How to File a Cybercrime Case for Nonconsensual Distribution of Private Videos

A Philippine Legal Article

In the Philippines, the nonconsensual distribution of private sexual videos is not merely a “relationship problem,” a “scandal,” or an issue of reputation. It is potentially a criminal offense, and when done through messaging apps, social media, cloud storage, email, or other digital means, it can also become a cybercrime case. Philippine law expressly penalizes the taking, copying, distribution, publication, and broadcasting of private sexual images and videos under circumstances protected by privacy, and the law does so even where the original recording itself was consensual. Under the Anti-Photo and Video Voyeurism Act, distribution and publication without the written consent of the person involved remain prohibited notwithstanding prior consent to the recording. (Lawphil)

That point is the foundation of the subject. Many victims believe they have no case because they once consented to the making of the video, or because the video was first shared privately within an intimate relationship. That is legally wrong. Republic Act No. 9995 defines “photo or video voyeurism” broadly enough to cover selling, copying, reproducing, broadcasting, sharing, showing, or exhibiting sexual recordings or images of private areas without the written consent of the persons involved, and Section 4 expressly penalizes copying, distribution, publication, and broadcast of such material. The penalties under Section 5 are imprisonment of three to seven years and a fine of ₱100,000 to ₱500,000, or both, at the court’s discretion. (Lawphil)

When the distribution happens through digital platforms, the Cybercrime Prevention Act becomes relevant. The Supreme Court has recognized that crimes defined under the Revised Penal Code and special laws, when committed by, through, and with the use of information and communications technologies, fall within the Cybercrime Prevention Act framework, with a one-degree-higher penalty under Section 6. The same law also directs the NBI and the PNP to organize specialized cybercrime units, which is why victims commonly begin with the NBI Cybercrime Division or the PNP Anti-Cybercrime Group. (Lawphil)

So the practical legal question is not only whether a victim has a case. In many situations, the victim does. The real question is how to file the case properly, preserve the digital evidence, choose the right agencies, and avoid steps that weaken prosecution.

I. What conduct is actually punishable

The clearest core offense is under Republic Act No. 9995. The law covers both the original capture of sexual activity or private areas without consent and the later copying, distribution, publication, or broadcast of the material without written consent. The protection is tied to privacy and dignity, and the law defines “private area” to include the naked or undergarment-clad genitals, pubic area, buttocks, or female breast. It also treats a person as protected where there is a reasonable expectation of privacy, even if the image was taken in a place that is not purely private in the ordinary sense. (Lawphil)

For filing purposes, this means the victim should not frame the case too narrowly as “revenge porn” or “leaked video” alone. The conduct may involve several punishable acts at once: copying, reposting, forwarding, uploading, selling, threatening to release, or actually publishing the video. Each of those acts may matter in the complaint-affidavit, because the law punishes more than just the first upload. (Lawphil)

If the offender used Facebook, X, Telegram, Messenger, Viber, WhatsApp, TikTok, Discord, email, cloud links, file-sharing sites, or any similar electronic channel, the case also takes on a cybercrime dimension because the distribution was done through information and communications technologies. That matters not just for investigation but also for the applicable procedural tools and penalty structure. (Lawphil)

II. The offense may not stop with Republic Act No. 9995

A single factual incident can produce multiple legal theories. The main offense may be under Republic Act No. 9995, but depending on the facts, other statutes may also apply.

If the offender is a current or former husband, partner, boyfriend, live-in partner, or a person with whom the victim has or had a dating or sexual relationship, and the victim is a woman or her child is affected, Republic Act No. 9262 may also be relevant because that law covers forms of violence against women and their children beyond purely physical injury. (Lawphil)

If the conduct amounts to online gender-based sexual harassment, Republic Act No. 11313, the Safe Spaces Act, may also enter the picture. Official guidance from the Philippine Commission on Women states that a victim of online gender-based sexual harassment may file directly with the NBI through its Cybercrime Division, the PNP Anti-Cybercrime Group, or the DOJ Office of Cybercrime. (Lawphil)

If a platform operator, website owner, app provider, or another party unlawfully processed, disclosed, or mishandled the victim’s personal data in connection with the leak, the Data Privacy Act may also become relevant, and a separate complaint with the National Privacy Commission may be proper. (Lawphil)

The most important practical lesson is this: the complaint should be drafted from the full facts, not from a single label. A weak complaint says, “He leaked my video.” A strong complaint states exactly what was recorded, who had access, what was copied, where it was sent, when it was uploaded, who received it, what accounts were used, and whether threats, extortion, harassment, or intimate-partner abuse were involved.

III. The first hours matter: what the victim should do immediately

The victim should act quickly, but methodically. The first legal priority is evidence preservation. The second is containment.

