How to Report Identity Theft Used for Online Loans

A Philippine Legal and Practical Guide

I. Introduction

Identity theft involving online loans has become a serious problem in the Philippines. A person may suddenly receive collection calls, text messages, app notifications, emails, threats, or demand letters for a loan they never applied for. In other cases, a lending app may claim that the person borrowed money using their name, mobile number, ID photo, selfie, address book, bank account, e-wallet, or government identification.

The situation can be frightening because online loan identity theft may involve both financial fraud and harassment. Victims may be pressured to pay a debt they did not incur. Their contacts may be shamed or threatened. Their IDs may be reused for more loans. Their credit standing may be affected. In serious cases, scammers may combine identity theft with cyberlibel, extortion, illegal access, data privacy violations, falsification, or unfair debt collection practices.

This article explains, in the Philippine context, what identity theft used for online loans means, what laws may be involved, where to report it, what evidence to preserve, how to protect yourself, how to dispute the loan, and what to do if a lending app or collector continues to harass you.

This is general legal information and not a substitute for advice from a lawyer, law enforcement agency, regulator, or the appropriate government office.


II. What Is Identity Theft in Online Loan Cases?

Identity theft happens when another person uses someone’s personal information without authority, usually to obtain money, credit, goods, services, accounts, or other benefits.

In an online loan context, identity theft may involve the unauthorized use of:

  • Full name.
  • Mobile number.
  • Email address.
  • Home address.
  • Work address.
  • Employer details.
  • Birthday.
  • Government ID number.
  • TIN, SSS, GSIS, PhilHealth, Pag-IBIG, driver’s license, passport, postal ID, national ID, or voter details.
  • ID photo.
  • Selfie or liveness verification image.
  • Signature.
  • Bank account.
  • E-wallet account.
  • Contact list.
  • Social media profile.
  • Device information.
  • Biometric information.
  • Family or employment information.
  • Emergency contact details.

The identity thief may use the victim’s information to apply for a loan through a lending app, financing company, website, social media lender, informal online lender, or fake loan platform.


III. Common Ways Online Loan Identity Theft Happens

A. Lost or Stolen IDs

A person may lose a wallet, ID card, photocopy of a government ID, company ID, or scanned document. Someone may later use it to apply for online loans.

B. Leaked Photos of IDs

Many online transactions require people to submit ID photos. If a merchant, app, agent, recruiter, employer, seller, landlord, or fake website mishandles the image, it may be reused for fraud.

C. Phishing

Scammers may trick people into submitting personal data through fake links, fake loan offers, fake job applications, fake government aid forms, fake bank verification pages, or fake delivery messages.

D. SIM or Mobile Number Compromise

If a scammer gains access to a person’s SIM, OTP, messaging app, or mobile number, the scammer may be able to create online loan accounts.

E. Social Engineering

The scammer may pretend to be a bank officer, loan agent, recruiter, buyer, seller, government employee, or customer support representative and ask for IDs, selfies, OTPs, or personal information.

F. Unauthorized Use by Someone Known to the Victim

Identity theft is not always committed by strangers. It may be done by:

  • A relative.
  • Friend.
  • Romantic partner.
  • Co-worker.
  • Neighbor.
  • Roommate.
  • Former employee.
  • Household helper.
  • Acquaintance.
  • Someone who had access to the victim’s ID or phone.

G. Data Breach

Personal data may be exposed through a breach involving an app, company, employer, website, school, clinic, online seller, payment platform, or service provider.

H. Fake Lending Apps

Some apps collect personal information under the pretense of processing a loan, then misuse the data for unauthorized loans, harassment, or extortion.

I. Contact List Harvesting

Some loan apps request access to contacts, photos, SMS, device storage, or social media. In abusive cases, this information may be used to threaten or shame the borrower or alleged borrower.


IV. Signs That Your Identity Was Used for an Online Loan

You may be a victim if:

  • You receive collection messages for a loan you did not apply for.
  • Collectors call your relatives, friends, co-workers, or employer.
  • A lending app claims you owe money but cannot show a valid loan agreement.
  • You receive OTPs or loan approval messages you did not request.
  • Money is allegedly released to an account that is not yours.
  • Your ID photo appears in a loan account you did not create.
  • Your name appears on a debt collection list.
  • You are threatened with public shaming, barangay complaints, police cases, or employer notification.
  • Your contacts receive messages calling you a scammer or debtor.
  • You are told that your phone contacts were accessed.
  • A loan appears in a credit report or lending database.
  • Someone uses your e-wallet, bank, or SIM account without authority.
  • You discover multiple loans under your name.

