How to Report Harassing Text Messages in the Philippines

I. Introduction

Harassing text messages are not merely annoying or inconvenient. In the Philippines, they may give rise to criminal, civil, administrative, or regulatory liability, depending on the content of the messages, the identity of the sender, the means used, and the surrounding circumstances.

Text harassment may involve repeated insults, threats, stalking, blackmail, sexual remarks, debt-shaming, impersonation, publication of private information, extortion, scam messages, obscene content, or persistent unwanted communication. Because mobile numbers can be anonymous, prepaid, spoofed, or registered under false identities, victims often feel that reporting is futile. Philippine law, however, provides several reporting channels and legal remedies.

This article explains how harassing text messages may be reported in the Philippines, what laws may apply, what evidence should be preserved, which agencies may receive complaints, and what practical steps victims should take.


II. What Counts as Harassing Text Messages?

“Harassing text messages” is a broad practical term. It may refer to messages sent through SMS, messaging apps, or other electronic communication platforms. In the Philippine legal context, the conduct may fall under different offenses or causes of action.

Examples include:

  1. Repeated unwanted messages after the sender has been told to stop.
  2. Threats of physical harm, death, kidnapping, rape, or destruction of property.
  3. Threats to expose private photos, videos, secrets, debts, or personal information.
  4. Sexually explicit or obscene messages.
  5. Cyberstalking or monitoring behavior, including persistent messaging from multiple accounts or numbers.
  6. Debt collection harassment, including threats, humiliation, or messages sent to family, friends, employers, or contacts.
  7. Scam or phishing messages, especially those pretending to be from banks, government agencies, delivery services, employers, or relatives.
  8. Messages containing defamatory statements, especially when sent to third persons.
  9. Messages targeting women, children, employees, students, customers, public officials, or vulnerable persons.
  10. Messages using fake names, spoofed numbers, or impersonation.

The correct legal remedy depends on the facts. A single rude message may not always be criminal, but a message containing a threat, extortion demand, sexual harassment, identity theft, blackmail, or repeated unwanted contact may be actionable.


III. Key Philippine Laws That May Apply

A. Revised Penal Code

The Revised Penal Code may apply when the text messages contain threats, coercion, unjust vexation, grave slander, libel-related acts, or other punishable conduct.

1. Grave Threats

A person may be liable for threats if they threaten another with a crime, such as killing, injuring, abducting, raping, or burning property. Threatening messages should be treated seriously, especially if they include specific details such as a time, place, weapon, known address, workplace, school, or family member.

Examples:

“Papatayin kita mamaya.” “Alam ko saan ka nakatira.” “Sunugin ko bahay ninyo.” “Abangan kita sa labas ng opisina.”

The more specific and credible the threat, the more urgent the report should be.

2. Light Threats

Even if the threatened act is not necessarily a grave crime, threatening another person with harm, exposure, embarrassment, or pressure may still fall under punishable conduct depending on the circumstances.

3. Coercion

Messages forcing someone to do something against their will, such as paying money, meeting the sender, resigning from work, withdrawing a complaint, sending photos, or entering into a relationship, may constitute coercion or another offense.

4. Unjust Vexation

Persistent annoying, distressing, or disturbing messages may fall under unjust vexation, especially when the conduct causes irritation, distress, or emotional disturbance without lawful justification.

Unjust vexation is commonly raised in harassment cases where the messages are offensive, repeated, and intended to annoy or disturb, but do not neatly fall under a more specific offense.


B. Cybercrime Prevention Act of 2012

The Cybercrime Prevention Act of 2012, or Republic Act No. 10175, is one of the most important laws in cases involving harassment through electronic communications.

It may apply when the harassment is committed through information and communications technology, including text messages, social media, emails, messaging apps, and online accounts.

