This guide is a practical, legal-style overview of your options in the Philippines if you receive online harassment or death threats (“OLA” used below as a shorthand for online abuse). It covers criminal, administrative, and civil pathways; evidence; and how to approach the National Bureau of Investigation (NBI), Philippine National Police (PNP), and National Privacy Commission (NPC). It is general information, not legal advice for your specific facts.
I. Quick Triage: What to Do Immediately
Prioritize safety
- If there is a credible, imminent threat (e.g., attacker knows your location, stalking outside your home), call or go to the nearest police station or precinct and request urgent assistance/inquest coordination.
- Consider temporary relocation and notify trusted contacts.
Preserve evidence before it disappears
Take full-page screenshots that include:
- URL bar, username/handle, date/time, device clock, and the entire context of the thread.
Export platform data (e.g., message downloads, chat exports).
Save originals (HTML files, PDFs, images, videos, voice notes).
Record metadata if possible (file properties, message IDs, profile URLs).
Keep a chronology log (date, time, actor/handle, summary, link/file name).
Avoid altering files. If you must redact for your own sharing, keep an unedited copy.
Report on-platform
- Use the platform’s “report,” “block,” and “mute” features. Take screenshots of the report confirmations.
Harden your accounts
- Change passwords, enable multi-factor authentication, review app logins, lock down privacy and visibility settings.
II. What Laws Might Apply
Depending on the conduct and the victim’s circumstances, the following laws may be implicated:
Revised Penal Code (RPC)
- Grave threats (including death threats): threatening another with a wrong/harm; penalties increase for death/serious harm, or if made subject to a condition (extortion).
- Light threats, unjust vexation, coercion, alarm and scandal (context-specific).
- Libel and slander (defamation); online versions are commonly charged via cyber libel (see below).
Cybercrime Prevention Act of 2012 (R.A. 10175)
- “Computer-related” offenses and content-related crimes (e.g., cyber libel, identity-related offenses), plus real-time collection/preservation procedures and expanded venue (where any element occurred or where any computer system was used).
Safe Spaces Act / “Anti-Bastos Law” (R.A. 11313)
- Gender-Based Online Sexual Harassment (GBOSH): unwanted sexual remarks, advances, threats, lewd messages, sharing of sexualized/edited images, cyberstalking, etc. Includes penalties and liability for perpetrators, with obligations for platforms and institutions.
Anti-VAWC (R.A. 9262), if the abuser is a spouse/partner or former partner
- Psychological violence, stalking, harassment; availability of Barangay/Temporary/Permanent Protection Orders (BPO/TPO/PPO).
Data Privacy Act of 2012 (R.A. 10173)
- Unauthorized processing/disclosure of personal data; doxxing-type acts may be actionable if personal data is unlawfully collected, used, or disclosed. NPC handles administrative enforcement.
Anti-Photo and Video Voyeurism Act (R.A. 9995); OSAEC (R.A. 11930) and Anti-Child Pornography Act (R.A. 9775) for minor-related content.
- Extremely serious penalties if minors are involved.
Anti-Bullying Act (R.A. 10627) (schools): campus procedures if the victim is a student.
Tip: The same factual pattern can violate multiple laws (e.g., grave threats + cybercrime + GBOSH + data privacy). Authorities often pursue the strongest, best-documented charges.
III. Evidence That Helps Cases Succeed
- Primary digital artifacts: original files (HTML, PDFs, images, videos), not just screenshots.
- Header/metadata: URLs, message IDs, timestamps, device info where available.
- Attribution clues: consistent handles, linked profiles, recovery emails, phone numbers, bank/e-wallet accounts used for extortion demands.
- Financial trails: receipts or transaction references when threats demand payment.
- Witness statements: from those who saw the posts/messages.
- Impact evidence: medical/psychological reports (for VAWC/GBOSH), work/school incident reports.
- Chain of custody: document how evidence was collected, stored, and transferred.
IV. Where and How to Report
A. Criminal: NBI Cybercrime Division (NBI-CCD) and PNP Anti-Cybercrime Group (PNP-ACG)
When to choose: For death threats, extortion, stalking, hacking, cyber libel, identity theft, online sexual harassment/GBOSH, VAWC-related harassment, and other cyber-enabled crimes.
