How to Report Harassment by a Dummy Social Media Account

I. Introduction

Harassment through dummy social media accounts has become a common form of online abuse in the Philippines. A “dummy account” usually refers to a fake, anonymous, newly created, or impersonating social media profile used to hide the identity of the person behind it. These accounts may send threats, spread false accusations, publish private information, impersonate another person, post edited photos, solicit sexual content, stalk a victim, or repeatedly message someone despite being blocked.

In Philippine law, the fact that the harasser uses a fake account does not make the act harmless, private, or beyond legal reach. Online harassment may give rise to criminal, civil, administrative, school-based, employment-related, or platform-based remedies, depending on the nature of the conduct.

This article explains the legal framework, reporting options, evidence preservation, and practical steps for victims of harassment by dummy social media accounts in the Philippine context.


II. What Counts as Online Harassment by a Dummy Account?

Online harassment may include, among others:

  1. Threatening messages, such as threats to harm, rape, kill, expose, shame, or ruin someone.
  2. Repeated unwanted messages, especially after the victim has clearly told the sender to stop.
  3. Cyberstalking, monitoring, messaging, following, tagging, or contacting the victim through multiple accounts.
  4. Impersonation, where the dummy account uses the victim’s name, photos, identity, or personal details.
  5. Doxxing, or publishing private information such as address, phone number, workplace, school, family details, or private photos.
  6. Defamation, including false posts or messages that damage the victim’s reputation.
  7. Sexual harassment, such as sending sexual messages, demanding intimate images, or making obscene proposals.
  8. Non-consensual sharing of intimate images, threats to leak private photos or videos, or “revenge porn.”
  9. Blackmail or extortion, where the harasser demands money, sex, silence, or compliance.
  10. Harassment connected to gender, sexuality, age, disability, religion, political views, or personal status.
  11. Creation of fake posts, edited screenshots, deepfakes, or manipulated images intended to shame or intimidate the victim.
  12. Using the dummy account to contact the victim’s family, employer, school, clients, or friends.

The legal issue is not simply that the account is fake. The legal issue is what the person behind the account is doing.


III. Relevant Philippine Laws

Several Philippine laws may apply to harassment committed through a dummy social media account.

A. Cybercrime Prevention Act of 2012

The Cybercrime Prevention Act of 2012, or Republic Act No. 10175, is one of the primary laws used for online offenses.

It recognizes crimes committed through information and communications technology, including computers, mobile phones, the internet, and social media platforms.

Possible cybercrime-related offenses may include:

1. Cyber Libel

Cyber libel may apply when a dummy account posts or sends defamatory statements online. Libel involves a public and malicious imputation of a crime, vice, defect, act, omission, condition, status, or circumstance that tends to dishonor, discredit, or bring a person into contempt.

When libel is committed online, it may fall under cyber libel.

Examples may include:

  • Posting that someone is a thief, scammer, adulterer, drug user, prostitute, or criminal without basis.
  • Publishing fake allegations about a person’s professional or personal life.
  • Posting edited screenshots or fabricated accusations meant to destroy someone’s reputation.
  • Tagging the victim’s friends, family, employer, or school to spread the false accusation.

A private message may not always be treated the same as a public post, depending on how it was sent, to whom it was sent, and whether third persons saw it. However, defamatory statements sent to group chats, comment sections, shared posts, or multiple people may strengthen a cyber libel complaint.

2. Identity Theft or Misuse of Identity

RA 10175 penalizes computer-related identity theft, which may apply when a person acquires, uses, misuses, transfers, possesses, alters, or deletes identifying information belonging to another person through a computer system.

A dummy account may raise identity-related issues if it:

  • Uses the victim’s full name and photos.
  • Pretends to be the victim.
  • Sends messages as if it were the victim.
  • Uses private identifying information without consent.
  • Creates a false profile to damage the victim’s reputation.
  • Misleads others into believing the account belongs to the victim.

Not every fake account automatically qualifies as identity theft. The facts matter. The stronger cases usually involve unauthorized use of personal identifying information, impersonation, fraud, reputational harm, or deception.

3. Cyber Threats and Other Crimes Committed Through ICT

Some traditional crimes under the Revised Penal Code may be committed through online means. If the act is punishable under existing law and is committed through a computer system, RA 10175 may increase the legal consequences.

Examples include threats, coercion, unjust vexation, slander, grave scandal, extortion, blackmail, or other offenses depending on the facts.


B. Revised Penal Code

Even without relying solely on cybercrime law, the Revised Penal Code may apply.

1. Grave Threats

A threat may be criminal if the dummy account threatens to commit a wrong amounting to a crime, such as killing, injuring, raping, kidnapping, or destroying property.

