How to Report Cyberbullying or Online Harassment on Social Media

I. Overview

Cyberbullying and online harassment are serious legal and social problems in the Philippines. Social media platforms make it easy for people to publish insults, threats, false accusations, private information, humiliating images, sexual content, and abusive messages. When these acts cause fear, shame, reputational damage, emotional distress, or danger, the victim may have remedies under Philippine law.

The Philippines does not have one single law called the “Cyberbullying Law” that covers every situation. Instead, online harassment may fall under several laws depending on the facts, including the Cybercrime Prevention Act, the Revised Penal Code, the Safe Spaces Act, laws protecting children, anti-violence laws, privacy laws, and civil liability principles.

Reporting cyberbullying or online harassment usually involves two tracks:

  1. Platform reporting, such as reporting the post, account, page, comment, message, video, or image to Facebook, Instagram, TikTok, X, YouTube, or another platform; and
  2. Legal reporting, such as filing a complaint with law enforcement, the barangay, school, employer, prosecutor’s office, or the courts.

A victim may pursue both tracks at the same time.


II. What Is Cyberbullying?

Cyberbullying generally refers to bullying committed through digital technology. It may occur through social media, messaging apps, online games, forums, websites, emails, group chats, livestreams, comment sections, or shared media.

Common forms include:

  1. Posting insults, ridicule, or humiliating comments;
  2. Spreading rumors or false accusations;
  3. Posting embarrassing photos, videos, memes, or edited images;
  4. Creating fake accounts to impersonate or mock someone;
  5. Sending repeated abusive messages;
  6. Threatening violence or harm;
  7. Excluding or targeting someone in group chats;
  8. Doxxing, or publishing private information;
  9. Sharing screenshots of private conversations to shame someone;
  10. Encouraging others to attack, harass, or “cancel” a person;
  11. Posting sexualized insults or images;
  12. Harassing someone based on sex, gender, sexuality, disability, religion, appearance, or personal status.

Cyberbullying is commonly associated with children and students, but adults can also be victims of online harassment.


III. What Is Online Harassment?

Online harassment is broader than cyberbullying. It includes repeated, targeted, or abusive conduct online that causes fear, distress, reputational harm, intimidation, or interference with a person’s peace, safety, employment, education, or relationships.

Examples include:

  1. Repeated unwanted messages;
  2. Stalking through social media accounts;
  3. Creating multiple accounts after being blocked;
  4. Threatening to expose secrets or private images;
  5. Posting private photos or personal information;
  6. Sexual harassment through chats, comments, or direct messages;
  7. Threats of rape, violence, or death;
  8. Blackmail or extortion;
  9. Coordinated online attacks by groups;
  10. Impersonation using the victim’s name or photos;
  11. Non-consensual sharing of intimate images;
  12. False accusations meant to damage reputation.

Whether conduct is legally actionable depends on the content, intent, repetition, harm caused, identity of the parties, age of the victim, and applicable law.


IV. Main Philippine Laws That May Apply

Several Philippine laws may apply to cyberbullying or online harassment.

A. Cybercrime Prevention Act of 2012

The Cybercrime Prevention Act penalizes certain crimes committed through information and communications technology.

It is important because many traditional offenses become cybercrimes when committed online or through computers, phones, social media, messaging apps, or digital systems.

Relevant cybercrime-related offenses may include:

  1. Cyber libel;
  2. Illegal access;
  3. Identity theft;
  4. Computer-related fraud;
  5. Computer-related forgery;
  6. Unlawful use of computer systems;
  7. Aiding or abetting cybercrime;
  8. Attempted cybercrime, where applicable.

The law is often invoked when harmful posts, defamatory accusations, fake accounts, impersonation, or digital manipulation are involved.


B. Cyber Libel

Cyber libel is one of the most common legal issues in online harassment disputes.

Libel under the Revised Penal Code may become cyber libel when committed through a computer system or similar means, such as Facebook posts, public comments, tweets, blogs, videos, captions, or other online publications.

Generally, libel involves:

  1. A defamatory statement;
  2. Publication to a third person;
  3. Identification of the person defamed;
  4. Malice, either presumed or actual depending on the circumstances.

A defamatory statement is one that tends to dishonor, discredit, or put a person in contempt.

Examples may include false public accusations that a person is a thief, scammer, adulterer, criminal, corrupt official, immoral person, or other damaging claim.

Important Points About Cyber Libel

Cyber libel is not limited to long posts. It may arise from captions, comments, shared posts, memes, videos, or edited images.

However, not every insult is libel. Mere opinion, fair comment, satire, privileged communication, or true statements made with lawful purpose may have defenses depending on the facts.

Because cyber libel can involve criminal liability, victims often file complaints with cybercrime authorities or prosecutors.


C. Grave Threats, Light Threats, and Other Threat-Related Offenses

Online harassment may involve threats, such as:

  1. “I will kill you.”
  2. “I will hurt your family.”
  3. “I know where you live.”
  4. “I will destroy your reputation.”
  5. “I will leak your photos unless you pay me.”
  6. “You will regret this.”

Threats may be punishable under the Revised Penal Code, and if made online, digital evidence may be used to support the complaint.