Evidence preservation means keeping screenshots, screen recordings, direct links, post URLs, usernames, email headers, chat logs, file names, phone numbers, timestamps, cloud links, message threads, and any proof showing how the video was transmitted or displayed. It is better to preserve too much than too little. Even if a platform later removes the content, the prosecution may still depend on proof of the original upload, forwarding, or threat. Philippine cybercrime investigations commonly rely on digital extraction and forensic handling, and courts recognize the use of forensic examination in cyber-related prosecutions. (Lawphil)

Containment means reporting the content to the platform immediately for removal, preserving the reporting reference number, securing the victim’s own accounts, changing passwords, enabling two-factor authentication, and checking whether the offender also accessed cloud storage, email, or backup folders. These practical steps are not substitutes for filing a criminal case, but they reduce further spread and strengthen the victim’s showing that the matter was reported promptly and seriously.

A victim should not negotiate impulsively with the offender, especially not in a way that sounds like consent, waiver, or bargaining over silence. If the offender is threatening release unless money, sex, or some concession is given, the case may involve more than voyeurism and can become even more serious.

IV. Do not destroy the evidence by trying to erase the incident too fast

Victims understandably want the video gone immediately. That instinct is valid, but there is a legal risk in deleting the only proof. The safer course is to preserve the evidence first, then pursue removal and enforcement. Screenshots should ideally show the full screen, including usernames, dates, times, captions, visible profile photos, and the device clock where possible. If the content is in a disappearing-message app, a screen recording or a second device capturing the display may be crucial.

Where the device itself received the file or the chat thread, the device may later become important evidence. The victim should avoid factory-resetting the device before investigators have had a chance to review it if the device contains the only primary evidence of the transmission.

V. Where to file: the main agencies

The two principal investigative agencies for cybercrime are the PNP Anti-Cybercrime Group and the NBI Cybercrime Division. Section 10 of the Cybercrime Prevention Act directed the creation of cybercrime units in the NBI and PNP, and official NBI pages confirm an online complaint channel and a citizen-facing service for investigative assistance for victims of computer crimes through the Cybercrime Division. (PNP ACG)

In practice, a victim usually begins in one of three places.

The first is the PNP Anti-Cybercrime Group, especially if quick law-enforcement documentation and cyber-investigative handling are needed. Official PNP ACG materials identify the group as the specialized police unit for cybercrime matters. (PNP ACG)

The second is the NBI Cybercrime Division, especially in cases involving online tracing, broader digital investigation, or multi-platform spread. The NBI provides an official online complaint portal and a citizen’s charter entry for investigative assistance to victims of computer crimes. (National Bureau of Investigation)

The third is the Office of the Prosecutor, usually after or together with the investigative referral. Under Rule 110 of the Rules of Criminal Procedure, for offenses requiring preliminary investigation, criminal actions are instituted by filing the complaint with the proper officer for the purpose of conducting the requisite preliminary investigation. Prosecutor offices’ published checklists for preliminary investigation commonly require a complaint-affidavit or sworn statement of the complainant, witness affidavits, and supporting documents. (Lawphil)

VI. The practical filing route

A victim does not need to think of the process as a single dramatic filing day. In reality, it often unfolds in stages.

The first stage is documentation and intake with the PNP ACG or NBI CCD. This gets the matter into a cybercrime-investigation channel, creates a formal record, and helps the victim organize digital evidence.

The second stage is preparation of affidavits and supporting records. This is where the case becomes prosecutable rather than merely reportable. A proper complaint-affidavit should identify the victim, the respondent if known, the relationship between the parties, how the video came into existence, whether any consent to recording existed, the absence of written consent to distribute, the specific acts of copying or sharing, the platforms used, the dates and times, the recipients if known, and the damage caused.

The third stage is preliminary investigation before the prosecutor, where probable cause is assessed if the case is not disposed of through inquest or other special circumstances. Rule 110 and prosecutor checklists make clear that the complaint-affidavit and attachments are central to institution of the criminal action at that stage. (Lawphil)

VII. What documents and evidence should be prepared

The complaint is much stronger when the victim has an organized evidence packet.

At minimum, that packet should usually include the complaint-affidavit, a government ID, screenshots or printouts of the video post or transmission, the chat thread or email trail, links or URLs, usernames and profile handles, timestamps, a chronology of events, and any proof connecting the respondent to the account or upload. If there are witnesses who saw the video being shown, received the link, or can identify the account used, their affidavits matter.

If the case involves a former partner, the packet should also include proof of the relationship if relevant to other charges such as Republic Act No. 9262. If the case includes threats like “I will upload this if you leave me” or “I will send this to your office,” those threat messages should be highlighted separately because they help show motive, authorship, and the absence of consent.