Examples:

  • “I will kill you.”
  • “I know where you live.”
  • “I will hurt your child.”
  • “I will wait for you outside your school.”
  • “I will leak your private photos unless you obey me.”

The seriousness, context, wording, history between the parties, and ability of the victim to identify danger may matter.

2. Light Threats

A less severe threat may still be punishable if it involves intimidation, pressure, or a threat that does not rise to the level of grave threats.

3. Coercion

Coercion may apply where the harasser forces the victim to do something against their will, prevents the victim from doing something lawful, or compels the victim through violence, intimidation, or threats.

Online examples:

  • “Delete your post or I will expose you.”
  • “Meet me or I will send this to your parents.”
  • “Pay me or I will ruin your reputation.”
  • “Send photos or I will post your secrets.”

4. Unjust Vexation

Unjust vexation may be considered when the conduct causes annoyance, irritation, distress, or disturbance without lawful justification. It is often cited in harassment situations where the conduct may not fit neatly into a more specific offense but is still wrongful.

Repeated dummy-account messaging, insults, mockery, or nuisance conduct may potentially fall here depending on the facts.

5. Slander or Oral Defamation

Slander usually involves spoken defamatory statements. In online contexts, written posts are more commonly analyzed as libel or cyber libel, but voice notes, livestreams, audio clips, or videos may raise separate issues.

6. Alarms and Scandals

If the conduct causes public disturbance, scandal, or alarm, this offense may be considered depending on the circumstances.

7. Grave Coercion, Robbery, Estafa, or Extortion-Related Offenses

When the dummy account demands money, property, sexual favors, or other benefits through threats or deception, the matter may become more serious. It may involve extortion, robbery by intimidation, swindling, or other related crimes depending on how the demand was made.


C. Safe Spaces Act

The Safe Spaces Act, or Republic Act No. 11313, addresses gender-based sexual harassment in streets, public spaces, online spaces, workplaces, and educational institutions.

Online sexual harassment under this law may include acts committed through information and communications technology, such as social media, messaging apps, email, or other online platforms.

Relevant conduct may include:

  • Sending unwanted sexual remarks.
  • Sending obscene or lewd messages.
  • Making misogynistic, homophobic, transphobic, or sexist comments.
  • Uploading or sharing photos, videos, or information with sexual content without consent.
  • Making threats involving sexual harm or humiliation.
  • Repeatedly contacting someone with sexual messages after being rejected.
  • Creating fake accounts to sexually harass or shame someone.

The Safe Spaces Act is especially relevant when the harassment is gender-based, sexual, misogynistic, homophobic, transphobic, or targeted because of the victim’s sex, gender identity, gender expression, or sexual orientation.


D. Anti-Photo and Video Voyeurism Act

The Anti-Photo and Video Voyeurism Act of 2009, or Republic Act No. 9995, may apply when intimate images or videos are recorded, copied, reproduced, shared, sold, distributed, published, or broadcast without consent.

This law is relevant if a dummy account:

  • Threatens to leak intimate photos or videos.
  • Posts intimate images without consent.
  • Shares private sexual content in group chats.
  • Uses intimate material to blackmail the victim.
  • Circulates screenshots, videos, or recordings of sexual acts or private body parts.

Consent to taking a photo or video does not necessarily mean consent to sharing it. Even if the victim originally sent the material privately, unauthorized distribution may still be unlawful.


E. Anti-Violence Against Women and Their Children Act

The Anti-Violence Against Women and Their Children Act, or Republic Act No. 9262, may apply when the offender is a current or former spouse, person with whom the woman has or had a sexual or dating relationship, or person with whom she has a common child.

Online harassment by an ex-partner may fall under psychological violence, harassment, threats, stalking, intimidation, or emotional abuse.

Examples:

  • An ex-partner uses dummy accounts to monitor, threaten, or shame the victim.
  • The offender posts private conversations or intimate photos.
  • The offender threatens to harm the victim or her children.
  • The offender sends messages to the victim’s employer, family, or friends to humiliate her.
  • The offender repeatedly creates new accounts after being blocked.

Victims may seek protection orders, including barangay protection orders, temporary protection orders, or permanent protection orders, depending on the circumstances.


F. Special Protection of Children Against Abuse, Exploitation and Discrimination Act

If the victim is a minor, additional legal protections may apply under laws protecting children from abuse, exploitation, cyber exploitation, bullying, trafficking, and sexual abuse.

Harassment involving minors is treated seriously, especially where there are:

  • Sexual messages to a child.
  • Grooming.
  • Threats to expose private photos.
  • Requests for nude images.
  • Blackmail.
  • Impersonation of a child.
  • Cyberbullying.
  • Exploitation or trafficking indicators.

Where a minor is involved, parents, guardians, schools, barangay officials, social workers, law enforcement, and child protection authorities may become involved.