The legal classification depends on the seriousness of the threat, whether a condition was imposed, whether money or action was demanded, and whether the threat involved a crime.


D. Unjust Vexation

Unjust vexation may apply to annoying, irritating, harassing, or distressing conduct that does not neatly fit a more specific offense.

Online examples may include repeated unwanted messages, abusive comments, humiliating acts, or persistent harassment that causes mental distress.

Unjust vexation is often used when the conduct is offensive or harassing but does not amount to cyber libel, grave threats, stalking, or another more specific offense.


E. Slander by Deed and Oral Defamation in Online Contexts

Traditional defamation concepts may still be relevant where the conduct includes verbal abuse, livestream statements, video content, or humiliating acts.

Oral defamation concerns spoken defamatory words, while slander by deed concerns acts that cast dishonor, discredit, or contempt upon another person.

When the conduct is recorded, livestreamed, uploaded, or shared online, cybercrime considerations may also arise.


F. Safe Spaces Act

The Safe Spaces Act, also known as the Bawal Bastos Law, addresses gender-based sexual harassment in streets, public spaces, online spaces, workplaces, and educational or training institutions.

Online gender-based sexual harassment may include:

  1. Unwanted sexual remarks and comments online;
  2. Sending sexual messages or images;
  3. Misogynistic, transphobic, homophobic, or sexist slurs;
  4. Invasion of privacy through cyberstalking;
  5. Uploading or sharing sexual photos or videos without consent;
  6. Threats involving sexual content;
  7. Online conduct that attacks a person based on sex, gender, sexual orientation, gender identity, or gender expression.

This law is particularly important where harassment is sexual, gender-based, or discriminatory.


G. Anti-Photo and Video Voyeurism Law

The Anti-Photo and Video Voyeurism Act may apply when intimate images or videos are captured, copied, reproduced, shared, sold, distributed, broadcast, or published without consent.

It may cover:

  1. Secret recording of sexual acts;
  2. Taking intimate photos without consent;
  3. Sharing private sexual photos or videos;
  4. Threatening to leak intimate content;
  5. Uploading intimate images to social media or messaging groups;
  6. Circulating someone’s nude or sexual images even if originally obtained with consent.

Consent to take a photo or video does not necessarily mean consent to share it. A person who forwards, reposts, or circulates intimate content may also face liability.


H. Violence Against Women and Their Children

The Anti-Violence Against Women and Their Children Act may apply when online harassment is committed by a husband, former husband, person with whom the woman has or had a sexual or dating relationship, or person with whom she has a child.

Online acts may form part of psychological violence, emotional abuse, economic abuse, sexual abuse, stalking, coercion, or threats.

Examples include:

  1. Threatening to post intimate photos;
  2. Repeated abusive messages from a former partner;
  3. Monitoring social media accounts;
  4. Publicly shaming a partner online;
  5. Threatening children or family members;
  6. Using private information to control or intimidate;
  7. Harassing the woman’s employer, friends, or relatives online.

Victims may seek barangay protection orders, temporary protection orders, permanent protection orders, criminal complaints, and other remedies.


I. Anti-Bullying Act

The Anti-Bullying Act applies mainly to schools and covers bullying among students, including cyberbullying.

Cyberbullying in the school context may include:

  1. Online attacks by students;
  2. Harassment through group chats;
  3. Posting humiliating photos or videos of a student;
  4. Creating fake accounts to mock a student;
  5. Spreading rumors online;
  6. Threatening classmates through social media;
  7. Excluding or humiliating classmates through digital platforms.

Schools are required to have anti-bullying policies and procedures. Parents or guardians may report incidents to teachers, school heads, guidance offices, disciplinary committees, or child protection committees.


J. Special Protection of Children Against Abuse, Exploitation and Discrimination

If the victim is a minor, child protection laws may apply. Online harassment involving minors may be treated more seriously, especially if it involves sexual content, exploitation, grooming, threats, coercion, abuse, or repeated humiliation.

Examples include:

  1. Adult harassing a minor online;
  2. Sexual messages sent to a child;
  3. Grooming;
  4. Soliciting intimate photos;
  5. Sharing a child’s private image;
  6. Threatening a child;
  7. Encouraging self-harm;
  8. Online humiliation causing serious psychological distress.

Reports involving children should be handled urgently and sensitively.


K. Data Privacy Act

The Data Privacy Act may apply when online harassment involves unauthorized collection, use, disclosure, or publication of personal information.

This may include:

  1. Posting someone’s address, phone number, workplace, school, or family details;
  2. Publishing private IDs, documents, medical information, or financial information;
  3. Sharing screenshots containing private data;
  4. Using personal information to impersonate someone;
  5. Doxxing;
  6. Processing personal data without lawful basis.

Not every online insult is a privacy violation, but publishing private personal information can raise data privacy issues.


L. Civil Code Remedies

Even if criminal liability is uncertain, a victim may have civil remedies for damages.

Possible civil claims may involve:

  1. Defamation;
  2. Abuse of rights;
  3. Violation of privacy;
  4. Intentional infliction of emotional harm;
  5. Damage to reputation;
  6. Moral damages;
  7. Exemplary damages;
  8. Attorney’s fees;
  9. Injunction or restraining relief, depending on the case.