V. Immediate Steps to Take

Step 1: Do Not Admit the Debt

If you did not apply for the loan, do not say or write anything that may be interpreted as admitting liability.

Avoid statements like:

  • “I will pay when I have money.”
  • “Please give me more time.”
  • “I know I owe this.”
  • “I promise to settle.”

Instead, state clearly:

“I dispute this loan. I did not apply for or receive this loan. I believe my identity was used without authority. Please send proof of the loan application, loan agreement, disbursement details, and documents allegedly used.”

Step 2: Preserve Evidence

Do not delete messages, call logs, screenshots, emails, or app notifications. Evidence is essential.

Save:

  • Screenshots of collection messages.
  • Caller numbers.
  • Text messages.
  • Chat messages.
  • Emails.
  • App notifications.
  • Demand letters.
  • Threats.
  • Proof that contacts were messaged.
  • Loan account screenshots.
  • Alleged loan agreement.
  • Disbursement details.
  • Names of apps, companies, agents, collectors.
  • Dates and times.
  • Links sent to you.
  • Payment instructions or account numbers.
  • Proof that you did not receive money.
  • Proof of lost ID, if applicable.
  • Police blotter, if already filed.
  • Communications with the lender.

Use screenshots that show the date, time, number, username, and full message.

Step 3: Ask for Verification

Demand proof from the lender or collector. Ask for:

  • Complete name of the lending company.
  • SEC registration details, if applicable.
  • Certificate of Authority to operate as lending or financing company, if applicable.
  • Loan application form.
  • Loan agreement.
  • ID submitted.
  • Selfie or verification image.
  • Mobile number used.
  • Email address used.
  • Device or account used.
  • Date and time of application.
  • Date and amount of loan release.
  • Bank or e-wallet account where proceeds were sent.
  • Consent records.
  • Privacy notice and data processing basis.
  • Assignment or authorization of the collection agency, if collector is involved.

Do this in writing if possible.

Step 4: Do Not Pay Immediately

Paying a loan you did not incur can make it harder to dispute later, and it may encourage further extortion.

There are exceptions where a person may choose to pay under protest for urgent practical reasons, but this should be carefully documented and ideally discussed with a lawyer.

Step 5: Secure Your Accounts

Immediately secure:

  • Email.
  • Mobile number.
  • E-wallets.
  • Online banking.
  • Social media.
  • Messaging apps.
  • Loan apps.
  • Cloud storage.
  • Government online accounts.
  • Password managers.

Change passwords, enable two-factor authentication, log out unknown devices, and report unauthorized transactions.

Step 6: Check Whether Money Was Actually Sent to You

Sometimes the loan is real but unauthorized; sometimes it is fake collection. Check whether any money entered your bank or e-wallet account.

If money was deposited without your genuine consent, do not spend it. Notify the lender or platform in writing and ask for proper reversal instructions. Keep proof that you are not admitting liability.


VI. Where to Report Identity Theft Used for Online Loans

A victim may need to report to several offices because the case may involve fraud, cybercrime, privacy violations, lending regulation, harassment, and credit reporting.

A. Police or Cybercrime Authorities

Report to law enforcement if your identity was used without authority, if you are being threatened, or if the scam occurred online.

Possible law enforcement reports include:

  • Police blotter.
  • Complaint with a cybercrime unit.
  • Complaint for identity theft, fraud, threats, extortion, or related offenses.
  • Request for investigation of phone numbers, accounts, or online profiles.

A police report is useful because lenders, banks, e-wallet providers, credit bureaus, and regulators may ask for proof that you formally reported the identity theft.

B. National Bureau of Investigation Cybercrime Division

For online fraud, identity theft, hacking, phishing, extortion, and cyber-related offenses, a complaint may be filed with the appropriate cybercrime office. Prepare printed and digital evidence.

C. Philippine National Police Anti-Cybercrime Group

Cybercrime complaints may also be brought to the police cybercrime unit. This is useful when the scam involves online accounts, phone numbers, apps, social media, or digital threats.