Possible cybercrime-related offenses include:

  1. Cyber libel
  2. Computer-related identity theft
  3. Computer-related fraud
  4. Cybersex-related acts
  5. Illegal access or misuse of accounts
  6. Threats, coercion, or harassment committed through electronic means, when connected to other punishable acts

Cyber Libel

If the sender spreads false and damaging accusations through text messages or online platforms, especially to third persons, cyber libel may be considered. A purely private insult sent only to the victim may not automatically be libel, because libel generally requires publication to another person. However, if the sender forwards defamatory statements to family members, coworkers, group chats, employers, classmates, or the public, cyber libel may become relevant.

Identity Theft

If the sender uses another person’s name, photo, number, account, or identity to harass, deceive, or damage someone, computer-related identity theft may apply.


C. Safe Spaces Act

The Safe Spaces Act, or Republic Act No. 11313, penalizes gender-based sexual harassment in streets, public spaces, online spaces, workplaces, and educational institutions.

This law is highly relevant when harassing text messages involve:

  1. Sexual remarks
  2. Requests for sexual favors
  3. Unwanted sexual comments
  4. Sending obscene photos or videos
  5. Repeated unwanted sexual advances
  6. Misogynistic, homophobic, transphobic, or sexist abuse
  7. Threats to release sexual images
  8. Gender-based stalking or online harassment

Under the Safe Spaces Act, online sexual harassment may include acts that use technology to terrorize, intimidate, threaten, harass, or shame another person on the basis of sex, gender, or sexual orientation.

Examples:

“Send ka ng nude or ikakalat ko pictures mo.” “Alam ko saan ka nag-aaral. Magkikita tayo.” “Ang landi mo, ipapahiya kita sa Facebook.” Repeated sexual messages after rejection. Sending unsolicited genital photos.

Victims may report to law enforcement, local government mechanisms, school authorities, workplace authorities, or other relevant offices depending on where and how the harassment occurred.


D. Anti-Photo and Video Voyeurism Act

The Anti-Photo and Video Voyeurism Act of 2009, or Republic Act No. 9995, may apply when the harassing messages involve intimate photos or videos.

This law is relevant if the sender:

  1. Threatens to release intimate photos or videos.
  2. Sends private sexual images without consent.
  3. Records or distributes intimate images without consent.
  4. Uses intimate content to blackmail, control, or shame the victim.

Even a threat to distribute intimate material should be treated as serious. Victims should preserve all messages showing the threat, the sender’s number or account, and any related demands.


E. Anti-Violence Against Women and Their Children Act

The Anti-Violence Against Women and Their Children Act, or Republic Act No. 9262, may apply when the harassing text messages come from a husband, former husband, boyfriend, former boyfriend, live-in partner, former partner, or someone with whom the woman has or had a sexual or dating relationship.

Text harassment under this law may include:

  1. Threats of harm
  2. Emotional abuse
  3. Controlling behavior
  4. Repeated insults or humiliation
  5. Threats involving children
  6. Economic abuse
  7. Stalking
  8. Blackmail
  9. Coercive messages demanding reconciliation, sex, money, custody concessions, or silence

RA 9262 is especially important because victims may seek a Barangay Protection Order, Temporary Protection Order, or Permanent Protection Order, depending on the case.

Examples:

“Pag hindi ka bumalik, kukunin ko anak natin.” “Ipapahiya kita sa pamilya mo.” “Hindi kita titigilan hangga’t hindi ka nakikipagbalikan.” “Papatayin kita pag nakita kitang may iba.”

For women facing abuse from intimate partners, reporting may be made to the barangay, police Women and Children Protection Desk, prosecutor’s office, or court.


F. Anti-Child Abuse Law and Special Protection Laws for Children

If the victim is a minor, additional protections apply. Harassing texts sent to children may involve child abuse, exploitation, grooming, trafficking, cybersex-related offenses, or online sexual abuse and exploitation of children.