What to prepare:
- Government-issued ID (two if possible).
- Complaint-Affidavit (see template below), notarized (or sworn before a prosecutor during inquest).
- Annexes: your evidence pack (see Section III), indexed and labeled.
- Chronology: concise timeline of events.
- Witness affidavits (if any).
What happens next (typical path):
- Intake & evaluation by NBI-CCD or PNP-ACG investigator.
- Preservation requests to platforms/service providers.
- Subpoenas or applications for cybercrime warrants (specialized warrants may include orders to disclose subscriber information/content data, to search, seize, and examine computer data, or to intercept/collect certain communications, depending on judicial authority and case stage).
- Filing with the Office of the City/Provincial Prosecutor: for preliminary investigation or inquest (if suspect is arrested without warrant under lawful grounds).
- Prosecution in court upon finding of probable cause.
Venue and jurisdiction notes:
- Under cybercrime rules, venue is broader—you may file where you reside, where you accessed the content, where the platform’s servers were used, or where any essential element occurred. This flexibility helps victims.
Emergency route (imminent danger):
- Proceed to the nearest PNP station for immediate blotter and referral to ACG; you may request police assistance for safety/welfare checks.
B. Administrative: National Privacy Commission (NPC)
When to choose: If the abuse involves unlawful processing or disclosure of your personal data (e.g., doxxing, non-consensual publication of personal information; leaks by an organization).
Before filing with NPC:
- If a personal information controller (PIC) (e.g., a company, school, website operator) is involved, send a written complaint to the PIC’s Data Protection Officer (DPO) first and allow reasonable time for response/remediation.
NPC complaint pack:
- Narrative and legal basis (identify DPA provisions breached).
- Proof of harm or risk (identity exposure, threats linked to disclosure).
- Evidence of prior engagement with the PIC/DPO and their response (or non-response).
- Reliefs sought (cease-and-desist, takedown, breach notification, administrative fines/penalties).
Outcomes:
- NPC may investigate, order corrective measures, and impose administrative sanctions. NPC action can run parallel to NBI/PNP criminal cases.
V. Special Situations
- GBV/VAWC context: If the perpetrator is/was an intimate partner or household member, consider R.A. 9262 remedies (Protection Orders; criminal charges for psychological violence, stalking, harassment). GBOSH under R.A. 11313 may also apply even when the perpetrator is not an intimate partner.
- Minors (victim or offender): Involve parents/guardians, DSWD, and school officials. Laws protecting minors (R.A. 7610; R.A. 11930; R.A. 9775) take precedence; never share or forward abusive images of minors (even to “collect evidence”)—involve authorities immediately.
- Extortion demands: Do not pay. Preserve chat and payment instructions; law enforcement can coordinate controlled operations where lawful.
- Cross-border actors: NBI/PNP can coordinate with foreign counterparts through established channels; cross-border service of process takes time, so preserve everything.
VI. Practical Filing Steps (Checklists)
A. For NBI-CCD or PNP-ACG
- Prepare your file: IDs; Complaint-Affidavit (printed and digital); evidence annexes on a labeled USB/drive and printed screenshots; chronology.
- Go to the cybercrime office or nearest police station for referral.
- Blotter the incident (get a copy/number).
- Submit your Complaint-Affidavit and annexes for evaluation.
- Cooperate in follow-ups: executing supplemental affidavits, identifying accounts, joining case conferences.
- Ask for your case reference number and investigator contact details.
B. For NPC
- Write to the DPO of the organization involved; attach summaries and ask for remedial action.
- If unresolved, prepare an NPC complaint with annexes (evidence of disclosure, harm, DPO correspondence).
- File the complaint and keep your reference/case number.
- Participate in clarificatory conferences or mediation if offered.
VII. Common Charging Theories for OLA Death Threats & Harassment
- Grave threats (death/serious harm), sometimes with extortion if money or compliance is demanded.
- Cyber libel (if threats are coupled with defamatory posts).
- Unjust vexation, coercion, stalking/harassment (context-specific).
- GBOSH (R.A. 11313) for lewd/sexualized harassment or stalking online.
- R.A. 9262 for partner/ex-partner harassment.