Where the material was posted on a public page or group, the victim should preserve evidence showing the audience size, comments, shares, or reposts if visible. The number of people exposed can matter to damages and gravity even if the core crime is already complete upon distribution or publication.

VIII. What if the offender is unknown or is using a fake account

A case can still be filed even if the offender used a dummy account, VPN, or pseudonym. The complaint should say that the respondent is temporarily identified by account handle, username, URL, phone number, email address, or any other digital identifier, with a request for investigation to determine the real identity.

This is precisely where cybercrime investigators are valuable. The victim is not expected to perform the whole attribution process alone. The function of the complaint is to preserve the factual record and give investigators enough digital points of reference to work from.

IX. How the complaint-affidavit should be framed

The complaint-affidavit should not be emotional only. It should be chronological, specific, and legally disciplined.

It should clearly state that the video is private, that the victim had a reasonable expectation of privacy, and that there was no written consent to distribute, publish, or broadcast it. That language matters because it tracks Republic Act No. 9995 itself. The affidavit should then narrate how the offender obtained the file, what specific acts of copying, forwarding, uploading, or posting were done, and what electronic means were used. (Lawphil)

If the original recording was consensual, the affidavit should say so honestly and then state the legally crucial point: consent to recording did not include written consent to distribute or publish. Republic Act No. 9995 expressly preserves liability for distribution and publication even when consent to record had been given. (Lawphil)

X. Preliminary investigation and probable cause

For serious cyber-enabled privacy offenses, the case usually moves through preliminary investigation unless there is an arrest-based inquest or another special procedural posture. Under Rule 110, criminal actions for offenses requiring preliminary investigation are instituted by filing the complaint with the proper officer for that investigation, and prosecutor offices’ checklists commonly require complaint-affidavits, witness affidavits, and supporting documents in multiple copies. (Lawphil)

This means the victim should treat the affidavit stage as the core of the case, not as an afterthought. A good affidavit often determines whether the prosecutor sees a clean statutory violation or a vague personal dispute.

XI. Why the cybercrime label matters beyond punishment

Calling it a cybercrime case is not just rhetorical. It affects who investigates, what kind of digital tracing is available, and what warrants may later be sought. The Supreme Court has acknowledged the Rule on Cybercrime Warrants and the availability of warrants concerning search, seizure, examination, disclosure, and preservation of computer data in cybercrime investigations. Those tools are not automatically available to the victim personally, but they are part of why early reporting to cybercrime investigators matters. (Lawphil)

In practical terms, the faster investigators are brought in, the better the chance of preserving logs, identifying linked accounts, and tracing the route of the upload before records disappear or accounts are deleted.

XII. If the case involves intimate-partner abuse

Where the offender is a husband, ex-husband, boyfriend, ex-boyfriend, live-in partner, or similar intimate partner and the victim is a woman, the facts should be evaluated not only under Republic Act No. 9995 but also under Republic Act No. 9262. That law is broader than physical battery and can overlap with coercive, controlling, or abusive conduct within an intimate relationship. (Lawphil)

This matters because the case may then call not only for criminal prosecution but also for protection-oriented remedies. The article here is focused on filing the cybercrime case, but the victim should understand that the legal system may provide more than one avenue of relief when the digital violation is part of a larger pattern of abuse.

XIII. If the case includes online sexual harassment

The Safe Spaces Act can also become relevant where the nonconsensual distribution is part of online gender-based sexual harassment. Official Philippine Commission on Women guidance says victims of online gender-based sexual harassment may file directly with the NBI Cybercrime Division, the PNP Anti-Cybercrime Group, or the DOJ Office of Cybercrime. (Philippine Commission on Women)

This is important because many real cases involve both privacy violation and sexual harassment: posting the video to humiliate the victim, tagging people, threatening workplace exposure, or using the material to terrorize the victim online. The complaint should describe those circumstances fully rather than reducing the case to a sterile “upload.”

XIV. Data privacy remedies may run in parallel

Sometimes the offender is obvious. Sometimes the bigger problem is that a platform, group admin, employer, school official, app, or other entity mishandled the victim’s data or failed to contain its unlawful spread. In those cases, the Data Privacy Act can matter. Republic Act No. 10173 is the principal data privacy statute, and the National Privacy Commission provides a formal complaint mechanism requiring a specific complaint form, notarization, and submission in person, by courier, or by email. NPC materials also explain who may file a complaint under its rules. (Lawphil)

A privacy complaint is not a substitute for the criminal case, but it can be a powerful parallel remedy where the wrong includes unlawful processing, disclosure, reposting, or failure to protect personal data.

XV. What if the video was only “sent to a few people”

The case can still exist. Republic Act No. 9995 does not require viral spread before liability attaches. Copying, reproducing, distributing, publishing, or broadcasting without the required written consent is already within the statute. Sending the file to one group chat, one office GC, one family thread, or one circle of friends can still be legally significant. (Lawphil)

Victims often minimize the harm because the leak did not “go public.” Legally, that is a mistake. The offense is not confined to mass publication.