D. National Privacy Commission

If your personal data, ID, photo, contacts, or other information was misused, improperly processed, exposed, shared, or used for harassment, you may file a complaint or report with the privacy regulator.

This is especially relevant if:

  • a lending app accessed your contacts without proper authority;
  • your contacts were messaged or shamed;
  • your photo or ID was circulated;
  • the lender refuses to provide data processing information;
  • your personal data was used for a loan without consent;
  • the app collected excessive permissions;
  • the company failed to protect your personal information;
  • the collector disclosed your alleged debt to third parties.

E. Securities and Exchange Commission

Many lending and financing companies are regulated by the SEC. Complaints may be filed when a lending company, financing company, online lending platform, or collection agent violates lending, disclosure, corporate, or debt collection rules.

SEC-related complaints may be relevant if:

  • the lender is not properly registered;
  • the lender has no authority to operate;
  • the app uses abusive collection practices;
  • collectors shame borrowers or alleged borrowers;
  • the company charges illegal or undisclosed fees;
  • the loan was obtained through identity theft;
  • the lender refuses to investigate a disputed account;
  • the lender or collector threatens criminal prosecution improperly.

F. Bangko Sentral ng Pilipinas

If the issue involves a bank, e-wallet, electronic money issuer, remittance company, payment platform, or supervised financial institution, the matter may be reportable to the BSP’s consumer assistance mechanism.

This is relevant if:

  • loan proceeds were sent to an e-wallet or bank account;
  • your e-wallet was compromised;
  • your bank account was used without authority;
  • unauthorized transactions occurred;
  • a BSP-supervised institution mishandled your complaint;
  • a payment channel is involved in the fraud.

G. Credit Information and Credit Reporting Entities

If the fraudulent loan appears in a credit report or affects your credit standing, dispute it with the relevant credit information system, credit bureau, or reporting entity.

You may need to submit:

  • identity documents;
  • police report;
  • affidavit of denial;
  • dispute letter;
  • proof that the loan was unauthorized;
  • communications with the lender.

H. Barangay

A barangay report or blotter may help document harassment, threats, or identity misuse, especially if collectors go to your residence or contact neighbors. However, identity theft and cybercrime issues usually require escalation beyond barangay level.

I. Employer or Human Resources Department

If collectors contact your workplace, you may inform HR or management that you are a victim of identity theft and have disputed the loan. Provide only necessary information. Ask them not to disclose your personal information to collectors.


VII. Laws Potentially Involved

Several Philippine laws may apply, depending on the facts.

A. Cybercrime Prevention Law

Identity theft committed through information and communications technology may fall under cybercrime laws. Online use of another person’s identity, account, data, or digital credentials may support a cybercrime complaint.

Other cyber-related acts may also be involved, such as:

  • illegal access;
  • computer-related fraud;
  • computer-related forgery;
  • cyber-related threats;
  • cyberlibel, if defamatory statements are posted or sent online;
  • online extortion or blackmail.

B. Data Privacy Law

The unauthorized collection, use, disclosure, sharing, retention, or processing of personal information may violate data privacy principles.

Online loan cases often involve sensitive personal information, including IDs, financial data, contact lists, location data, device information, and sometimes biometric images.

Possible privacy violations include:

  • processing data without valid basis;
  • using data for purposes not disclosed;
  • accessing contacts unnecessarily;
  • disclosing debt information to third parties;
  • public shaming;
  • retaining data after dispute;
  • failure to secure data;
  • failure to act on a data subject request;
  • unauthorized sharing with collectors;
  • refusal to identify the source of data.

C. Revised Penal Code

Traditional criminal offenses may apply depending on the conduct, such as:

  • estafa or fraud;
  • falsification of documents;
  • use of falsified documents;
  • unjust vexation;
  • grave threats;
  • light threats;
  • coercion;
  • slander or libel;
  • malicious mischief;
  • usurpation or false representation, depending on facts.

If fake documents, forged signatures, or false statements were used to obtain a loan, criminal liability may arise.

D. Lending Company and Financing Company Rules

Online lenders and financing companies must comply with applicable regulations on registration, authority to operate, disclosures, interest and charges, and fair collection practices.