G. Anti-Bullying Act

The Anti-Bullying Act of 2013, or Republic Act No. 10627, applies in the school context and includes cyberbullying.

If the harasser and victim are students, or if the harassment affects the school environment, the school may have duties under its anti-bullying policies.

Cyberbullying may include:

  • Fake accounts used to ridicule a student.
  • Group chats created to shame someone.
  • Edited photos or memes.
  • Anonymous confession pages.
  • Threatening comments.
  • Harassing posts.
  • Spreading rumors online.

A victim may report the matter to the school, guidance office, class adviser, principal, or child protection committee, in addition to police or platform remedies where appropriate.


H. Data Privacy Act

The Data Privacy Act of 2012, or Republic Act No. 10173, may be relevant when personal information is collected, used, shared, or published without lawful basis.

Examples:

  • Posting someone’s address, phone number, ID, workplace, school, or family details.
  • Sharing screenshots containing private information.
  • Publishing private messages without consent in a harmful context.
  • Using someone’s photos or identity details to create fake accounts.
  • Doxxing.

The National Privacy Commission may be relevant where the case involves unauthorized processing, disclosure, or misuse of personal data, although not every online harassment case is primarily a data privacy case.


I. Civil Code Remedies

Aside from criminal remedies, the victim may also have civil remedies under the Civil Code, especially when the harassment causes damage to reputation, emotional distress, privacy, dignity, business, employment, or relationships.

Possible civil claims may include damages based on:

  • Defamation.
  • Abuse of rights.
  • Violation of privacy.
  • Intentional harm.
  • Moral damages.
  • Exemplary damages.
  • Attorney’s fees, where legally justified.

Civil action may be separate from or related to a criminal complaint, depending on the offense and procedural posture.


IV. Where to Report Harassment by a Dummy Account

A victim in the Philippines may report through several channels.

A. Report to the Social Media Platform

The first practical step is often to report the dummy account to the platform.

Common report categories include:

  • Harassment or bullying.
  • Impersonation.
  • Hate speech.
  • Threats.
  • Nudity or sexual exploitation.
  • Sharing private images.
  • Fake account.
  • Scam or fraud.
  • Privacy violation.
  • Child safety concern.

Platform reporting can result in:

  • Account suspension.
  • Content removal.
  • Profile restriction.
  • Message blocking.
  • Preservation of some internal records.
  • Escalation for law enforcement requests.

However, platform reporting alone may not identify the offender or produce legal accountability. Platforms generally do not disclose account ownership, IP logs, or registration information to private individuals without lawful process.

B. Report to the Philippine National Police Anti-Cybercrime Group

The PNP Anti-Cybercrime Group handles cybercrime-related complaints and may assist with investigation, documentation, and referral for prosecution.

A victim may prepare:

  • Screenshots.
  • URLs.
  • Account links.
  • Chat records.
  • Threat messages.
  • Dates and times.
  • Names of witnesses.
  • Any suspected identity of the harasser.
  • Proof of damage or fear.
  • Prior reports to the platform.
  • Devices used to receive the harassment.

For serious threats, sexual exploitation, blackmail, child-related abuse, or ongoing danger, law enforcement reporting should be prioritized.

C. Report to the National Bureau of Investigation Cybercrime Division

The NBI Cybercrime Division may investigate cybercrime complaints, including harassment, cyber libel, online threats, identity theft, hacking, sextortion, and other technology-assisted offenses.

A complaint may require a written statement, evidence, screenshots, URLs, and supporting documents.

D. Report to the Barangay

For some disputes, especially where the offender is known and lives in the same city or municipality, barangay proceedings may be relevant. However, certain offenses and cases involving serious crimes, minors, violence against women and children, or cybercrime issues may require direct referral to law enforcement, prosecutors, courts, or specialized agencies.

Barangay assistance may be useful for:

  • Immediate community intervention.
  • Documentation.
  • Protection concerns.
  • Cases involving known neighbors or local acquaintances.
  • Referral to police or social services.

E. Report to the Prosecutor’s Office

Criminal complaints may be filed for preliminary investigation before the prosecutor’s office, depending on the offense. The complaint should usually include a sworn statement and supporting evidence.

The prosecutor evaluates whether there is probable cause to file a criminal case in court.

F. Report to the School

If the victim or offender is a student, or the harassment affects the school environment, the matter may be reported to:

  • Class adviser.
  • Guidance counselor.
  • Principal.
  • School head.
  • Child protection committee.
  • Discipline office.
  • College dean or student affairs office.

Schools may impose administrative sanctions separate from criminal or civil proceedings.

G. Report to the Employer or Human Resources

If the harassment involves coworkers, supervisors, clients, employees, or workplace retaliation, the victim may report to HR, management, compliance, or the company’s safe spaces or anti-harassment committee.