Civil remedies may be appropriate when the victim wants compensation, public correction, takedown orders, or court intervention.


V. What Conduct Should Be Reported Immediately?

Some online harassment situations require urgent action.

Report immediately when there is:

  1. Threat of death, rape, physical harm, kidnapping, or serious violence;
  2. Threat to leak intimate photos or videos;
  3. Actual posting of intimate images;
  4. Harassment of a child or minor;
  5. Doxxing of home address, workplace, school, or family details;
  6. Stalking or repeated unwanted contact;
  7. Impersonation used to scam, shame, or endanger someone;
  8. Blackmail or extortion;
  9. Encouragement of self-harm;
  10. Coordinated mob harassment;
  11. Use of fake accounts to contact family, employer, school, or clients;
  12. Hacking, account takeover, or unauthorized access.

When there is immediate danger, the victim should contact law enforcement or emergency assistance rather than relying only on platform reporting.


VI. First Step: Preserve Evidence

Before reporting or blocking, preserve evidence. Online posts can be deleted quickly, accounts can be renamed, and messages can disappear.

A. Take Screenshots

Capture:

  1. The harmful post, comment, message, video, image, or profile;
  2. The username, account name, page name, or profile URL;
  3. Date and time visible on the screen;
  4. Comments, reactions, shares, and captions;
  5. The full conversation thread, not only selected messages;
  6. Any threats or admissions;
  7. Any proof connecting the account to the offender.

Screenshots should be clear and unedited.

B. Record URLs and Links

Copy links to:

  1. The post;
  2. The profile;
  3. The page;
  4. The comment;
  5. The video;
  6. The group or channel;
  7. The message thread, if available.

Links help investigators and platforms locate the content.

C. Save Original Files

Save:

  1. Images;
  2. Videos;
  3. Voice messages;
  4. PDFs;
  5. Chat exports;
  6. Emails;
  7. Downloaded copies of posts;
  8. Screen recordings.

Keep the original files when possible. Avoid editing, cropping, filtering, or modifying the evidence.

D. Use Screen Recording

For disappearing stories, livestreams, reels, or videos, screen recording may help preserve the content. Make sure the recording shows the account name, date, context, and content.

E. Ask Witnesses to Preserve Evidence

If others saw the post or received messages, ask them to preserve screenshots and links. Their statements may later support the complaint.

F. Keep a Timeline

Create a written timeline with:

  1. Date and time of each incident;
  2. Platform used;
  3. Account involved;
  4. What was posted or sent;
  5. Who saw it;
  6. How it affected the victim;
  7. Any prior relationship with the harasser;
  8. Any prior warnings or requests to stop.

A timeline helps lawyers, police, prosecutors, schools, and platforms understand the pattern.


VII. Avoid Destroying or Weakening Evidence

Victims understandably want to delete, block, or respond immediately. However, certain actions can make evidence harder to prove.

Avoid:

  1. Deleting messages before saving them;
  2. Editing screenshots;
  3. Cropping out usernames or dates;
  4. Responding with threats or insults;
  5. Publicly retaliating;
  6. Asking many people to mass-report before evidence is preserved;
  7. Engaging in a public argument that confuses the facts;
  8. Paying blackmailers without legal advice or law enforcement assistance;
  9. Logging into the offender’s account;
  10. Hacking, doxxing, or retaliating.

Blocking may be necessary for safety, but preserve evidence first when possible.


VIII. Reporting to the Social Media Platform

Most platforms have tools to report abusive content. Platform reporting may lead to takedown, account suspension, warning labels, content restriction, or disabling of accounts.

A. What to Report

Report the specific:

  1. Post;
  2. Comment;
  3. Message;
  4. Profile;
  5. Page;
  6. Group;
  7. Video;
  8. Story;
  9. Livestream;
  10. Image;
  11. Impersonation account.

Reporting the specific content is usually better than reporting only the account, because platforms often review the exact post or message complained of.

B. Common Platform Grounds

Choose the most accurate report category, such as:

  1. Harassment or bullying;
  2. Hate speech;
  3. Threats or violence;
  4. Sexual exploitation;
  5. Nudity or intimate content shared without consent;
  6. Impersonation;
  7. Spam or scam;
  8. Privacy violation;
  9. Self-harm concern;
  10. Child safety;
  11. Terror or violent threat, if applicable.

C. Report Impersonation Separately

If someone created a fake account using the victim’s name or photos, report it as impersonation. Platforms may ask for identification or proof that the person is being impersonated.

D. Report Non-Consensual Intimate Images Urgently

If intimate images are posted or threatened, report immediately. Many platforms have urgent channels for non-consensual intimate content.

The victim should preserve evidence but should not unnecessarily reshare intimate images. When reporting, use the platform’s reporting tools or trusted legal/law enforcement channels.

E. Report Child Exploitation Immediately

If the victim is a minor or the content involves child sexual abuse or exploitation, it should be reported urgently to the platform and law enforcement. Such content should not be downloaded, forwarded, reposted, or circulated.


