidavits;
- Personal appearance;
- Coordination with the prosecutor;
- Attendance at inquest or preliminary investigation, if applicable.
The complainant should respond promptly and preserve all communication.
Step 12: Follow Through With Prosecutorial Proceedings
If the matter proceeds beyond investigation, a complaint may be referred to or filed with the prosecutor’s office. The prosecutor may require counter-affidavits from respondents, reply-affidavits from complainants, and additional evidence.
The prosecutor will determine whether there is probable cause. If probable cause exists, the case may be filed in court. If not, the complaint may be dismissed, subject to available remedies.
IX. Evidence Needed for a Strong Case
A strong case usually requires evidence of both forgery and cyber use.
A. Evidence That the Document Is Forged
This may include:
- Denial by the alleged signatory;
- Certification from the supposed issuing office;
- Comparison with genuine documents;
- Proof that the document number does not exist;
- Proof that the signature is fake;
- Proof that the notarial entry is fake;
- Expert examination, if needed;
- Records showing the document was never issued;
- Internal logs from the institution;
- Testimony of the person whose signature or identity was used.
B. Evidence That the Document Was Used Online
This may include:
- E-mail transmission records;
- Messaging app screenshots;
- Upload confirmations;
- Platform notifications;
- Online application records;
- Account activity logs;
- URLs;
- Cloud storage links;
- Social media posts;
- Digital submission receipts;
- IP or login logs, where obtainable;
- Timestamped records.
C. Evidence of Identity of the Offender
This may include:
- E-mail address;
- Mobile number;
- Social media profile;
- User ID;
- Bank account;
- E-wallet account;
- Delivery address;
- IP address;
- Device information;
- Communication records;
- Admission or confession;
- Witnesses;
- Beneficiary account details.
D. Evidence of Damage or Prejudice
This may include:
- Money lost;
- Property released;
- Loan approved;
- Account opened;
- Reputation damaged;
- Employment affected;
- Credit standing affected;
- Legal rights impaired;
- Unauthorized transaction completed;
- Business loss;
- Emotional distress, where legally relevant;
- Cost of remediation.
X. Common Scenarios
A. Fake Payment Receipt Sent to an Online Seller
A buyer sends a fake bank transfer or e-wallet receipt to persuade the seller to release goods. This may involve falsification, computer-related forgery, computer-related fraud, and estafa.
The seller should preserve the chat, receipt image, account details, delivery record, and confirmation from the bank or e-wallet that no payment was received.
B. Forged ID Used for Online Loan or E-Wallet Verification
A person uses another person’s ID or a fake ID to open an account or apply for a loan. This may involve identity misuse, computer-related fraud, data privacy violations, and falsification.
The victim should report to the financial institution, preserve notices or collection messages, request account records, and file with cybercrime authorities.
C. Forged Contract Sent by E-mail
A forged contract is sent to a company or individual to claim rights, payment, authority, or consent. This may involve falsification of private or commercial documents, computer-related forgery, and possibly fraud.
The complainant should preserve the e-mail, attachment, header, sender address, and certification from the alleged signatory denying the signature.
D. Fake Notarized Document Uploaded Online
A document is made to appear notarized and then submitted online to a bank, government office, platform, employer, or business. This may be serious because notarization converts a private document into a public document in many legal contexts.
The complainant should verify with the alleged notary and obtain confirmation whether the document appears in the notarial register.
E. Fake School or Employment Records Submitted Online
A person uploads fake credentials to obtain employment, admission, promotion, loan approval, or professional opportunity. This may involve falsification, fraud, and administrative consequences.
The institution or affected party should preserve the application record and obtain certification from the school or employer.
F. Forged Authorization Letter Used for Online Transactions
A person sends a fake authorization letter to access records, withdraw funds, collect items, or represent another person. This may involve falsification, identity misuse, fraud, and possible data privacy violations.
The real person should issue a written denial and preserve all transaction records.
XI. Special Issues With Electronic Signatures
Electronic signatures may be legally valid if they meet legal requirements and are properly attributable to the person. However, an electronic signature can also be forged, copied, pasted, or misused.
A forged electronic signature case may require proof that:
- The alleged signer did not sign the document;
- The electronic signature was copied, simulated, or inserted without authority;
- The document was altered after signing;
- The account or device used was not controlled by the alleged signer;
- The signature process lacked proper authentication;
- The signing logs or audit trail show irregularities.
Evidence may include audit logs, IP addresses, signing certificates, e-mail verification records, authentication logs, platform records, and testimony from the alleged signer.