Workplace-related online harassment may lead to administrative discipline, termination proceedings, or Safe Spaces Act remedies.

H. Report to the National Privacy Commission

Where the harassment involves misuse, unauthorized disclosure, or publication of personal information, a victim may consider a complaint with the National Privacy Commission.

This may be relevant in doxxing, identity misuse, unauthorized publication of personal data, or privacy violations.


V. Evidence: What to Preserve Before Reporting

Evidence is crucial because dummy accounts may be deleted, renamed, hidden, or changed quickly.

Victims should preserve evidence before blocking or reporting, when safe to do so.

A. Take Clear Screenshots

Screenshots should show:

  • The username or profile name.
  • Profile picture.
  • Profile URL or account link.
  • The message or post.
  • Date and time.
  • Comments, reactions, shares, or tags.
  • The victim’s account receiving the message.
  • Any threats or identifying details.

For chat messages, capture the conversation context, not just one isolated line.

B. Record URLs

Copy links to:

  • The dummy account profile.
  • Specific posts.
  • Comments.
  • Photos.
  • Videos.
  • Shared content.
  • Group posts.
  • Marketplace listings.
  • Pages or groups involved.

URLs are important because usernames and profile names can be changed.

C. Screen Record When Necessary

A screen recording may help show:

  • The account exists.
  • The content was accessible.
  • The sequence of messages.
  • The profile URL.
  • The date and time on the device.
  • The user navigating from the profile to the offending post or message.

Screen recordings can be useful where screenshots may be challenged as incomplete or edited.

D. Save Original Files

Save:

  • Photos.
  • Videos.
  • Voice messages.
  • PDFs.
  • Email headers.
  • Chat exports.
  • Downloaded content.
  • Links to cloud-stored files.
  • Metadata, where available.

Do not alter the original file if possible.

E. Preserve Device and Account Access

Do not delete the conversation unless necessary for safety. Keep access to the account where the messages were received.

Investigators may ask to inspect the device or verify screenshots.

F. Note the Timeline

Prepare a written timeline with:

  • First contact.
  • Dates and times of harassment.
  • Platforms used.
  • Account names and links.
  • What was said or posted.
  • Who saw it.
  • How the victim responded.
  • Whether the account was blocked.
  • Whether new dummy accounts appeared.
  • Any suspected person behind the account.
  • Prior conflict or motive.
  • Harm suffered.

G. Identify Witnesses

Witnesses may include:

  • Friends who saw the posts.
  • Group chat members.
  • Family members who received messages.
  • Coworkers or classmates who saw the harassment.
  • People tagged by the dummy account.
  • People who can identify the writing style, photos, or circumstances.

H. Keep Proof of Harm

Depending on the case, preserve proof of:

  • Emotional distress.
  • Missed work or school.
  • Medical or counseling consultations.
  • Reputational damage.
  • Lost clients.
  • Employment consequences.
  • Threats to safety.
  • Family disruption.
  • Financial loss.
  • Platform reports.
  • Police blotter entries.

VI. What Not to Do

Victims should avoid actions that may weaken their case or create legal exposure.

A. Do Not Hack the Dummy Account

Even if the account is harassing you, hacking, guessing passwords, accessing private data, or taking over the account may expose you to criminal liability.

B. Do Not Publicly Accuse a Suspect Without Evidence

It may be tempting to post, “I know this dummy account is operated by ___.” But if the accusation is wrong or cannot be proven, the victim may face defamation claims.

It is safer to state facts:

  • “This account has been harassing me.”
  • “I have reported this account.”
  • “Please do not engage with or share content from this account.”
  • “Evidence has been preserved for authorities.”

Avoid naming a suspected person publicly unless advised and supported by evidence.

C. Do Not Retaliate With Threats

Threatening the harasser, insulting them publicly, or creating a counter-dummy account may complicate the case.

D. Do Not Delete Evidence Too Quickly

Blocking may be necessary, but before blocking, preserve screenshots, links, and recordings if it is safe.

E. Do Not Pay Sextortion or Blackmail Demands

Paying may encourage further demands. In sextortion cases, preserve evidence and report immediately to law enforcement or a trusted authority.

F. Do Not Send More Private Information

Do not send IDs, selfies, intimate images, money, location details, or passwords to a dummy account.


VII. How to Draft a Complaint

A complaint should be factual, chronological, and supported by evidence.

A. Basic Contents

A written complaint may include:

  1. Full name, address, contact details, and identification of the complainant.
  2. Name or description of the respondent, if known.
  3. Social media account name, profile link, username, and screenshots.
  4. Dates and times of incidents.
  5. Description of what happened.
  6. Explanation of how the victim was harmed.
  7. List of attached evidence.
  8. Names of witnesses.
  9. Request for investigation and appropriate legal action.
  10. Signature and oath, if required.