IX. Reporting to Philippine Authorities

Platform takedown may remove content, but it does not automatically hold the offender legally liable. For legal action, the victim may report to Philippine authorities.

A. Philippine National Police Anti-Cybercrime Group

The PNP Anti-Cybercrime Group handles cybercrime complaints, including cyber libel, online threats, identity theft, hacking, online scams, online sexual exploitation, and other cyber-related offenses.

Victims may bring:

  1. Screenshots;
  2. URLs;
  3. Printed copies of posts;
  4. Digital copies on USB or phone;
  5. Valid ID;
  6. Timeline of events;
  7. Names or known details of the suspect;
  8. Witness statements;
  9. Proof of harm;
  10. Prior communications.

The PNP may assist in documentation, investigation, digital preservation, and referral for prosecution.

B. National Bureau of Investigation Cybercrime Division

The NBI Cybercrime Division also handles cybercrime complaints. Victims may file complaints involving online harassment, threats, cyber libel, identity theft, hacking, sextortion, non-consensual intimate images, and related offenses.

The NBI may ask for an affidavit, evidence files, account links, screenshots, and details of the offender.

C. Prosecutor’s Office

For criminal complaints, the victim may eventually file or participate in a complaint before the Office of the City or Provincial Prosecutor.

The complaint may include:

  1. Complaint-affidavit;
  2. Affidavits of witnesses;
  3. Screenshots and printouts;
  4. Digital evidence;
  5. Certification or explanation of how evidence was obtained;
  6. Law enforcement report, if any;
  7. Supporting documents proving identity, publication, threats, damages, or relationship.

The prosecutor determines whether there is probable cause to file a case in court.

D. Barangay

For some disputes between individuals, especially neighbors, former friends, relatives, or persons in the same city or municipality, barangay conciliation may be relevant before court action. However, many cybercrime, serious criminal, violence, child abuse, or urgent protection cases should go directly to proper authorities.

Barangay officials may also help with mediation, blotter reports, barangay protection orders in VAWC situations, and referrals.

E. School Authorities

If the victim is a student and the offender is also connected to the school, report to:

  1. Class adviser;
  2. Guidance counselor;
  3. Principal or school head;
  4. Discipline office;
  5. Child protection committee;
  6. Student affairs office;
  7. School legal office, for universities.

Schools have duties under anti-bullying and child protection rules. They may investigate, impose discipline, require counseling, order takedown, protect the victim, and notify parents or authorities.

F. Employer or HR Department

If the online harassment involves co-workers, supervisors, workplace group chats, professional pages, or employment-related humiliation, report to:

  1. Human resources;
  2. Immediate supervisor;
  3. Grievance committee;
  4. Committee on decorum and investigation;
  5. Legal or compliance office;
  6. Data protection officer, if personal data was misused.

Workplace online harassment may involve labor standards, company policy, sexual harassment, data privacy, or disciplinary rules.


X. What to Include in a Complaint

A strong complaint should be organized and factual.

Include:

  1. Full name and contact details of the complainant;
  2. Identity of the offender, if known;
  3. Social media usernames, profile links, pages, groups, emails, or phone numbers;
  4. Description of each incident;
  5. Dates and times;
  6. Screenshots and URLs;
  7. Explanation of how the victim is identifiable;
  8. Explanation of how the post is false, threatening, harassing, sexual, or harmful;
  9. List of witnesses;
  10. Prior attempts to ask the offender to stop, if any;
  11. Effect on the victim, such as fear, anxiety, reputational damage, school impact, work impact, family impact, or financial loss;
  12. Specific relief sought, such as takedown, prosecution, protection order, damages, or school discipline.

Avoid exaggeration. A complaint is stronger when it is clear, chronological, and evidence-based.


XI. Sample Evidence Checklist

Before going to authorities, prepare:

  1. Valid government ID;
  2. Printed screenshots;
  3. Digital copies of screenshots;
  4. URLs of posts and profiles;
  5. Screen recordings, if any;
  6. Chat logs;
  7. Emails;
  8. Photos or videos;
  9. Names and contact details of witnesses;
  10. Medical or psychological reports, if any;
  11. School or work incident reports, if any;
  12. Prior police or barangay blotter, if any;
  13. Demand letter or notice to stop, if any;
  14. Proof that the account belongs to the offender, if available;
  15. Timeline of events.

For minors, bring the parent, guardian, or authorized school representative when appropriate.


XII. Drafting the Complaint-Affidavit

A complaint-affidavit usually contains sworn statements of facts. It should be written in the first person and should explain what happened.

It commonly includes:

  1. Personal circumstances of the complainant;
  2. Relationship with the respondent;
  3. Exact acts complained of;
  4. Date, time, platform, and account used;
  5. Description of the post or message;
  6. Why the complainant believes the respondent is responsible;
  7. How the complainant was harmed;
  8. Evidence attached as annexes;
  9. Request for investigation and prosecution;
  10. Signature before an authorized officer.

The affidavit should avoid legal conclusions unsupported by facts. It should state what the complainant personally saw, received, experienced, or verified.