Parents, guardians, teachers, school officials, and concerned adults should report immediately when messages to a minor contain:

  1. Sexual requests
  2. Grooming behavior
  3. Threats
  4. Requests for photos
  5. Attempts to meet privately
  6. Blackmail
  7. Bullying
  8. Sextortion
  9. Use of fake accounts to manipulate the child

The report may be made to the police, National Bureau of Investigation, Department of Social Welfare and Development, school authorities, barangay officials, or other child protection mechanisms.


G. Data Privacy Act

The Data Privacy Act of 2012, or Republic Act No. 10173, may apply if the harassment involves misuse of personal information.

Examples include:

  1. Publishing or threatening to publish the victim’s address, phone number, workplace, school, government IDs, photos, or private details.
  2. Using the victim’s personal data to intimidate or extort.
  3. Sharing the victim’s number with others for harassment.
  4. Unauthorized use of personal information by companies, collectors, agents, online lending apps, or organizations.
  5. Sending messages based on unlawfully obtained contact lists.

Complaints involving misuse of personal data may be reported to the National Privacy Commission, especially where the harasser is a business, lending company, employer, service provider, school, or organization handling personal data.


H. SIM Registration Act

The SIM Registration Act, Republic Act No. 11934, requires SIM users to register their SIM cards. This law is relevant because it may help authorities identify the registered owner of a number used for harassment, scams, threats, or fraud.

However, victims usually cannot personally demand subscriber information from a telco. The proper route is to report to law enforcement or the appropriate government agency so that lawful processes may be used to request information from telecommunications providers.

The SIM Registration Act does not automatically prevent harassment. Some offenders use stolen identities, registered SIMs under other names, online messaging apps, spoofing, or foreign numbers. Still, the registration system may assist investigations.


I. Lending Company and Debt Collection Rules

Harassing text messages are common in abusive debt collection. Lending companies, financing companies, online lending platforms, and their agents may be liable if they use threats, shaming, false accusations, abusive language, or unauthorized contact with the borrower’s contacts.

Examples of abusive debt-related text harassment:

  1. Threatening arrest for nonpayment of a civil debt.
  2. Claiming that police are coming without legal basis.
  3. Sending humiliating messages to friends, relatives, coworkers, or employers.
  4. Calling the borrower a scammer, criminal, or immoral person.
  5. Publishing the borrower’s photo or ID.
  6. Threatening to post the debt on social media.
  7. Using obscene or abusive language.
  8. Accessing the borrower’s phone contacts without valid consent.
  9. Pretending to be a lawyer, court, police officer, or government agency.

Possible reporting bodies include:

  1. Securities and Exchange Commission, for lending and financing companies.
  2. National Privacy Commission, for misuse of personal data.
  3. Philippine National Police or National Bureau of Investigation, for threats, extortion, cybercrime, identity theft, or harassment.
  4. Barangay or prosecutor’s office, depending on the offense.

IV. First Steps Before Reporting

Before filing a complaint, the victim should preserve evidence. Digital harassment cases often depend on screenshots, message metadata, phone numbers, account names, call logs, and proof of identity.

A. Do Not Delete the Messages

Do not delete the text thread, call logs, voicemail, screenshots, or related app messages. Original messages are better than screenshots alone.

B. Take Screenshots

Take clear screenshots showing:

  1. The sender’s number or account name.
  2. The date and time.
  3. The full message.
  4. The sequence of messages.
  5. Any threats, demands, or repeated contact.
  6. Any links, photos, attachments, or account details.

For long conversations, capture the full thread in order. Make sure the timestamps are visible.

C. Export or Back Up the Conversation

Where possible, export the conversation from the messaging app or back up the phone. For SMS, keep the phone and SIM available. For messaging apps, save the conversation, profile link, username, and account ID.

D. Record Call Logs

If the harassment includes calls, preserve:

  1. Call logs
  2. Missed calls
  3. Voicemails
  4. Dates and times
  5. Duration of calls
  6. Screenshots of repeated call attempts

E. Identify the Sender, If Known

Write down any information connecting the sender to a real person:

  1. Name
  2. Alias
  3. Phone number
  4. Social media account
  5. Email address
  6. Workplace
  7. Relationship to the victim
  8. Previous conversations
  9. Witnesses
  10. Motive

Do not fabricate or guess. If uncertain, say that the sender is unknown but the number or account is identified.