B. Sample Structure

Complaint-Affidavit

I, [name], of legal age, Filipino, residing at [address], after being sworn, state:

  1. I am the complainant in this case.
  2. I use the social media account [account name/link].
  3. On or about [date], I received messages from a dummy account using the name [account name] with the profile link [URL].
  4. The account sent the following messages: [quote or summarize].
  5. The account also posted/commented/shared the following: [describe].
  6. Attached are screenshots marked as Annexes “A,” “B,” and “C.”
  7. The messages caused me fear, distress, reputational harm, and concern for my safety because [explain].
  8. I believe the person behind the account may be [name, if known], because [facts, not speculation].
  9. I respectfully request that this matter be investigated for possible violations of applicable laws, including cybercrime, threats, harassment, identity theft, defamation, or other offenses as may be determined by the authorities.
  10. I am executing this affidavit to attest to the truth of the foregoing and to support my complaint.

The complaint should avoid exaggeration. It should separate facts from conclusions. Statements such as “I suspect” or “I believe” should be supported by facts.


VIII. Can Authorities Identify the Person Behind a Dummy Account?

Possibly, but not always immediately.

Authorities may investigate through:

  • Account URLs.
  • Platform records.
  • Login information.
  • IP addresses.
  • Device identifiers.
  • Phone numbers or emails linked to the account.
  • Recovery information.
  • Payment records, if any.
  • Posting patterns.
  • Writing style.
  • Shared photos or metadata.
  • Witness testimony.
  • Cross-account similarities.
  • Links between the dummy account and real accounts.

Private individuals usually cannot compel a platform to reveal account information. Law enforcement or courts may use lawful procedures to request data, subject to platform policies, privacy laws, jurisdictional limits, and data retention periods.

Speed matters because platforms may not retain all data indefinitely.


IX. Importance of URLs, Not Just Screenshots

Screenshots are useful, but URLs are often more important for investigation. A screenshot without a profile link may be harder to verify.

Victims should capture:

  • Profile URL.
  • Post URL.
  • Comment URL.
  • Message thread details.
  • Group or page URL.
  • Username or handle.
  • Numeric account ID, if visible.
  • Date and time.

If the platform allows “copy link,” use it.


X. When the Dummy Account Impersonates You

If the dummy account uses your name, photo, or identity, report it as impersonation on the platform and preserve evidence.

Possible legal issues include:

  • Identity theft.
  • Data privacy violation.
  • Cyber libel, if defamatory content is posted.
  • Fraud, if the account scams others using your identity.
  • Civil liability for damage to reputation or privacy.
  • Harassment or unjust vexation.

Practical steps:

  1. Screenshot the fake profile.
  2. Copy the profile URL.
  3. Screenshot posts, messages, friend requests, or scams.
  4. Ask friends who received messages to screenshot them.
  5. Report the profile for impersonation.
  6. Post a careful notice on your real account if necessary, without naming unverified suspects.
  7. File a report with law enforcement if there is harm, fraud, threats, or repeated conduct.

A public notice may say:

“Please be informed that this account is not mine: [profile name/link]. I have reported it for impersonation. Please do not engage with it or send money, information, or private messages to it.”


XI. When the Harassment Involves Intimate Photos or Sextortion

Sextortion and non-consensual intimate image abuse should be treated as urgent.

Immediate steps:

  1. Do not send more images or money.
  2. Preserve all threats and demands.
  3. Screenshot the account, messages, and payment instructions.
  4. Save profile URLs and message links.
  5. Report the content to the platform under sexual exploitation, non-consensual intimate images, or harassment.
  6. Report to law enforcement.
  7. Inform a trusted person if safety or self-harm risk is present.
  8. If the victim is a minor, involve a parent, guardian, child protection authority, school official, or law enforcement immediately.

Relevant laws may include RA 9995, RA 10175, RA 11313, child protection laws, anti-trafficking laws, threats, coercion, extortion, and other applicable offenses.


XII. When the Harasser Is an Ex-Partner

Dummy-account harassment by an ex-partner is common. It may involve stalking, jealousy, revenge, sexual threats, image-based abuse, or reputational attacks.

Legal routes may include:

  • RA 9262, if the victim is a woman and the offender is a current or former spouse, dating partner, sexual partner, or person with whom she has a child.
  • Protection orders.
  • Cybercrime complaint.
  • Safe Spaces Act complaint.
  • Criminal complaint for threats, coercion, unjust vexation, cyber libel, or other offenses.
  • Civil action for damages.

Evidence of past relationship, prior abuse, repeated contact, blocked accounts, threats, and emotional harm may be relevant.


XIII. When the Victim Is a Minor

If the victim is a child, the matter should be handled with urgency and sensitivity.