XIII. Sample Structure of a Complaint Narrative

A complaint narrative may follow this format:

  1. “I am the complainant in this case.”
  2. “The respondent is known to me because…”
  3. “On or about [date], I saw a Facebook post from the respondent’s account…”
  4. “The post stated that…”
  5. “A screenshot is attached as Annex A.”
  6. “The post identified me because…”
  7. “The statement is false because…”
  8. “Several people saw the post, including…”
  9. “After the post, I experienced…”
  10. “The respondent continued by sending messages on…”
  11. “I respectfully request investigation and appropriate legal action.”

The exact wording depends on the offense and evidence.


XIV. Reporting Cyber Libel

For cyber libel, focus on proving:

  1. The exact defamatory statement;
  2. Where it was published online;
  3. Date of publication;
  4. Identity of the person defamed;
  5. Identity of the publisher or account holder;
  6. Why the statement is defamatory;
  7. Why the statement is false, if applicable;
  8. Persons who saw or reacted to the post;
  9. Damage caused.

Evidence may include screenshots, URLs, witness affidavits, business losses, employment consequences, mental distress, or public comments.

The victim should preserve the entire post and comments because context matters. A single sentence may be interpreted differently depending on the full thread.


XV. Reporting Online Threats

For online threats, preserve:

  1. Exact threatening words;
  2. Date and time;
  3. Platform and account;
  4. Prior incidents;
  5. Any demand or condition;
  6. Whether the offender knows the victim’s location;
  7. Whether the offender has capacity to carry out the threat;
  8. Whether weapons, addresses, or family members were mentioned;
  9. Any follow-up messages;
  10. Witnesses who saw the threat.

Threats involving imminent harm should be reported immediately to law enforcement.


XVI. Reporting Non-Consensual Intimate Images

If intimate images or videos are posted, shared, or threatened:

  1. Preserve proof without further spreading the content;
  2. Report to the platform for urgent removal;
  3. Report to PNP or NBI cybercrime units;
  4. Identify where the content was posted or sent;
  5. Preserve messages showing threats or demands;
  6. Avoid paying blackmailers without legal guidance;
  7. Seek help from trusted family, counsel, or authorities;
  8. Consider protection remedies if the offender is a former partner.

Never repost the content to ask for help. That can worsen the harm and may create legal risk for others who redistribute it.


XVII. Reporting Doxxing

Doxxing involves publishing private information to expose, shame, threaten, or endanger someone.

Information may include:

  1. Home address;
  2. Phone number;
  3. Workplace;
  4. School;
  5. Family members’ names;
  6. Government IDs;
  7. Medical information;
  8. Financial information;
  9. Private photos;
  10. Travel plans or location.

Possible legal issues include privacy violations, threats, harassment, stalking, or data misuse.

For doxxing, preserve screenshots showing the private information, the account that posted it, comments encouraging harm, and any resulting threats.


XVIII. Reporting Impersonation or Fake Accounts

Impersonation may involve using another person’s name, photos, identity, or personal data to deceive, shame, scam, or harass.

Steps:

  1. Screenshot the fake profile;
  2. Copy the profile URL;
  3. Screenshot posts, messages, or comments made by the fake account;
  4. Report the account to the platform as impersonation;
  5. Notify friends, family, or contacts not to engage with the fake account;
  6. File a complaint if the impersonation causes harm, fraud, threats, defamation, or harassment.

If the fake account uses private photos or personal information, data privacy and cybercrime issues may arise.


XIX. Reporting Harassment in Group Chats

Group chat harassment can be legally significant even if it occurs in a “private” group.

Preserve:

  1. Group name;
  2. Participants;
  3. Messages;
  4. Dates and times;
  5. Admins or moderators;
  6. Screenshots showing who sent what;
  7. Files, stickers, images, or voice notes;
  8. Proof of exclusion, humiliation, or threats;
  9. Identity of members who participated or encouraged the harassment.

If the group chat involves classmates, report to the school. If it involves co-workers, report to HR. If it involves threats, sexual content, extortion, or minors, report to authorities.


XX. Reporting Harassment by Anonymous Accounts

Many offenders use fake or anonymous accounts. This does not mean the case is hopeless.

Victims should preserve:

  1. Profile links;
  2. Usernames;
  3. Screenshots;
  4. Messages;
  5. Dates and times;
  6. Clues about identity;
  7. Repeated patterns;
  8. Email addresses, phone numbers, or payment details used;
  9. IP or login information, if lawfully available;
  10. Witnesses who can identify the offender.

Law enforcement may request information from platforms through proper legal channels. Victims should not hack, phish, or illegally access accounts to identify the offender.


XXI. When the Harasser Is a Minor

If the offender is a minor, the matter may involve school discipline, parental intervention, barangay processes, child protection rules, and juvenile justice principles.

The victim should still preserve evidence and report the incident, especially if there are threats, sexual content, repeated harassment, or serious psychological harm.

Possible responses include:

  1. School investigation;
  2. Parent conferences;
  3. Counseling;
  4. Disciplinary action;
  5. Protection measures for the victim;
  6. Referral to child protection authorities;
  7. Legal action in serious cases.

The response should protect the victim while observing special rules applicable to children in conflict with the law.


XXII. When the Victim Is a Minor

When the victim is a child, urgency and sensitivity are crucial.