F. Do Not Engage Unnecessarily

A brief message such as “Stop contacting me” may be useful in some cases, but prolonged arguments can complicate the evidence. If there are threats, extortion, sexual exploitation, or abuse, it is often better to preserve the evidence and report promptly.

G. Block Only After Preserving Evidence

Blocking may stop the immediate harassment, but victims should first preserve evidence. If the sender uses multiple numbers or accounts, record each one.

H. Assess Immediate Danger

If the message contains a specific threat of violence, stalking, home invasion, kidnapping, sexual assault, or self-harm involving another person, report urgently to local police or emergency responders.


V. Where to Report Harassing Text Messages in the Philippines

A. Barangay

For less severe harassment, disputes involving known individuals, neighbors, former friends, family members, or community-based conflicts, the barangay may be the first practical venue.

The barangay may help through:

  1. Blotter entry
  2. Mediation or conciliation, where applicable
  3. Referral to police
  4. Issuance of Barangay Protection Order in qualified VAWC cases
  5. Documentation for future proceedings

However, serious crimes, cybercrimes, violence, sexual exploitation, child abuse, threats to life, or cases requiring urgent police action should not be delayed by barangay mediation.

B. Philippine National Police

Reports may be filed with the local police station. For women and children, the Women and Children Protection Desk is commonly involved. For cyber-related offenses, the matter may also be referred to cybercrime units.

Victims should bring:

  1. Valid ID
  2. Phone containing the messages
  3. Screenshots and printed copies
  4. Sender’s number or account details
  5. Timeline of events
  6. Names of witnesses
  7. Prior reports, if any
  8. Medical or psychological records, if relevant
  9. Proof of relationship, if VAWC applies

The police may record the complaint, prepare a blotter, assist with investigation, refer the matter to the prosecutor, or coordinate with specialized units.

C. PNP Anti-Cybercrime Group

For harassment involving online platforms, spoofing, identity theft, cyber libel, sextortion, phishing, scams, or threats sent electronically, the PNP Anti-Cybercrime Group may be relevant.

This is especially useful where the harasser is anonymous, uses multiple numbers, uses fake accounts, or involves digital evidence requiring technical investigation.

D. National Bureau of Investigation Cybercrime Division

The NBI Cybercrime Division may receive complaints involving cyber harassment, identity theft, cyber libel, online threats, sextortion, hacking, scams, and online exploitation.

The NBI may be appropriate where the case involves:

  1. Anonymous senders
  2. Fake accounts
  3. Coordinated online harassment
  4. Sextortion
  5. Online scams
  6. Impersonation
  7. Cyber libel
  8. Digital evidence requiring forensic handling

E. Office of the City or Provincial Prosecutor

A criminal complaint may be filed with the prosecutor’s office. The complainant usually submits a complaint-affidavit and supporting evidence. The prosecutor evaluates whether there is probable cause to file charges in court.

A complaint-affidavit should include:

  1. Personal details of the complainant
  2. Identity of the respondent, if known
  3. Chronological narration of events
  4. Exact or summarized contents of the messages
  5. Explanation of how the messages caused fear, distress, damage, or injury
  6. Screenshots and printed copies
  7. Certification or affidavit of witnesses, if any
  8. Other documentary evidence

For cybercrime cases, technical evidence and proper preservation of electronic evidence matter.

F. National Privacy Commission

Report to the National Privacy Commission if the harassment involves unauthorized processing, disclosure, misuse, or exposure of personal data.

This is especially relevant for:

  1. Online lending app harassment
  2. Unauthorized use of contacts
  3. Doxxing
  4. Disclosure of private addresses or numbers
  5. Misuse of IDs or photos
  6. Company or organization mishandling personal information
  7. Repeated marketing or collection messages based on improperly obtained data

The complaint should show what personal data was used, who used it, how it was obtained or disclosed, and how the misuse harmed the victim.