- Data Privacy Act (unlawful disclosure/processing of personal data).
- R.A. 9995 (non-consensual intimate images).
- R.A. 11930/9775 if minors are involved (immediately escalate).
VIII. Frequently Asked Questions
1) Can I file in my city even if the abuser posted from elsewhere? Often yes, due to expanded venue in cybercrime—where any element occurred, including where you accessed the abusive content.
2) The account is anonymous. Is a case still possible? Yes. Investigators may lawfully request subscriber/traffic/content data from platforms/ISPs through subpoena/cybercrime warrants and international cooperation where necessary.
3) Should I confront the abuser? Generally no. It risks escalation and evidence loss. Preserve and report.
4) Can I sue civilly? Yes. You can seek damages (moral, exemplary, actual) under the Civil Code and specific statutes, parallel to criminal or administrative actions.
5) What if the platform removes the content before I could save it? Your screenshots and log help. Investigators can also seek server-side records from the platform.
IX. Model Complaint-Affidavit (Template)
Title: Complaint-Affidavit for Grave Threats (Online), Violation of R.A. 10175, and Other Related Offenses Complainant: [Your Full Name], Filipino, of legal age, [Civil Status], residing at [Address]. Respondent: [Name/handle], currently known as [platform username/URL], other particulars unknown.
1. Personal Background 1.1 I am [occupation]. I can be reached at [contact number/email].
2. Jurisdiction & Venue 2.1 This complaint is filed in [City/Province], where I received and accessed the online threats and where I reside.
3. Facts of the Case 3.1 On [date/time], via [platform], Respondent using the account [handle/URL] sent me the following messages: [verbatim quotes]. 3.2 The messages include death threats and harassing statements. Attached as Annex “A” are screenshots showing the threats with timestamps and URLs. 3.3 On [subsequent dates], Respondent repeated threats and attempted to coerce me to [pay/do an act]. Annexes “B” to “D” are additional logs/exports. 3.4 The threats caused me fear and anxiety; I sought assistance from [doctor/psychologist/police blotter no.].
4. Identification/Attribution 4.1 The account is linked to [email/phone/payment account if known]. Annex “E” shows [proof].
5. Legal Basis 5.1 Respondent committed Grave Threats under the RPC. 5.2 The acts qualify as cybercrime under R.A. 10175 as they were committed through a computer system/online platform. 5.3 Depending on the sexualized nature and context, acts may also fall under R.A. 11313 (GBOSH) and/or R.A. 9262.
6. Reliefs Sought 6.1 The filing of appropriate criminal information against Respondent. 6.2 Issuance of lawful preservation requests and applications for cybercrime warrants to identify Respondent and secure platform records. 6.3 Any other just and equitable relief.
Affiant’s Attestation and Jurat [Signature over printed name] [Date/Place] SUBSCRIBED AND SWORN to before me this [date]…
Annexes: A—Screenshots; B—Chat export; C—Profile URLs; D—Transaction receipts; E—Attribution notes; F—Medical/psychological report; G—Blotter.
X. Strategic Tips
- Name the statutes you believe were violated, but avoid legal overreach; investigators/prosecutors will refine charges.
- Index annexes clearly (A, B, C…) and reference them in your affidavit paragraphs.
- Keep duplicates of everything (cloud + offline).
- Do not circulate intimate/abusive materials further; it can be illegal to share.
- If the abuser is a co-worker or schoolmate, use internal policies too (HR or school grievance), in addition to criminal/NPC routes.
- Consider protection orders (VAWC) and company/school safety measures (access restrictions, escorts, incident alerts).
XI. When to Consult Counsel
- If threats are persistent/organized, involve minors, include extortion/defamation with significant reputational or financial impact, or cross multiple jurisdictions/platforms.
- To coordinate parallel criminal, administrative (NPC), and civil actions; to seek protection orders; and to manage public disclosures safely.
Final Note
You are not required to endure online abuse. Philippine law provides criminal, administrative, and civil pathways—often working in tandem—to stop threats, identify perpetrators, and obtain accountability. The strongest cases start with prompt evidence preservation and clear, organized filings with NBI/PNP and, where personal data is involved, the NPC.