Parents or guardians should:

  1. Preserve evidence;
  2. Avoid blaming the child;
  3. Report to the school if school-related;
  4. Report to cybercrime authorities if serious;
  5. Report sexual exploitation or grooming immediately;
  6. Seek psychological support if needed;
  7. Limit exposure to the harasser;
  8. Strengthen privacy settings;
  9. Document emotional, academic, or social effects.

If the content involves sexual images of a minor, do not circulate the material. Report it directly to proper authorities and platforms.


XXIII. When the Harasser Is a Former Partner

Online harassment by a former spouse, boyfriend, girlfriend, live-in partner, or dating partner may involve coercive control, stalking, threats, sexual abuse, psychological violence, or VAWC.

Examples include:

  1. Threatening to leak private photos;
  2. Posting insults after breakup;
  3. Messaging the victim’s family or employer;
  4. Tracking location through apps;
  5. Demanding reconciliation;
  6. Threatening self-harm to manipulate the victim;
  7. Creating fake accounts after being blocked;
  8. Publicly accusing the victim of infidelity;
  9. Harassing the victim’s new partner;
  10. Using children as leverage.

Victims may seek protection orders and law enforcement assistance depending on the circumstances.


XXIV. When the Harassment Is Workplace-Related

Online harassment may be work-related even if posted after office hours.

Examples include:

  1. Co-workers mocking a colleague in group chats;
  2. Supervisors sending sexual messages;
  3. Employees posting defamatory claims about a co-worker;
  4. Sharing private HR information;
  5. Posting edited photos of a colleague;
  6. Online retaliation after a workplace complaint;
  7. Harassment through company communication tools.

Employees may report to HR, the committee on decorum and investigation, supervisors, legal department, or DOLE depending on the issue.

Employers should investigate fairly, preserve confidentiality, prevent retaliation, and impose appropriate disciplinary measures.


XXV. When the Harassment Is School-Related

School-related cyberbullying may occur outside campus but still affect the school environment.

Schools may act if the online conduct:

  1. Involves students of the school;
  2. Affects the victim’s ability to study;
  3. Creates fear or humiliation;
  4. Disrupts school order;
  5. Uses school group chats or class pages;
  6. Involves teachers, classmates, or school activities.

Parents should document the incidents and submit a written report to the school, attaching screenshots and links.


XXVI. Remedies Available to Victims

Depending on the case, remedies may include:

  1. Takedown of posts;
  2. Account suspension;
  3. Blocking or no-contact directives;
  4. School disciplinary action;
  5. Workplace disciplinary action;
  6. Barangay intervention;
  7. Protection orders;
  8. Criminal complaint;
  9. Civil damages;
  10. Injunction or court order;
  11. Correction, apology, or retraction;
  12. Data privacy complaint;
  13. Psychological support;
  14. Safety planning.

The best remedy depends on the victim’s goal: safety, takedown, accountability, compensation, discipline, or stopping contact.


XXVII. Platform Reporting vs. Criminal Complaint

Platform reporting and criminal complaints are different.

Platform Reporting

This may result in:

  1. Content removal;
  2. Account restriction;
  3. Account suspension;
  4. Warning;
  5. Loss of access to features;
  6. Removal from group or page.

It is usually faster but limited to platform rules.

Criminal Complaint

This may result in:

  1. Investigation;
  2. Subpoenas or preservation requests;
  3. Filing of criminal charges;
  4. Court proceedings;
  5. Penalties if convicted;
  6. Protective measures in certain cases.

It is more formal and may take longer, but it can impose legal accountability.

A victim may do both.


XXVIII. Should the Victim Send a Demand Letter?

A demand letter or cease-and-desist letter may be useful in some cases, especially for cyber libel, defamation, privacy violations, or harassment by an identifiable person.

A letter may demand:

  1. Immediate takedown;
  2. Cessation of harassment;
  3. Public apology;
  4. Retraction;
  5. Preservation of evidence;
  6. Payment of damages;
  7. No further contact.

However, in cases involving threats, sexual extortion, intimate images, minors, or danger, going directly to authorities may be safer than contacting the offender.


XXIX. Blocking the Harasser

Blocking may protect the victim from further abuse, but it may also prevent access to evidence. The practical approach is:

  1. Preserve evidence first;
  2. Report the content;
  3. Block if needed for safety;
  4. Ask trusted friends to monitor public posts if necessary;
  5. Avoid engaging through alternate accounts;
  6. Update privacy settings.

If the harasser creates new accounts, preserve evidence of each account and each attempt to contact the victim.


XXX. Privacy and Safety Measures

Victims should consider immediate safety steps:

  1. Change passwords;
  2. Enable two-factor authentication;
  3. Review account recovery emails and phone numbers;
  4. Set accounts to private;
  5. Remove unknown followers;
  6. Limit who can comment or message;
  7. Turn off location sharing;
  8. Remove address, workplace, or school details;
  9. Review tagged posts;
  10. Warn close contacts about impersonation or scams;
  11. Check for unauthorized logins;
  12. Secure cloud storage and private albums.

If the offender is a former partner, also check shared devices, family plans, location apps, email access, and password reuse.