XVI. What if the offender only threatened to release the video

A pure threat case may require more careful charge selection, because Republic Act No. 9995 is most straightforward when there is actual copying, distribution, publication, or broadcast. But threats are still highly important. They can prove motive, authorship, and coercion, and they may support additional charges depending on the facts, especially where extortion, harassment, or intimate-partner abuse is involved.

Even where no upload happened yet, the victim should still file a report immediately. The law’s protective and investigative machinery is much more useful before the spread becomes irreversible.

XVII. Venue and jurisdiction in practical terms

Cybercrime cases can create confusion about where to file because the offender may be in one city, the victim in another, and the platform abroad. In practice, the victim should not let that uncertainty stop the complaint. PNP ACG and NBI CCD are specifically designed to handle cybercrime intake and investigation, and prosecutor-driven criminal actions are instituted through the proper officer for preliminary investigation under the Rules of Court. (PNP ACG)

The safer approach is to file promptly with the specialized cybercrime investigators or the appropriate prosecutor’s office with a clear statement of the digital acts, then let procedural questions be sorted with the benefit of the evidence already preserved.

XVIII. Takedown is not the same as prosecution

Victims often think platform removal ends the matter. It does not. A takedown reduces exposure, but it does not erase the criminal act. Likewise, an apology or deletion by the offender does not automatically remove criminal liability. Once the prohibited acts have been committed, the case can still proceed if the evidence is sufficient.

That is why the sequence should usually be: preserve, report, remove, and prosecute.

XIX. The danger of “settlement” pressure

Offenders sometimes offer to delete the file in exchange for silence. Victims should be careful. Settlement language may be emotionally tempting, but it can complicate proof if the only existing copy is then erased and the complainant later appears to have accepted a private arrangement.

This does not mean a victim must refuse all communication. It means any communication should be deliberate, preserved, and preferably not framed as waiver of criminal rights.

XX. The role of the prosecutor after investigation

Once the complaint-affidavit, witness statements, and supporting digital records are assembled, the prosecutor decides whether probable cause exists. Prosecutor offices’ published checklists show that formal complaint filing for preliminary investigation is affidavit-driven. Rule 110 confirms that criminal actions for offenses requiring preliminary investigation are instituted by filing the complaint with the proper officer for that purpose. (Lawphil)

The victim’s task is therefore twofold: prove the private nature of the material and prove the nonconsensual digital dissemination. The better those two pillars are documented, the stronger the case.

XXI. What the victim should avoid saying or doing

The victim should avoid statements that imply retroactive consent, like “It’s okay if you only send it to your friends,” unless that is truly what happened. The victim should also avoid altering screenshots, editing chat threads, or presenting cropped images that hide context. In cybercrime cases, authenticity matters greatly.

A victim should also avoid assuming that shame or prior intimacy destroys the case. Republic Act No. 9995 is built on the exact opposite policy: dignity and privacy do not disappear because the material is sexual or because the parties were once intimate. (Lawphil)

XXII. Civil and administrative relief may accompany the criminal case

This article is about filing the cybercrime case, but criminal prosecution is not the only possible path. The same facts may also support civil damages, workplace or school complaints, protective applications under laws like Republic Act No. 9262 where applicable, and privacy complaints before the NPC where data misuse is involved. The legal system does not force the victim to choose only one lens when the conduct violated several protected interests at once. (Lawphil)

XXIII. The bottom line

In Philippine law, the nonconsensual distribution of private sexual videos is a serious legal wrong. Republic Act No. 9995 squarely penalizes copying, distribution, publication, and broadcast of such material without written consent, even where the original recording was consensual. When the dissemination is done through social media, messaging apps, email, cloud links, or other digital systems, the matter also enters the cybercrime framework, bringing in specialized investigators and potentially a higher penalty structure under Republic Act No. 10175. (Lawphil)

Filing the case properly means preserving digital evidence immediately, reporting to the PNP Anti-Cybercrime Group or the NBI Cybercrime Division, preparing a strong complaint-affidavit with attachments, and pursuing preliminary investigation before the proper prosecutor. If the facts also involve intimate-partner abuse, online gender-based sexual harassment, or unlawful data disclosure, Republic Act No. 9262, the Safe Spaces Act, and the Data Privacy Act may also be relevant, with parallel relief available through the prosecutor, cybercrime investigators, and the National Privacy Commission. (PNP ACG)

The core rule is simple: a private sexual video does not become fair game just because it exists. In Philippine law, consent to intimacy is not consent to exposure, and consent to recording is not consent to distribution. (Lawphil)

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.