Abusive practices may include:

  • threatening violence;
  • using profane or insulting language;
  • disclosing debt to third parties;
  • contacting people in a way meant to shame the debtor;
  • falsely threatening imprisonment;
  • falsely claiming to be police, court, or government authority;
  • harassing contacts;
  • using deceptive names or numbers;
  • posting personal information online;
  • collecting amounts not legally owed;
  • refusing to investigate identity theft.

E. Consumer Protection Principles

Victims may invoke consumer protection principles when dealing with lenders, apps, financial service providers, e-wallets, banks, and collectors. A person should not be forced to pay a debt obtained through identity theft without proof and due investigation.

F. Credit Information Rules

If a fraudulent loan is reported to a credit database, the victim may dispute inaccurate, incomplete, outdated, or fraudulent credit information.


VIII. Evidence to Gather

The strength of a report depends heavily on evidence.

A. Identity Theft Evidence

Prepare:

  • copy of the ID allegedly used;
  • proof the ID was lost or compromised, if available;
  • affidavit of loss, if relevant;
  • police report;
  • screenshots of loan account using your name;
  • proof that photo, selfie, or ID was misused;
  • proof that the mobile number or email used was not yours;
  • proof that the bank or e-wallet account receiving money was not yours;
  • proof of your whereabouts or non-involvement, if relevant;
  • proof that you never installed the app or applied for the loan.

B. Collection Harassment Evidence

Save:

  • threatening messages;
  • messages to relatives, contacts, employer, or friends;
  • defamatory posts;
  • public shaming images;
  • voice recordings, if lawfully obtained;
  • call logs;
  • screenshots of caller IDs;
  • collection letters;
  • payment demands;
  • false legal threats;
  • messages using police, court, or barangay names;
  • proof of repeated calls at unreasonable hours.

C. Company or App Information

Record:

  • app name;
  • company name;
  • website;
  • email address;
  • hotline;
  • social media page;
  • collector names;
  • phone numbers;
  • payment account names and numbers;
  • SEC registration details, if available;
  • app store listing;
  • screenshots of app permissions;
  • privacy policy;
  • loan terms;
  • collection agency details.

D. Financial Evidence

Gather:

  • bank statements;
  • e-wallet transaction history;
  • proof that no loan proceeds were received;
  • proof that money went to another account;
  • unauthorized transaction reports;
  • account freeze or dispute confirmation;
  • payment reference numbers.

E. Witness Evidence

If your contacts were messaged, ask them to send screenshots showing:

  • sender number;
  • full message;
  • date and time;
  • your name or photo;
  • threats or defamatory statements;
  • demand for payment.

IX. How to Write a Dispute Letter to the Lender

A dispute letter should be firm, clear, and written. Avoid emotional admissions.

Sample wording:

Subject: Formal Dispute of Unauthorized Loan / Identity Theft

I formally dispute the loan account allegedly under my name. I did not apply for, authorize, receive, or benefit from this loan. I believe my personal information was used without my consent.

Please immediately investigate this matter and provide copies of all documents and records allegedly supporting the loan, including the application form, loan agreement, ID submitted, selfie or verification image, mobile number and email used, date and time of application, IP/device information if available, disbursement account, proof of release of proceeds, and the legal basis for processing my personal information.

Pending investigation, I demand that you suspend all collection activity, stop contacting third parties, stop reporting or threatening to report this account as my debt, and preserve all records related to this incident.

I reserve all rights to file complaints with law enforcement, regulators, and the appropriate agencies for identity theft, data privacy violations, unfair collection practices, and other legal violations.

This communication is not an admission of debt.

Send it by email or another channel that creates a record.


X. How to File a Police or Cybercrime Report

When reporting to police or cybercrime authorities, prepare:

  • valid ID;
  • affidavit or written narration;
  • screenshots and printed evidence;
  • phone numbers and account names used by collectors;
  • lender or app details;
  • proof of unauthorized use of identity;
  • proof that you did not receive proceeds;
  • names and screenshots from contacted relatives or friends;
  • copies of communications with the lender;
  • affidavit of loss, if ID was lost;
  • device used, if relevant.

Your narration should include:

  1. Your full name and contact details.
  2. When you first learned of the loan.
  3. Why you deny applying for it.
  4. What personal information was used.
  5. What threats or collection actions occurred.
  6. Whether your contacts were messaged.
  7. Whether money entered your accounts.
  8. What steps you already took.
  9. What relief or investigation you are requesting.