G. Securities and Exchange Commission

For harassment by lending companies, financing companies, or online lending platforms, a complaint may be filed with the Securities and Exchange Commission.

The complaint may include:

  1. Name of the lending company or app
  2. Screenshots of abusive messages
  3. Proof that contacts were messaged
  4. Threats or false statements made by collectors
  5. Loan documents or app screenshots
  6. Names or numbers of collectors
  7. Proof of unauthorized disclosure of debt information

This may be pursued alongside criminal, privacy, or civil remedies where appropriate.

H. Telecommunications Provider

Victims may report abusive, scam, or threatening numbers to their telco. Telcos may block, investigate, or preserve information subject to their policies and applicable law. However, telcos generally do not disclose subscriber information directly to private individuals without lawful authority.

Reporting to the telco is useful but should not replace reporting to law enforcement when the messages involve threats, extortion, scams, sexual harassment, or serious abuse.

I. School, Workplace, or Institution

If the harassment occurs in a school or workplace context, internal reporting may also be available.

Examples:

  1. Student sending harassing texts to another student.
  2. Employee sending sexual messages to a coworker.
  3. Supervisor threatening or coercing an employee.
  4. Teacher, coach, or administrator harassing a student.
  5. Customer, client, or contractor harassing staff.

Relevant offices may include:

  1. Human Resources
  2. Committee on Decorum and Investigation
  3. School discipline office
  4. Guidance office
  5. Gender and Development office
  6. Child protection committee
  7. Legal or compliance office

Internal remedies do not prevent the victim from filing a police or prosecutor complaint.


VI. How to Prepare a Report

A strong report is factual, organized, and supported by evidence.

A. Prepare a Timeline

Write a chronological timeline:

  1. When the harassment started.
  2. How often messages were sent.
  3. What numbers or accounts were used.
  4. Whether the sender was told to stop.
  5. Whether threats escalated.
  6. Whether other people were contacted.
  7. Whether the victim suffered fear, distress, reputational harm, financial loss, or emotional injury.
  8. Whether the sender knows the victim’s address, workplace, school, or family.

B. Prepare Printed Evidence

Print screenshots if filing physically. Arrange them in order and label them:

Annex A – Screenshot of message dated January 10 Annex B – Screenshot of threat dated January 11 Annex C – Call log showing repeated calls Annex D – Screenshot of sender’s account profile

C. Keep Digital Originals

Printed screenshots are useful, but digital originals are important. Keep the phone, SIM, account, app, and original thread available. Do not edit screenshots.

D. Prepare Identification and Contact Details

Bring a valid government ID. If filing for a minor, bring proof of authority, such as birth certificate, school ID, or guardianship documents where relevant.

E. Prepare a Complaint-Affidavit

For prosecutor-level complaints, a complaint-affidavit is usually necessary. It should be sworn before a prosecutor, notary public, or authorized officer.

A basic structure is:

  1. Name and personal circumstances of complainant.
  2. Name and personal circumstances of respondent, if known.
  3. Relationship between complainant and respondent.
  4. Facts of the harassment.
  5. Description of messages.
  6. Effect on the complainant.
  7. Laws possibly violated.
  8. List of attached evidence.
  9. Prayer for investigation and prosecution.
  10. Signature and jurat.

VII. Special Situations

A. If the Sender Is Unknown

A complaint may still be filed against an unknown sender identified by number, username, link, or account. Law enforcement may request assistance from telcos, platforms, or service providers through lawful processes.

The report should include:

  1. Phone number
  2. Message thread
  3. Time and date
  4. Any names or aliases used
  5. Links sent
  6. Payment accounts, if any
  7. Bank, e-wallet, or remittance details, if extortion or scam is involved
  8. Social media profile links

B. If the Sender Uses Many Numbers

Document each number separately. Create a table showing:

Date Time Number/Account Message Summary Evidence
Jan. 10 8:15 PM 09XX... Threatened to expose photos Screenshot A
Jan. 11 7:30 AM 09YY... Sent repeated insults Screenshot B
Jan. 11 9:00 PM FB Account Same person admitted identity Screenshot C

This helps show a pattern.