XXXI. Mental Health and Support

Cyberbullying and online harassment can cause anxiety, fear, shame, depression, sleep problems, loss of confidence, school avoidance, work disruption, and trauma.

Victims should not handle serious harassment alone. They may seek support from:

  1. Trusted family or friends;
  2. School counselor;
  3. Workplace counselor or HR;
  4. Mental health professional;
  5. Lawyer;
  6. Women and children protection desk;
  7. Social worker;
  8. Crisis hotline or emergency service in urgent cases.

If a victim is at risk of self-harm, immediate support from trusted persons and emergency services is important.


XXXII. Special Rules for Public Figures and Public Criticism

Public figures, officials, influencers, business owners, and professionals may face harsh criticism online. Not all criticism is illegal.

There is a difference between:

  1. Lawful criticism;
  2. Opinion;
  3. Fair comment;
  4. Consumer complaint;
  5. Political speech;
  6. Defamation;
  7. threats;
  8. harassment;
  9. hate speech;
  10. doxxing.

A public complaint may be lawful if truthful, fair, and made without malice. However, false factual accusations, threats, sexual harassment, and disclosure of private information may still be actionable.


XXXIII. Defenses Commonly Raised by Respondents

A respondent may argue:

  1. The statement was true;
  2. The statement was opinion, not fact;
  3. The complainant was not identifiable;
  4. There was no publication to a third person;
  5. The account was fake or not controlled by respondent;
  6. The content was privileged communication;
  7. The complainant consented;
  8. The post was fair comment on a matter of public interest;
  9. The screenshot was edited or incomplete;
  10. The complaint was filed beyond the applicable period;
  11. The conduct was mutual argument, not harassment.

Victims should prepare evidence that addresses these likely defenses.


XXXIV. Importance of Identifying the Offender

A complaint is stronger when the offender is identifiable. Evidence connecting the account to the person may include:

  1. The account uses the person’s name and photos;
  2. The account has long been used by the person;
  3. Mutual friends recognize the account;
  4. The account posts personal details known only to the person;
  5. The account links to the person’s phone, email, or other accounts;
  6. The person admitted making the post;
  7. The person referred to facts from private conversations;
  8. The account was used in prior interactions;
  9. Witnesses can testify that the account belongs to the person;
  10. The account uses the same username across platforms.

If identity is uncertain, law enforcement may help investigate.


XXXV. Jurisdiction and Venue

Online harassment can raise venue issues because the victim, offender, server, platform, and audience may be in different places.

In practice, victims often report to the cybercrime unit, prosecutor, school, employer, or local authorities where they reside, where the harm occurred, where the post was accessed, or where the offender is located.

For formal filing, venue rules can be technical, especially for cyber libel and related offenses. Legal advice may be useful.


XXXVI. Prescription Periods

Legal complaints must be filed within the applicable prescriptive period. The period depends on the offense.

Because online offenses may involve different classifications, victims should not delay. Waiting too long may weaken the case, allow evidence to disappear, and create prescription issues.

For continuing harassment or repeated posts, each incident should be documented separately.


XXXVII. What Not to Do

Victims should avoid:

  1. Hacking the offender’s account;
  2. Doxxing the offender;
  3. Posting the offender’s private information;
  4. Threatening violence;
  5. Creating fake accounts to retaliate;
  6. Editing evidence;
  7. Publicly accusing someone without proof;
  8. Forwarding intimate content;
  9. Paying extortion without seeking help;
  10. Deleting evidence;
  11. Ignoring serious threats;
  12. Handling child sexual exploitation material casually.

Retaliation can expose the victim to counterclaims.


XXXVIII. Role of Lawyers

A lawyer can help:

  1. Assess whether the conduct is cyber libel, threats, harassment, privacy violation, VAWC, or another offense;
  2. Draft complaint-affidavits;
  3. Prepare evidence;
  4. Send demand letters;
  5. File criminal complaints;
  6. Seek protection orders;
  7. Coordinate with platforms or authorities;
  8. File civil cases for damages;
  9. Defend against counterclaims;
  10. Advise on settlement, apology, retraction, or takedown.

Legal help is especially useful for serious threats, intimate images, minors, public figures, business reputation damage, or cases involving unknown offenders.


XXXIX. Practical Reporting Guide

Step 1: Stay Safe

If there is immediate danger, contact law enforcement or emergency help.

Step 2: Preserve Evidence

Take screenshots, save URLs, download files where lawful, record timelines, and preserve witness details.

Step 3: Report to the Platform

Use the platform’s reporting tools. Report the specific content and account.

Step 4: Strengthen Privacy

Change passwords, enable two-factor authentication, restrict comments and messages, and secure accounts.

Step 5: Decide the Legal Route

Depending on the facts, report to PNP, NBI, prosecutor, barangay, school, employer, or relevant agency.

Step 6: Prepare Documents

Bring valid ID, screenshots, URLs, digital files, timeline, witness details, and proof of harm.

Step 7: File the Complaint

Submit the complaint to the proper authority and cooperate with investigation.

Step 8: Follow Up

Keep copies of filed documents, reference numbers, blotter entries, and notices.

Step 9: Avoid Retaliation

Do not harass back, dox, threaten, or spread private content.