Ask for a copy of the police report, blotter, complaint sheet, or certification.


XI. How to Report Data Privacy Violations

If your personal information was misused, write a clear complaint explaining:

  • what personal data was used;
  • who used it;
  • how you discovered the misuse;
  • whether you gave consent;
  • whether the data was disclosed to your contacts;
  • whether collectors sent defamatory or threatening messages;
  • whether the lender refused to investigate;
  • whether the app accessed contacts, photos, storage, or device data;
  • what harm resulted.

Attach:

  • screenshots;
  • messages sent to contacts;
  • ID misuse evidence;
  • dispute letter;
  • lender responses;
  • police report, if available;
  • proof of app permissions or privacy policy, if available.

Privacy remedies may include investigation, correction, blocking, deletion, accountability measures, and sanctions depending on the facts.


XII. How to Report Abusive Online Lending Practices

A complaint against a lending company, financing company, or online lending app should include:

  • company or app name;
  • names and numbers of collectors;
  • loan account number, if any;
  • explanation that the loan is disputed due to identity theft;
  • screenshots of threats or harassment;
  • proof that contacts were messaged;
  • proof of unauthorized loan;
  • copies of demand messages;
  • payment instructions;
  • SEC registration details, if known;
  • police or privacy complaint, if filed.

You may ask the regulator to investigate:

  • unauthorized loan processing;
  • unfair collection;
  • data privacy abuse;
  • harassment;
  • public shaming;
  • illegal or unregistered lending;
  • refusal to verify identity theft;
  • deceptive or abusive practices.

XIII. What to Do If Collectors Contact Your Family, Friends, or Employer

Collectors may contact third parties to shame or pressure the alleged borrower. If you are a victim of identity theft, respond promptly.

A. Tell Contacts Not to Engage

Ask relatives and friends not to argue with collectors. They should screenshot and block/report as needed.

B. Ask Contacts to Preserve Evidence

Tell them to save:

  • messages;
  • numbers;
  • screenshots;
  • call logs;
  • defamatory posts;
  • threats.

C. Notify Employer if Necessary

If collectors contact your workplace, calmly inform HR that:

  • you dispute the loan;
  • your identity may have been used;
  • you have reported or will report the matter;
  • any collection calls should not be entertained;
  • your employment information should not be disclosed.

D. Include Third-Party Contact in Complaints

Messages to third parties may support complaints for harassment, privacy violations, unfair collection practices, or defamation.


XIV. What If the Online Lender Threatens Criminal Charges?

Collectors often threaten victims with arrest, imprisonment, barangay action, police cases, estafa, cybercrime complaints, or employer reporting.

A person should understand:

  • Nonpayment of an ordinary debt is generally not automatically a crime.
  • Fraud may be criminal, but the lender must prove fraudulent conduct.
  • If you did not apply for the loan, you are a victim, not the borrower.
  • Collectors cannot lawfully invent criminal cases to force payment.
  • Police do not arrest people simply because a collector sends a text message.
  • Demand letters and threats should be documented.

If threats escalate, report them.


XV. What If the Loan Proceeds Were Sent to Your Account?

This situation is more complicated.

If money was sent to your account without your genuine consent, you should:

  1. Do not spend the money.
  2. Notify the lender and bank or e-wallet provider immediately.
  3. State that the transaction was unauthorized.
  4. Ask for written reversal instructions.
  5. Keep the amount intact if possible.
  6. File a report if your identity or account was compromised.
  7. Avoid language admitting that you borrowed the money.
  8. Keep proof of all communications.

If you spend the money, the lender may argue that you ratified or benefited from the loan, even if the application was unauthorized.


XVI. What If Someone You Know Used Your Identity?

If a family member, partner, friend, or co-worker used your identity, you still have the right to report it. But practical and emotional issues may arise.

You should consider:

  • whether to file a police report;
  • whether to demand that the person admit responsibility;
  • whether to obtain a written confession or undertaking;
  • whether the lender will accept correction;
  • whether repayment by the actual borrower will close the account;
  • whether your credit record must still be corrected;
  • whether your ID remains compromised.

Do not sign documents accepting liability unless you understand the consequences.


XVII. What If Your ID Was Lost Before the Loan?

If you lost an ID before the loan was made:

  • execute an affidavit of loss;
  • report the lost ID to the issuing agency if appropriate;
  • file a police blotter, especially if the ID is being misused;
  • inform the lender that the ID was lost and used without authority;
  • replace or secure the ID;
  • monitor other possible fraudulent accounts.