C. If the Messages Are From a Former Partner

Consider whether RA 9262 applies. If the victim is a woman and the sender is a former or current intimate partner, protection orders may be available. The victim may report to the barangay, police Women and Children Protection Desk, prosecutor, or court.

Evidence of the relationship may include photos, messages, birth certificates of children, prior admissions, witnesses, or shared residence.

D. If the Messages Contain Sexual Harassment

Consider the Safe Spaces Act, Anti-Photo and Video Voyeurism Act, cybercrime laws, and, if the victim is a minor, child protection laws.

Preserve:

  1. The exact sexual messages.
  2. Any images or videos sent.
  3. Threats to release private content.
  4. Proof that the communication was unwanted.
  5. Identity details of the sender.
  6. Any prior relationship or power imbalance.

E. If the Messages Are Debt Collection Harassment

Do not assume that nonpayment of debt justifies harassment. Debt collectors cannot freely threaten, shame, impersonate authorities, or disclose private debt information.

Preserve:

  1. Collector messages
  2. Numbers used
  3. Company or app name
  4. Loan documents
  5. Screenshots of app permissions
  6. Messages sent to contacts
  7. Threats of public shaming
  8. False legal threats

Possible complaints may involve the SEC, NPC, police, NBI, or prosecutor.

F. If the Messages Are Scam or Phishing Texts

Do not click links or provide OTPs, passwords, bank details, IDs, or e-wallet information. Preserve the message and report to the bank, e-wallet provider, telco, police, or cybercrime authorities.

If money was lost, immediately contact the bank, e-wallet provider, or payment platform to attempt account freezing or transaction tracing.

G. If the Messages Involve Threats to Life or Safety

Do not wait for the situation to worsen. Report immediately to the nearest police station or emergency authority. Threats that include specific locations, schedules, weapons, or family members should be treated as urgent.


VIII. Evidence Rules and Electronic Messages

Electronic evidence can be used in Philippine proceedings, but the party presenting it must be able to show authenticity, relevance, and integrity.

Important practices:

  1. Keep the original device.
  2. Do not alter or crop screenshots unnecessarily.
  3. Capture full timestamps.
  4. Preserve sender details.
  5. Save URLs, usernames, profile links, and phone numbers.
  6. Back up the files.
  7. Avoid editing images.
  8. Record how and when screenshots were taken.
  9. Ask witnesses to execute affidavits if they received messages too.
  10. Preserve related posts, emails, chats, and call records.

In some cases, law enforcement or counsel may recommend forensic extraction or certification from service providers.


IX. Blocking, Muting, and Safety Measures

Victims may block the sender after preserving evidence. They may also:

  1. Change privacy settings.
  2. Limit who can see their phone number or profile.
  3. Enable two-factor authentication.
  4. Change passwords.
  5. Warn close family, employer, school, or security personnel if threats are credible.
  6. Avoid meeting the sender alone.
  7. Report fake accounts.
  8. Avoid sending money in response to threats.
  9. Avoid sending more private photos or information.
  10. Keep emergency contacts informed.

Blocking is practical, but it should not be the only step when the messages involve serious threats, extortion, sexual coercion, stalking, or abuse.


X. Can the Sender Be Arrested Immediately?

Not always. Whether an arrest may be made depends on the circumstances.

For many text harassment cases, the usual process is:

  1. Complaint or report is filed.
  2. Evidence is evaluated.
  3. Investigation is conducted.
  4. Prosecutor determines probable cause.
  5. Case is filed in court.
  6. Warrant may issue, if appropriate.

However, urgent police response may occur if there is immediate danger, ongoing extortion, entrapment operation, violence, stalking, or other circumstances allowing lawful intervention.