Actions:

  1. Preserve evidence.
  2. Avoid blaming the child.
  3. Do not confront the suspected offender recklessly.
  4. Report to parents, guardians, school authorities, barangay officials, social workers, or law enforcement.
  5. For sexual content, grooming, blackmail, or exploitation, report immediately.
  6. Avoid circulating screenshots of sexual or humiliating content involving the child, even for “awareness.”

School remedies and criminal remedies may both apply.


XIV. When the Harassment Happens in a Group Chat

Group chats can be important evidence.

Preserve:

  • Group name.
  • List of members, if visible.
  • Messages.
  • Dates and times.
  • Admin identities.
  • Photos, videos, or files shared.
  • Reactions or replies.
  • Any statements showing coordination.
  • Whether the victim was added without consent.
  • Whether the group was created to shame or threaten the victim.

Depending on the facts, liability may extend beyond the dummy account to those who created, encouraged, shared, reposted, or participated in the harassment.


XV. Public Posts vs. Private Messages

Legal treatment may differ depending on whether the harassment occurred publicly or privately.

Public Posts

Public posts may strengthen claims involving:

  • Cyber libel.
  • Public humiliation.
  • Reputational damage.
  • Gender-based online sexual harassment.
  • Doxxing.
  • Privacy violations.
  • Bullying.

Private Messages

Private messages may still support claims involving:

  • Threats.
  • Coercion.
  • Sextortion.
  • Unjust vexation.
  • Stalking.
  • Sexual harassment.
  • Psychological violence.
  • Identity theft.
  • Evidence of intent.

A private message is not automatically “not a crime.” Threats and coercion may occur privately.


XVI. The Role of Notarization and Affidavits

For formal complaints, victims may need to execute a complaint-affidavit. This is a sworn statement made under oath.

A strong affidavit should:

  • State facts in chronological order.
  • Identify the dummy account clearly.
  • Attach evidence as annexes.
  • Avoid unsupported conclusions.
  • Explain harm or fear.
  • Identify witnesses.
  • State why the victim suspects a particular person, if applicable.
  • Be signed and notarized or sworn before the proper officer when required.

XVII. Common Defenses Raised by Harassers

A person accused of operating a dummy account may claim:

  1. “It was not me.”
  2. “The account was hacked.”
  3. “It was just a joke.”
  4. “The posts were true.”
  5. “The victim edited the screenshots.”
  6. “The messages were private.”
  7. “There was no damage.”
  8. “I did not intend to harass.”
  9. “Someone else used my phone.”
  10. “The victim provoked me.”

This is why preserving complete, verifiable, time-stamped evidence is important.


XVIII. Authentication of Online Evidence

In legal proceedings, electronic evidence may need to be authenticated. This means showing that the screenshots, messages, posts, or files are what the complainant claims they are.

Helpful authentication practices include:

  • Keeping original screenshots.
  • Keeping the device used.
  • Preserving URLs.
  • Taking screen recordings.
  • Exporting chat logs where possible.
  • Having witnesses who saw the posts.
  • Keeping platform notification emails.
  • Avoiding edits, filters, or cropping.
  • Printing screenshots with dates and URLs.
  • Saving metadata where available.
  • Having an investigator or lawyer assist in evidence preservation.

XIX. Can You Sue the Platform?

Usually, the immediate remedy is to report the account to the platform and to authorities. Suing the platform itself is generally more complicated and may involve issues of jurisdiction, terms of service, content moderation policies, immunity doctrines in other jurisdictions, and contractual limitations.

The stronger focus is usually on:

  • Removing the content.
  • Preserving evidence.
  • Identifying the offender.
  • Filing criminal, civil, school, workplace, or administrative complaints against the responsible person.

XX. Urgent Situations

Some cases require immediate action rather than ordinary reporting.

Treat the matter as urgent if there is:

  • Threat of physical harm.
  • Threat of rape, murder, kidnapping, or stalking.
  • Publication or threatened publication of intimate images.
  • Harassment of a minor.
  • Extortion or blackmail.
  • Doxxing with address or location.
  • Threats involving weapons.
  • Messages showing the harasser knows the victim’s real-time location.
  • Suicidal distress caused by the harassment.
  • Repeated account creation after blocking.
  • Contact with the victim’s school, employer, family, or clients.
  • Indications of trafficking, grooming, or exploitation.

In urgent danger, contact local police or emergency services immediately.


XXI. Practical Step-by-Step Guide

Step 1: Do Not Engage More Than Necessary

Avoid arguing with the dummy account. A short message such as “Stop contacting me” may be useful, but repeated engagement can escalate the situation.

Step 2: Preserve Evidence

Take screenshots, save URLs, record videos, export chats, and keep the device.