An affidavit of loss alone may not prove identity theft, but it supports your explanation.


XVIII. What If the Lender Refuses to Give Documents?

If the lender refuses to provide proof, document the refusal. State that you dispute the account and require verification.

You may raise the refusal in complaints to regulators or law enforcement. A legitimate lender should be able to provide basic proof of the loan, identity verification, loan agreement, and disbursement.


XIX. What If the Lender Keeps Reporting the Debt?

If a disputed fraudulent loan is reported to a credit database or third party, send a written dispute to:

  • the lender;
  • the credit reporting entity, if known;
  • the relevant regulator.

Attach your police report, identity theft affidavit, dispute letter, and evidence.

Demand that the account be marked disputed and not treated as a valid debt until investigation is completed.


XX. Protecting Yourself From Further Identity Theft

A. Replace Compromised IDs

If a government ID was used, consider replacing it where possible or reporting it as compromised to the issuing agency.

B. Secure Your SIM and Phone

  • Set SIM PIN where available.
  • Avoid sharing OTPs.
  • Report lost SIMs immediately.
  • Replace compromised SIMs.
  • Lock phone with strong authentication.
  • Remove suspicious apps.
  • Review app permissions.

C. Secure Email and Social Media

  • Change passwords.
  • Enable two-factor authentication.
  • Review logged-in devices.
  • Remove unknown recovery emails or numbers.
  • Beware of phishing links.

D. Monitor Financial Accounts

Check:

  • banks;
  • e-wallets;
  • credit reports;
  • online shopping accounts;
  • lending apps;
  • government portals.

E. Avoid Sending IDs Casually

When sending ID copies, consider writing a watermark such as:

“For [specific transaction] only — [date]”

This may help discourage reuse, although it is not foolproof.


XXI. Common Defenses Against Collection Demands

A victim may raise the following defenses:

  • I did not apply for the loan.
  • I did not sign the loan agreement.
  • I did not authorize use of my ID.
  • I did not receive the proceeds.
  • The receiving bank or e-wallet account is not mine.
  • The mobile number or email used is not mine.
  • The selfie or document is fake, altered, or taken without authority.
  • The lender failed to conduct proper identity verification.
  • The lender failed to investigate my dispute.
  • The collector used abusive or unlawful collection methods.
  • The debt is disputed and should not be reported as valid.

XXII. Possible Claims or Complaints Against the Wrongdoer

Depending on the facts, the victim may pursue complaints for:

  • identity theft;
  • computer-related fraud;
  • falsification;
  • use of falsified documents;
  • estafa;
  • unauthorized access;
  • data privacy violations;
  • threats;
  • coercion;
  • unjust vexation;
  • extortion;
  • libel or cyberlibel;
  • harassment;
  • violation of lending or collection rules.

The proper charge depends on the evidence and should be assessed by law enforcement, prosecutors, or counsel.


XXIII. Possible Complaints Against the Lender or Collector

A lender or collector may face complaints if it:

  • fails to verify identity;
  • processes a loan despite suspicious documents;
  • refuses to investigate a disputed loan;
  • harasses the victim;
  • contacts third parties unnecessarily;
  • discloses alleged debt to contacts;
  • uses insults, threats, or shaming;
  • accesses contacts or photos without proper authority;
  • reports disputed debt as valid;
  • collects without authority;
  • operates without required registration or authority;
  • misrepresents itself as police, court, or government agency.

Even if a loan was genuinely issued to someone, collection must still follow lawful standards.


XXIV. Should You File an Affidavit of Denial?

An affidavit of denial or affidavit of identity theft can be useful. It may state:

  • you did not apply for the loan;
  • you did not authorize anyone to use your identity;
  • you did not receive the proceeds;
  • your ID or data may have been compromised;
  • you dispute the debt;
  • you are willing to cooperate in investigation;
  • all statements are true based on personal knowledge.

This affidavit may be submitted to lenders, police, regulators, credit bureaus, banks, e-wallets, and employers.