Victims should not conduct vigilante action, entrapment without law enforcement guidance, public doxxing, or retaliatory threats. These may create legal risks.


XI. Can the Victim Sue for Damages?

Yes, depending on the case. Aside from criminal liability, the victim may consider civil claims for damages if the harassment caused emotional distress, reputational injury, financial loss, privacy violation, or other harm.

Possible civil bases may include:

  1. Abuse of rights
  2. Acts contrary to morals, good customs, or public policy
  3. Defamation-related damages
  4. Privacy violations
  5. Breach of data privacy obligations
  6. Civil liability arising from crime
  7. Employer, school, or company liability in appropriate cases

Civil actions require proof of damage and causation. Documentation of psychological impact, medical consultation, missed work, reputational harm, or financial loss may be useful.


XII. Common Mistakes Victims Should Avoid

  1. Deleting messages before reporting.
  2. Only taking cropped screenshots without sender details or timestamps.
  3. Engaging in long retaliatory arguments.
  4. Posting the sender’s private information online without legal advice.
  5. Paying blackmailers or sextortionists without reporting.
  6. Assuming anonymous numbers cannot be investigated.
  7. Failing to report escalation.
  8. Ignoring threats involving children, workplace, school, or home address.
  9. Waiting too long when the threat is specific and credible.
  10. Relying only on verbal narration without documentary proof.

XIII. Sample Incident Report Format

Incident Report: Harassing Text Messages

Complainant: Name: Address: Contact Number: Email:

Respondent/Sender: Name, if known: Mobile Number/Account: Relationship to Complainant:

Date Started: Most Recent Message: Frequency of Messages:

Narration: I received repeated unwanted text messages from the above number/account beginning on ________. The messages contained threats, insults, and demands. I told the sender to stop on ________, but the sender continued messaging me. On , the sender stated: “.” I felt afraid and distressed because ________.

Evidence Attached:

  1. Screenshot dated ________
  2. Screenshot dated ________
  3. Call log dated ________
  4. Profile screenshot of sender
  5. Witness affidavit of ________

Action Requested: I respectfully request that this matter be recorded, investigated, and referred for appropriate action.

Signature: Date:


XIV. Sample Complaint-Affidavit Outline

Republic of the Philippines City/Province of ________ Office of the City/Provincial Prosecutor

Complaint-Affidavit

I, [Name], of legal age, Filipino, residing at [address], after being sworn, state:

  1. I am the complainant in this case.
  2. The respondent is [name, if known], who may be contacted or identified through mobile number [number] or account [account].
  3. Beginning on [date], respondent sent me repeated harassing text messages.
  4. The messages included the following: [quote or summarize key messages].
  5. On [date], respondent threatened me by saying [message].
  6. I was placed in fear and suffered distress because [explain].
  7. Despite being told to stop, respondent continued sending messages.
  8. Attached are screenshots and records marked as Annexes “A” to “__.”
  9. I am executing this affidavit to charge respondent for the appropriate offense or offenses under Philippine law.

Affiant further sayeth naught.

Signature Name Date

Subscribed and sworn to before me this ___ day of ________.


XV. Practical Checklist Before Going to Authorities

Bring or prepare the following:

  1. Phone containing the original messages.
  2. SIM card used to receive the messages.
  3. Screenshots with dates, times, and sender details.
  4. Printed copies of screenshots.
  5. Valid ID.
  6. Timeline of events.
  7. Sender’s name, number, or account, if known.
  8. Witness names and contact details.
  9. Prior barangay or police blotter, if any.
  10. Medical, psychological, employment, or school records, if relevant.
  11. Proof of relationship, if VAWC applies.
  12. Proof of age, if the victim is a minor.
  13. Loan documents, if debt collection harassment is involved.
  14. Proof of data misuse, if privacy rights are involved.
  15. Any related emails, social media posts, or app messages.