XII. Special Issues With Notarized Documents
A forged notarized document is especially serious because notarization gives a document a public character and makes it appear formally acknowledged before a notary.
Forgery may involve:
- Fake notarial seal;
- Fake notarial signature;
- Non-existent notarial entry;
- Use of a real notary’s name without authority;
- Falsified acknowledgment page;
- Fake competent evidence of identity;
- Document made to appear personally acknowledged when no appearance occurred.
Useful evidence includes:
- Certification from the notary;
- Copy of the notarial register entry or proof of absence;
- Comparison of seal and signature;
- Statement of the alleged signatory;
- The original or best available copy of the document.
XIII. Special Issues With Government IDs and Official Documents
Forged government IDs, certificates, permits, clearances, licenses, or official records may involve separate offenses and administrative concerns.
The affected person should avoid circulating copies unnecessarily and should report to the concerned issuing office. The issuing office may provide certification that the document is fake, invalid, revoked, altered, or not found in official records.
XIV. Digital Evidence Preservation Checklist
Before filing, preserve the following:
- Original PDF, image, or document file;
- Screenshots showing full context;
- URLs and profile links;
- E-mail headers;
- Message thread;
- Sender account details;
- Recipient details;
- Download links;
- Upload confirmations;
- Platform notices;
- Transaction numbers;
- Bank or e-wallet records;
- Account numbers used by suspect;
- Delivery records;
- Device where the file was received;
- Cloud storage logs, if available;
- Metadata or file properties;
- Certifications from issuing institutions;
- Witness names and contact details.
XV. Sample Online Complaint Format
Subject: Cybercrime Complaint for Forged Document / Computer-Related Forgery
Complainant: Address: Contact Number: E-mail: Respondent/Suspect: Online Identifiers: Date Discovered: Date and Manner of Online Use: Type of Forged Document: Brief Facts: Evidence Available: Damage Suffered: Action Requested:
Sample narrative:
I respectfully request assistance regarding a forged document that was sent and used online. On [date], I discovered that [name/account] sent/uploaded/submitted a document purporting to be [type of document]. The document appears to bear my name/signature/ID/details, but I did not sign, issue, authorize, or consent to it. The document was transmitted through [e-mail/platform/messaging app/website] and was used to [obtain money/access/approval/benefit or cause damage]. I have preserved the original file, screenshots, messages, URLs, and supporting certifications. I request investigation for possible computer-related forgery, falsification, fraud, identity misuse, and other applicable offenses.
XVI. Complaint-Affidavit Structure
A complaint-affidavit may be organized as follows:
1. Personal Circumstances
State the complainant’s name, age, citizenship, civil status, address, and capacity to file the complaint.
2. Respondent Information
State the respondent’s name, address, contact number, e-mail, online account, or other identifiers, if known.
3. Background Facts
Explain the relationship between the parties and relevant background.
4. Discovery of the Forged Document
State when, where, and how the complainant discovered the document.
5. Description of the Forged Document
Identify the document, its date, title, supposed issuer, signatory, file name, and contents.
6. Explanation of Forgery
Explain why it is fake. State whether the signature, contents, seal, document number, letterhead, or authorization is false.
7. Online Use or Transmission
Explain how the document was sent, uploaded, submitted, published, or used electronically.
8. Damage or Prejudice
Explain the harm caused or threatened.
9. Evidence
List attachments and exhibits.
10. Prayer
Request investigation and filing of appropriate charges.
XVII. Practical Exhibit List
A complainant may mark evidence as follows:
- Annex “A” — Copy of forged document;
- Annex “B” — Screenshot of message transmitting the document;
- Annex “C” — E-mail with header or sender details;
- Annex “D” — Certification from alleged issuer denying authenticity;
- Annex “E” — Copy of valid ID of complainant;
- Annex “F” — Proof of damage or transaction;
- Annex “G” — Screenshots of suspect’s profile;
- Annex “H” — Bank or e-wallet records;
- Annex “I” — Witness affidavit;
- Annex “J” — Police blotter or acknowledgment receipt.
XVIII. Jurisdiction and Venue
Venue can be complicated in online cases. Relevant places may include:
- Where the forged document was created;
- Where it was uploaded;
- Where it was received;
- Where the complainant discovered it;
- Where the damage occurred;
- Where the suspect resides or operates;
- Where the affected institution is located;
- Where the online transaction was completed.
For practical purposes, the complainant may begin with the cybercrime office nearest their residence, the place where the incident was discovered, or the place where damage occurred. The receiving office may refer the complaint if another office has better jurisdiction.