XXV. Sample Affidavit of Denial and Identity Theft

Affidavit of Denial and Identity Theft

I, __________, of legal age, Filipino, and residing at __________, after being sworn, state:

  1. I recently learned that a loan account was allegedly opened under my name with __________.
  2. I did not apply for, authorize, sign, receive, or benefit from said loan.
  3. I did not authorize any person to use my name, identification documents, photograph, mobile number, email address, or other personal information for such loan.
  4. I did not receive the loan proceeds. If proceeds were released, they were not released to an account owned or controlled by me.
  5. I believe that my personal information was used without my consent.
  6. I have disputed the loan with the lender and requested proof of the application, agreement, identity verification, and disbursement.
  7. I am executing this affidavit to attest to the truth of the foregoing and to support complaints, investigations, record corrections, and other lawful purposes.

Signed this ___ day of __________ at __________.

Affiant: __________

This should be adapted to the actual facts and notarized if required.


XXVI. Sample Cease-and-Desist / Dispute Message to Collectors

I dispute this alleged debt. I did not apply for or receive this loan. My identity appears to have been used without authority.

Stop contacting my relatives, friends, employer, and other third parties. Stop sending threats, defamatory messages, or public shaming materials.

Send all documents proving the alleged loan, including the application, agreement, ID used, verification records, and disbursement details.

I reserve all rights to file complaints with law enforcement, regulators, and the proper agencies. This message is not an admission of liability.


XXVII. Sample Notice to Employer

I wish to inform HR that I am receiving collection messages for an online loan that I did not apply for. I believe my identity was used without authority, and I am disputing the account.

If anyone contacts the company about this alleged loan, please do not disclose my employment or personal information. Kindly direct any inquiry to me and preserve any message or call details for evidence.

Thank you.


XXVIII. What Not to Do

Avoid the following:

  1. Do not ignore serious threats.
  2. Do not delete messages.
  3. Do not pay without disputing if the loan is not yours.
  4. Do not admit the debt casually.
  5. Do not give OTPs to anyone.
  6. Do not send more IDs to suspicious collectors.
  7. Do not install unknown apps sent by collectors.
  8. Do not click suspicious links.
  9. Do not argue emotionally with collectors.
  10. Do not post sensitive documents online.
  11. Do not threaten collectors unlawfully.
  12. Do not forge documents to “fix” the issue.
  13. Do not let relatives negotiate as if the debt is valid.
  14. Do not delay securing your accounts.

XXIX. Frequently Asked Questions

1. Am I liable for an online loan I did not apply for?

Generally, a person should not be liable for a loan they did not authorize, receive, or benefit from. But the victim must dispute the loan and provide evidence because the lender may initially rely on the documents submitted.

2. Should I pay to stop harassment?

Paying may stop immediate harassment, but it can also be treated as acknowledgment and may encourage more demands. If you pay under pressure, document that payment was made under protest and not as admission.

3. Can I be arrested for not paying an online loan?

Ordinary nonpayment of debt does not automatically result in arrest. Fraud or falsification allegations are different, but the lender must prove wrongdoing. If you are a victim of identity theft, report the identity theft.

4. What if the collector says they will contact my barangay?

They may attempt to complain, but a barangay cannot automatically force you to pay a disputed fraudulent loan. Attend if summoned, explain that you dispute the debt, and bring evidence.

5. Can collectors message my contacts?

Abusive disclosure of alleged debt to third parties may raise privacy and collection-practice issues. Save screenshots and report it.

6. Can I sue the lender?

Possibly, depending on the facts. If the lender failed to verify identity, refused to investigate, mishandled your data, or harassed you, remedies may be available.

7. What if the app is not registered?

Report it to the proper regulator and law enforcement. Unregistered lending activity may create additional issues.

8. What if my selfie was used?

That may indicate serious identity theft or misuse of biometric/personal data. Preserve evidence and report immediately.

9. What if the loan proceeds went to my e-wallet but I did not apply?

Do not spend the money. Notify the lender and e-wallet provider, dispute the transaction, and ask for proper reversal.

10. What if my relative used my ID?

You may still dispute the loan. Whether to file a criminal complaint is a personal and legal decision, but you should protect your records and credit standing.

11. Can I demand deletion of my data?

You may request correction, blocking, deletion, or limitation of processing, especially if the data was used unlawfully. However, companies may preserve records needed for investigation or legal compliance.

12. Can I block collectors?

Yes, but preserve evidence first. For ongoing threats, keep at least one channel of documented communication or direct them to written communication only.