Step 3: Identify the Type of Harassment

Classify the conduct:

  • Threats.
  • Defamation.
  • Impersonation.
  • Sexual harassment.
  • Sextortion.
  • Doxxing.
  • Cyberbullying.
  • Stalking.
  • Data privacy violation.
  • VAWC-related abuse.
  • Child-related exploitation.

Step 4: Report to the Platform

Use the platform’s report tools. Choose the most accurate category.

Step 5: Block or Restrict

After preserving evidence, block or restrict the account if continued exposure is harmful.

Step 6: Warn Close Contacts Carefully

If impersonation or scams are involved, alert friends, family, classmates, coworkers, or clients in a factual and non-defamatory way.

Step 7: File a Formal Report

Report to the appropriate office:

  • PNP Anti-Cybercrime Group.
  • NBI Cybercrime Division.
  • Prosecutor’s Office.
  • Barangay, where suitable.
  • School.
  • Employer.
  • National Privacy Commission.
  • Women and Children Protection Desk, if applicable.

Step 8: Consider Legal Counsel

A lawyer can help classify the offense, prepare the complaint-affidavit, organize evidence, avoid defamation risks, and choose the correct forum.


XXII. Sample Evidence Checklist

A complainant should prepare:

  • Government ID.
  • Printed screenshots.
  • Digital copies of screenshots.
  • URLs of account and posts.
  • Screen recordings.
  • Chat exports.
  • Timeline of events.
  • Platform report confirmations.
  • Witness names and contact details.
  • Proof of identity misuse.
  • Proof of damage.
  • Medical or counseling records, if relevant.
  • School or work reports, if relevant.
  • Prior messages from suspected offender, if relevant.
  • Evidence linking dummy account to suspected person, if any.

XXIII. Sample Platform Report Statement

A concise platform report may say:

This account is harassing me and appears to be a fake or dummy account. It has sent threatening/abusive messages and posted harmful content about me. The account has used my name/photos/private information without permission. I am requesting removal of the content and action against the account.

For impersonation:

This account is pretending to be me. It is using my name/photo/identity without my permission. I am the person being impersonated and request immediate removal.

For intimate images:

This account has shared or threatened to share intimate images without my consent. This is non-consensual intimate content and harassment. Please remove the content and preserve relevant records.


XXIV. Sample Police or NBI Complaint Summary

A short complaint summary may say:

I respectfully report that a dummy social media account using the name [account name] and profile link [URL] has been harassing me since [date]. The account sent threatening messages, including [brief quote], and posted false/private/sexual information about me. I preserved screenshots, URLs, and screen recordings. The harassment has caused me fear, distress, and reputational harm. I request investigation and appropriate legal action under Philippine laws on cybercrime, threats, harassment, identity misuse, defamation, privacy, and other applicable offenses.


XXV. Special Considerations for Cyber Libel

Cyber libel complaints require careful handling because defamation law involves technical elements.

A complainant should consider:

  1. Was there an imputation against the victim?
  2. Was it published or communicated to a third person?
  3. Was the victim identifiable?
  4. Was the statement malicious?
  5. Was the statement false or defamatory?
  6. Was it made online?

Evidence should show who saw the post, how the victim was identified, and how reputation was harmed.

The accused may raise defenses such as truth, fair comment, lack of malice, privileged communication, or lack of identification. Because cyber libel has legal and constitutional sensitivities, legal advice is especially important.


XXVI. Special Considerations for Threats

For threats, preserve the exact wording. The difference between “I hate you” and “I will kill you tonight outside your house” is legally significant.

Useful evidence includes:

  • Exact threat.
  • Date and time.
  • Whether the harasser knows the victim’s address.
  • Prior violence.
  • Stalking behavior.
  • Mention of weapons.
  • Contact with family members.
  • Attempts to locate the victim.
  • Repeated messages after blocking.
  • Any demand attached to the threat.

Threats should be reported quickly if there is any safety risk.


XXVII. Special Considerations for Doxxing

Doxxing can create physical danger. If the dummy account publishes the victim’s address, school, workplace, phone number, or family information:

  1. Screenshot the post.
  2. Copy the URL.
  3. Report it to the platform as privacy violation or harassment.
  4. Ask friends not to share it.
  5. Consider changing passwords and privacy settings.
  6. Inform household members, school, employer, or security personnel if needed.
  7. Report to law enforcement if safety is threatened.

Doxxing may implicate privacy, cybercrime, harassment, threats, or other laws depending on context.


XXVIII. Special Considerations for Anonymous Confession Pages

Many harassment cases arise from anonymous pages or community confession pages. Administrators may claim they only publish submissions, but they may still face consequences if they knowingly publish defamatory, harassing, sexual, private, or harmful content.

Victims should preserve:

  • The page URL.
  • The post URL.
  • Comments.
  • Admin or moderator identities, if visible.
  • Submission instructions.
  • Reposts and shares.
  • Evidence that the victim asked for takedown.
  • Any refusal to remove the post.