XIX. Prescription Periods and Delay
Criminal offenses have prescriptive periods. Delay in reporting can also affect investigation because digital evidence may disappear. Platforms may delete logs, accounts may be deactivated, and financial records may become harder to retrieve.
A complainant should act promptly, especially when the forged document is being used to obtain money, access accounts, transfer property, or damage reputation.
XX. Should the Complainant Send a Demand Letter First?
A demand letter may be useful in some cases, especially where the suspect is known and the goal includes stopping the use of the forged document, recovering money, or creating a record of denial.
However, a demand letter is not always advisable. It may alert the offender, causing deletion of evidence, account deactivation, or intimidation of witnesses. In urgent cybercrime cases, evidence preservation and prompt reporting may be more important than sending a demand letter.
Legal advice is recommended before sending a demand letter in serious cases.
XXI. Should the Complainant Report to the Online Platform?
Yes, when the forged document was used on a platform. The complainant may report to the platform to:
- Preserve records;
- Suspend fraudulent accounts;
- Remove fake documents;
- Stop ongoing fraud;
- Obtain incident numbers;
- Trigger internal investigation.
However, platform reporting should not replace reporting to law enforcement if a crime was committed. Also, the complainant should preserve evidence before requesting removal, because the platform may take down content that the complainant later needs as proof.
XXII. Should the Complainant Contact the Bank, E-Wallet, Employer, School, or Government Office?
Yes, when the forged document involves or was submitted to an institution. The institution may preserve records, confirm authenticity, freeze suspicious transactions, provide certifications, or cooperate with investigators.
Examples:
- A bank can verify whether a receipt is genuine;
- A school can certify whether a transcript was issued;
- An employer can deny issuance of a certificate;
- A government agency can verify an ID, permit, or license;
- A notary can confirm whether a document was notarized;
- An online platform can preserve upload records.
XXIII. What Happens After Filing?
After filing, several things may happen:
- The cybercrime office evaluates the complaint;
- An investigator contacts the complainant;
- Evidence is reviewed;
- The complainant may be asked to submit more documents;
- The suspect may be identified through records;
- Preservation requests may be sent to platforms;
- The case may be referred to a prosecutor;
- The prosecutor may conduct preliminary investigation;
- The respondent may file a counter-affidavit;
- The complainant may file a reply-affidavit;
- The complaint may be dismissed or filed in court.
The process can take time, especially where platform records, bank records, or technical identification are needed.
XXIV. Common Defenses in Forged Document Cybercrime Cases
A respondent may claim:
- The document is genuine;
- The respondent did not create the document;
- The respondent did not know it was fake;
- The respondent merely forwarded it;
- The account was hacked;
- Someone else used the device;
- The complainant consented;
- There was no damage;
- The document was not used for legal purposes;
- The screenshots were fabricated;
- The digital file was altered by the complainant;
- The wrong person was accused.
Because these defenses are common, the complainant should preserve strong proof of authenticity, identity, transmission, knowledge, and damage.
XXV. How to Strengthen the Case
A complainant can strengthen the case by obtaining:
- Written denial from alleged signatory;
- Certification from issuing institution;
- Original digital file;
- E-mail headers;
- Full screenshots;
- Platform records;
- Bank or e-wallet verification;
- Witness affidavits;
- Proof of damage;
- Police or cybercrime acknowledgment;
- Notarial register verification;
- Expert examination, if needed.
The strongest cases usually show three things clearly: the document is false, the suspect used or transmitted it online, and the complainant suffered or was exposed to legal damage.
XXVI. Risks of Publicly Accusing the Suspect Online
A complainant should be careful about posting accusations on social media. Even if the complainant believes the document is forged, public posts may expose the complainant to claims of defamation, cyber libel, privacy violations, or harassment.
The safer course is to report to law enforcement, institutions, and platforms through proper channels. Public warnings should be made only with legal caution and without unnecessary personal information.
XXVII. Privacy and Sensitive Information
Forged document cases often involve sensitive personal data. The complainant should avoid unnecessary disclosure of:
- Government ID numbers;
- Addresses;
- Birthdates;
- Signatures;
- Bank account details;
- Medical information;
- School records;
- Employment records;
- Images of minors;
- Private messages.
When submitting evidence, redact copies only when appropriate, but preserve unredacted originals for authorities.
XXVIII. When Immediate Action Is Needed
Immediate reporting is advisable when:
- Money is being transferred;
- A bank account or e-wallet was opened using fake documents;
- A forged document is being used to sell property;
- A fake authorization is being used to access funds;
- A forged document is being used in court, government, or immigration matters;
- The suspect is still actively scamming others;
- Personal identity is being used;
- The forged document may cause arrest, loss of employment, or loss of property;
- Online accounts are being compromised;
- Evidence may disappear soon.