13. What if they post my photo online?

Take screenshots immediately, including URL, account name, date, and time. Report the post to the platform and file complaints for privacy violations, defamation, harassment, or cybercrime as appropriate.

14. Can my employer fire me because collectors called?

An alleged debt, especially one disputed as identity theft, should not automatically justify termination. If workplace harassment occurs, document it and explain the dispute to HR.

15. How long will it take to resolve?

It depends on the lender, evidence, regulators, law enforcement, and whether the account was reported to credit systems. Strong documentation helps.


XXX. Practical Checklist for Victims

Prepare this file:

  • Government ID.
  • Affidavit of denial or identity theft.
  • Police or cybercrime report.
  • Screenshots of all messages.
  • Call logs.
  • Names and numbers of collectors.
  • App or lender details.
  • Dispute letter to lender.
  • Lender responses.
  • Screenshots from contacts who were messaged.
  • Proof no money was received.
  • Bank or e-wallet statements.
  • Affidavit of loss, if ID was lost.
  • Credit report dispute, if applicable.
  • Complaints filed with regulators.
  • Timeline of events.

XXXI. Practical Checklist for Complaints

When filing a complaint, include:

  1. Your name and contact details.
  2. Name of lender or app.
  3. Loan account number, if any.
  4. Statement that you did not apply for the loan.
  5. How your identity was used.
  6. Evidence of collection or harassment.
  7. Whether your contacts were messaged.
  8. Whether money was released and to what account.
  9. Steps already taken.
  10. Relief requested, such as investigation, suspension of collection, correction of records, deletion or blocking of data, and sanctions.

XXXII. Practical Checklist for Prevention

To reduce risk:

  • Do not share IDs with unknown persons.
  • Watermark ID copies for a specific purpose.
  • Do not send selfies with IDs unless necessary and legitimate.
  • Do not share OTPs.
  • Use strong passwords.
  • Enable two-factor authentication.
  • Avoid suspicious loan apps.
  • Review app permissions.
  • Do not install apps from unknown links.
  • Secure lost SIMs immediately.
  • Monitor bank and e-wallet accounts.
  • Keep records of where you submitted IDs.
  • Avoid posting personal documents online.

XXXIII. Key Legal Principles

The most important principles are:

  1. No consent, no valid personal loan obligation. A person should not be treated as borrower if they did not authorize the loan.

  2. Identity theft must be documented. Reports, affidavits, screenshots, and transaction records matter.

  3. Lenders must verify identity. Online convenience does not excuse careless identity checks.

  4. Collection must be lawful. Debt collection cannot become harassment, threats, shaming, or privacy abuse.

  5. Personal data must be protected. IDs, contacts, photos, and financial information cannot be freely misused.

  6. Dispute early and in writing. Written disputes create a record and prevent implied admissions.

  7. Do not ignore credit consequences. Fraudulent loans should be disputed before they damage credit records.

  8. Use official reporting channels. Police, cybercrime units, privacy regulators, financial regulators, and lending regulators may all be relevant.

  9. Protect third parties. Relatives, friends, and employers contacted by collectors should preserve evidence but avoid engaging.

  10. Avoid fixers and suspicious settlement schemes. Fraudulent intermediaries may worsen the problem.


XXXIV. Conclusion

Identity theft used for online loans is both a financial and legal emergency. The victim must act quickly: dispute the loan, preserve evidence, secure accounts, demand proof, report to the proper authorities, and prevent collectors from treating the fraudulent loan as valid.

The key is not to panic and not to admit liability. A victim should clearly state that the loan is disputed, that the identity was used without authority, and that all collection activity should stop pending investigation. If the lender, app, or collector continues to harass the victim or contacts third parties, the matter may involve not only identity theft but also data privacy violations, unfair collection practices, threats, defamation, and cybercrime.

In the Philippines, the proper response often requires several coordinated actions: a police or cybercrime report, a written dispute to the lender, a privacy complaint if personal data was misused, a regulatory complaint if the lender or collector acted abusively, and a credit dispute if the fraudulent loan was reported.

A fraudulent online loan should not be allowed to become a permanent burden on an innocent person’s name, family, employment, or credit record. The strongest protection is prompt reporting, complete documentation, careful wording, and consistent refusal to recognize a debt that was never lawfully incurred.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.