Step 10: Seek Support

Cyberbullying is emotionally damaging. Get help from trusted people, counselors, lawyers, or support services.


XL. Sample Report Format for School, Employer, or Platform

Subject: Report of Online Harassment / Cyberbullying

Complainant: [Name] Person Reported: [Name/account/username, if known] Platform: [Facebook/Instagram/TikTok/X/YouTube/Messenger/etc.] Date/s of Incident: [Dates] Link/s: [URLs] Description: On [date], the account [username] posted/sent/commented the following: “[content or summary].” The post/message identified me because [reason]. It caused [effect]. Screenshots and links are attached.

Requested Action: I respectfully request investigation, takedown or preservation of the content, action against the account/person responsible, and measures to prevent further harassment.

Attachments: Screenshots, URLs, chat logs, witness statements, and other evidence.


XLI. Sample Complaint-Affidavit Outline

Republic of the Philippines [City/Municipality]

Affidavit-Complaint

I, [name], of legal age/minor represented by [parent/guardian], Filipino, residing at [address], after being duly sworn, state:

  1. I am filing this complaint for online harassment/cyberbullying committed against me.
  2. The respondent is [name], known to me as [relationship], using the account [account name/link].
  3. On [date], respondent posted/sent [describe content].
  4. A screenshot of the post/message is attached as Annex “A.”
  5. The post/message identified me because [explain].
  6. The statement/threat/harassment is wrongful because [explain].
  7. The post/message was seen by [persons/public/group], as shown by [comments/reactions/witnesses].
  8. On [date], respondent again [describe repeated act], attached as Annex “B.”
  9. Because of these acts, I suffered [fear, anxiety, reputational harm, school/work impact, etc.].
  10. I respectfully request investigation and appropriate legal action.

Signed this [date] at [place].

[Signature]

This is only a sample structure and should be adjusted to the facts and the specific offense.


XLII. Frequently Asked Questions

1. Is cyberbullying a crime in the Philippines?

It can be, depending on the conduct. Cyberbullying may fall under cyber libel, threats, unjust vexation, gender-based online sexual harassment, child protection laws, privacy violations, VAWC, or other offenses.

2. Can I report someone for insulting me online?

Possibly, but not every insult is a criminal offense. The content, context, repetition, publication, harm, and applicable law matter.

3. Can I sue someone for posting false accusations on Facebook?

Yes, if the elements of defamation or cyber libel are present. Preserve screenshots, links, comments, and evidence showing the statement is false and damaging.

4. What if the harasser uses a fake account?

Preserve all links and screenshots. Report to the platform and cybercrime authorities. Investigators may use lawful methods to identify the account holder.

5. Should I delete the post or ask the offender to delete it?

Preserve evidence first. After evidence is saved, you may report it for takedown. In serious cases, consult authorities before contacting the offender.

6. Can I post screenshots of the harasser to expose them?

Be careful. Publicly posting screenshots may create privacy, defamation, or retaliation issues. It is usually safer to submit evidence to platforms, school, employer, lawyer, or authorities.

7. Can I file a case if the post was deleted?

Yes, if you preserved evidence. Screenshots, witnesses, URLs, cached copies, and platform records may help.

8. Can I report harassment in private messages?

Yes. Private messages can support complaints for threats, harassment, sexual harassment, extortion, VAWC, or other offenses.

9. What if I replied angrily?

A bad reply does not automatically defeat your complaint, but it may affect how authorities view the case. Preserve the full conversation.

10. Can a minor file a complaint?

A parent, guardian, school, or authorized representative usually assists a minor. Serious cases involving minors should be reported promptly.

11. Can I get damages?

Possibly. Civil damages may be available for reputational harm, emotional suffering, privacy violations, and other injuries, depending on proof.

12. Is an apology enough?

That depends on the victim’s goal and seriousness of the harm. Some cases may be resolved through apology and takedown; others require legal action.


XLIII. Key Takeaways

Cyberbullying and online harassment in the Philippines may trigger civil, criminal, school, workplace, platform, privacy, or protection remedies.

The most important practical steps are:

  1. Preserve evidence before it disappears;
  2. Do not retaliate;
  3. Report the specific content to the platform;
  4. Secure social media and personal accounts;
  5. Report serious threats, sexual content, child-related abuse, or doxxing to authorities;
  6. Use school or workplace procedures when appropriate;
  7. Prepare a clear timeline and evidence folder;
  8. Seek legal or psychological support when needed.

XLIV. Conclusion

Reporting cyberbullying or online harassment on social media requires both practical and legal action. The victim should preserve evidence, report the harmful content to the platform, secure personal accounts, and determine the correct legal forum based on the nature of the abuse.

In the Philippine context, online harassment may involve cyber libel, threats, unjust vexation, gender-based online sexual harassment, privacy violations, child protection issues, VAWC, non-consensual intimate images, or civil liability. The correct remedy depends on the facts.

A victim does not need to tolerate online abuse simply because it happened on social media. Digital acts can have real legal consequences. With proper evidence, timely reporting, and appropriate legal guidance, victims can seek takedown, protection, accountability, damages, and relief from further harassment.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.