Possible remedies may include platform reporting, school reporting, cyber libel complaints, Safe Spaces Act complaints, privacy complaints, or civil claims.


XXIX. Protection Orders and Safety Measures

Where the harassment involves domestic violence, stalking, threats, or abuse by a current or former intimate partner, protection orders may be available.

Protection measures may include orders to stop contacting, threatening, harassing, or approaching the victim. In some cases, this may cover online contact and third-party contact.

Safety measures may also include:

  • Changing passwords.
  • Enabling two-factor authentication.
  • Reviewing account recovery emails and phone numbers.
  • Limiting public profile information.
  • Removing location tags.
  • Checking logged-in devices.
  • Warning family and close contacts.
  • Preserving evidence in a secure folder.
  • Using trusted contacts for support.

XXX. Digital Security After Harassment

Victims should secure their accounts because online harassment may be accompanied by hacking attempts.

Recommended steps:

  1. Change passwords.
  2. Use unique passwords for each account.
  3. Enable two-factor authentication.
  4. Check login history.
  5. Remove unknown devices.
  6. Update recovery email and phone number.
  7. Review connected apps.
  8. Make friend lists private.
  9. Limit who can message, tag, comment, or see posts.
  10. Avoid posting real-time location.
  11. Check whether personal information is publicly visible.
  12. Warn contacts against fake accounts.

XXXI. Liability of People Who Share or Encourage the Harassment

A person who did not create the dummy account may still face liability if they participate in the wrongful act.

Examples:

  • Sharing defamatory posts.
  • Encouraging threats.
  • Joining coordinated harassment.
  • Posting private information.
  • Reposting intimate images.
  • Commenting with additional insults or threats.
  • Helping identify the victim’s address or workplace.
  • Creating memes from private images.
  • Acting as an administrator of a page used for harassment.

Each participant’s liability depends on their specific acts and intent.


XXXII. Remedies Available to the Victim

Depending on the facts, remedies may include:

  • Takedown of content.
  • Suspension of dummy account.
  • Criminal investigation.
  • Criminal prosecution.
  • Civil damages.
  • Protection order.
  • School discipline.
  • Workplace discipline.
  • Data privacy complaint.
  • Barangay intervention.
  • Safety planning.
  • Counseling or psychological support.
  • Cease-and-desist letter.
  • Preservation request through legal channels.

XXXIII. Common Mistakes in Reporting

Victims often weaken their complaints by:

  1. Failing to save the profile URL.
  2. Taking cropped screenshots only.
  3. Deleting conversations.
  4. Blocking before preserving evidence.
  5. Publicly accusing a suspected person without proof.
  6. Sending angry threats back.
  7. Not recording dates and times.
  8. Waiting too long before reporting serious threats.
  9. Failing to identify witnesses.
  10. Treating sextortion as a private embarrassment instead of a serious offense.
  11. Not securing their own accounts.
  12. Submitting disorganized evidence.

A well-organized complaint is easier to investigate.


XXXIV. Legal and Practical Limits

Reporting a dummy account does not guarantee immediate identification of the person behind it. Challenges may include:

  • Use of VPNs.
  • Foreign-based platforms.
  • Deleted accounts.
  • Limited data retention.
  • Fake phone numbers or emails.
  • Lack of public posts.
  • Edited screenshots.
  • Difficulty proving authorship.
  • Jurisdictional barriers.
  • Delays in platform responses.

Still, a carefully documented complaint improves the chances of meaningful action.


XXXV. Ethical and Responsible Public Warnings

Victims sometimes need to warn others. A responsible public post should avoid unsupported accusations.

Safer wording:

“A fake account using my name/photos has been contacting people. This account is not mine. Please do not respond, send money, or share private information. I have reported the account and preserved evidence.”

Riskier wording:

“This fake account is definitely operated by [name]. Everyone attack/report him.”

The second version may create legal risk if identity has not been proven.


XXXVI. Conclusion

Harassment by a dummy social media account is not beyond the reach of Philippine law. Depending on the facts, it may involve cybercrime, cyber libel, threats, coercion, unjust vexation, identity theft, gender-based online sexual harassment, privacy violations, cyberbullying, image-based sexual abuse, domestic abuse, child protection violations, or civil liability.

The most important steps are to preserve evidence, save URLs, avoid retaliation, report to the platform, secure personal accounts, and bring serious cases to the proper authorities such as the PNP Anti-Cybercrime Group, NBI Cybercrime Division, prosecutor’s office, school, employer, barangay, or National Privacy Commission.

A dummy account may hide a person’s face, but it does not erase accountability. In online harassment cases, evidence, timing, and proper reporting are often the difference between a dismissed complaint and an actionable case.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.