XVI. Which Remedy Fits Which Situation?

Situation Possible Reporting Channel Possible Law or Remedy
Death threats by text Police, prosecutor, NBI/PNP cybercrime Revised Penal Code, cybercrime-related remedies
Repeated annoying messages Barangay, police, prosecutor Unjust vexation or other applicable offense
Sexual messages or gender-based harassment Police, school/workplace, prosecutor Safe Spaces Act, cybercrime laws
Threat to leak intimate photos Police, NBI/PNP cybercrime, prosecutor Anti-Photo and Video Voyeurism Act, cybercrime laws
Ex-partner harassment of woman Barangay, WCPD, prosecutor, court RA 9262 protection orders and criminal complaint
Harassment of child Police, WCPD, DSWD, school, NBI Child protection laws, cybercrime laws
Debt-shaming by lending app SEC, NPC, police, prosecutor Lending regulations, Data Privacy Act, criminal laws
Doxxing or misuse of personal data NPC, police, prosecutor Data Privacy Act, cybercrime-related remedies
Scam or phishing texts Bank/e-wallet, telco, police, NBI Cybercrime, fraud, identity theft
Defamatory group messages Prosecutor, NBI/PNP cybercrime Cyber libel, civil damages

XVII. Time Limits and Prescription

Legal time limits may apply. The period for filing depends on the offense. Some minor offenses have shorter prescriptive periods, while more serious offenses allow more time. Because classification matters, victims should report promptly and preserve evidence immediately.

Delay may weaken a case because:

  1. Messages may be lost.
  2. Numbers may be deactivated.
  3. Accounts may be deleted.
  4. Witness memory may fade.
  5. Platforms may not retain data indefinitely.
  6. The applicable prescriptive period may run.

Prompt reporting is especially important in cybercrime, threats, sextortion, child exploitation, and data privacy cases.


XVIII. Role of Lawyers

A lawyer is not always required to make an initial police or barangay report, but legal assistance is helpful when:

  1. The case involves serious threats.
  2. The respondent is known and likely to retaliate.
  3. The case involves intimate images.
  4. The case involves a former partner and protection orders.
  5. The case involves a child.
  6. The case involves a company, employer, school, or lending app.
  7. The victim wants to file a prosecutor complaint.
  8. The victim wants damages.
  9. The evidence is complex.
  10. The victim received counter-threats or legal intimidation.

Free legal assistance may be available from the Public Attorney’s Office for qualified individuals, law school legal aid offices, women and children protection units, non-government organizations, or local government legal aid programs.


XIX. What Authorities Usually Need to Establish

To act effectively on a complaint, authorities generally need to determine:

  1. What was sent – the exact content of the messages.
  2. Who sent it – the number, account, identity, or evidence linking the sender.
  3. When it was sent – dates and times.
  4. How it affected the victim – fear, distress, damage, coercion, reputational harm, financial loss.
  5. Whether the act is punishable – threats, harassment, sexual abuse, extortion, privacy violation, fraud, defamation, or other offense.
  6. Whether there is corroboration – witnesses, call logs, account records, screenshots, admissions, related posts, or platform data.

The clearer the evidence, the stronger the complaint.


XX. Conclusion

Harassing text messages in the Philippines may be reported through several channels, including the barangay, local police, PNP Anti-Cybercrime Group, NBI Cybercrime Division, prosecutor’s office, National Privacy Commission, Securities and Exchange Commission, telcos, schools, workplaces, or courts. The correct route depends on whether the messages involve threats, sexual harassment, intimate images, cybercrime, domestic abuse, child protection, scams, debt collection, defamation, or misuse of personal data.

The most important immediate step is to preserve evidence. Keep the original messages, take screenshots with timestamps and sender details, prepare a timeline, identify the sender if possible, and report promptly when the messages involve threats, coercion, sexual content, extortion, stalking, children, or personal safety. Philippine law provides remedies, but the strength of a complaint often depends on how clearly the victim documents the harassment and connects it to the proper legal basis.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.