In urgent cases, online reporting should be combined with direct contact with law enforcement, banks, platforms, and affected institutions.
XXIX. Remedies Aside From Criminal Complaint
Depending on the situation, other remedies may be available.
A. Civil Action
A victim may claim damages for financial loss, reputational harm, or other injury caused by the forged document.
B. Administrative Complaint
If the offender is an employee, licensed professional, student, public officer, notary, or regulated person, an administrative complaint may be possible.
C. Platform Takedown
The victim may request removal of fraudulent uploads, fake accounts, or forged documents.
D. Bank or E-Wallet Dispute
If money was involved, the victim may file a dispute with the bank, e-wallet, payment processor, or financial institution.
E. Data Privacy Complaint
If personal information was misused, a privacy complaint may be considered.
F. Protection of Identity
The victim may notify institutions that their ID, signature, or personal information has been misused.
XXX. Mistakes to Avoid
Avoid the following:
- Filing only with the platform and not with authorities;
- Deleting messages after taking screenshots;
- Sending only cropped screenshots;
- Failing to preserve the original file;
- Accusing someone publicly without proof;
- Ignoring the need for a sworn affidavit;
- Failing to verify with the issuing institution;
- Waiting too long before reporting;
- Submitting edited evidence;
- Losing the device where evidence was received;
- Forgetting to obtain a receiving copy;
- Assuming that online reporting automatically files a court case;
- Failing to document damage;
- Sending sensitive documents to unofficial accounts;
- Not following up after initial acknowledgment.
XXXI. Practical Checklist Before Filing
Before filing, prepare:
- Valid government-issued ID;
- Complaint-affidavit;
- Copy of forged document;
- Original digital file;
- Screenshots with timestamps and URLs;
- E-mails with headers;
- Chat logs;
- Suspect’s profile links and identifiers;
- Bank or e-wallet records;
- Certifications from real issuer or signatory;
- Notarial verification, if applicable;
- Witness affidavits;
- Proof of loss or damage;
- Police blotter, if any;
- USB or secure storage containing digital evidence;
- Chronological summary of events;
- Contact details for follow-up.
XXXII. Short Template for a Complaint-Affidavit
Republic of the Philippines [City/Municipality]
AFFIDAVIT-COMPLAINT
I, [Name], of legal age, [civil status], Filipino, and residing at [address], after being sworn in accordance with law, state:
I am the complainant in this case.
I am filing this complaint against [name of respondent, if known], who may be contacted or identified through [address, e-mail, phone number, social media account, or other identifier], for the online use of a forged document and for other offenses that may be found applicable.
On [date], I discovered that a document entitled [title/type of document] was sent/uploaded/submitted through [platform/e-mail/website/messaging app].
The document appears to contain [my name/signature/ID/details/the name of institution], but I did not sign, issue, authorize, or consent to the making or use of said document.
The document is false because [explain reasons: fake signature, not issued by office, altered contents, false notarial details, fake document number, etc.].
The document was used online to [describe purpose: obtain money, secure approval, access account, deceive buyer, mislead institution, etc.].
As a result, I suffered or may suffer [describe damage or prejudice].
Attached to this affidavit are copies of the forged document, screenshots, electronic messages, transaction records, certifications, and other supporting evidence.
I respectfully request the investigation and prosecution of the responsible person or persons for computer-related forgery, falsification, fraud, identity misuse, and other offenses that may be warranted by the evidence.
IN WITNESS WHEREOF, I have signed this affidavit on [date] at [place].
[Signature] [Name of Complainant]
XXXIII. Conclusion
Filing a cybercrime case for forged documents online in the Philippines requires more than simply reporting that a document is fake. The complainant must show what document was forged, why it is false, how it was created or used through digital means, who used or benefited from it, and what damage or risk resulted.
The proper approach is to preserve the original digital evidence, verify the document with the alleged issuer or signatory, prepare a clear complaint-affidavit, contact the appropriate cybercrime authority through official channels, submit evidence securely, obtain a reference or receiving copy, and cooperate with investigation and prosecutorial proceedings.
A forged digital document can implicate falsification, computer-related forgery, computer-related fraud, identity misuse, estafa, data privacy violations, and other offenses depending on the facts. Because these cases often involve technical evidence and legal classification issues, serious cases should be handled promptly and carefully, with legal assistance when possible.