How to Verify Official Government Websites and Avoid Phishing in the Philippines

In the Philippines, more public services are now delivered through websites, mobile portals, email notices, and online payment channels. Tax filing, business registration, social services, visa processing, land records, procurement notices, court issuances, and local government transactions increasingly depend on digital access. This convenience, however, has also created a larger attack surface for phishing, fake portals, spoofed emails, fraudulent social media pages, cloned payment pages, and impersonation schemes using the names of government agencies.

This is not merely a cybersecurity problem. In the Philippine setting, it is also a question of legal compliance, evidentiary caution, data privacy, public accountability, consumer protection, and cybercrime prevention. A person who submits sensitive information to a fake government website may suffer identity theft, financial loss, document fraud, account takeover, SIM-based attacks, tax fraud, or misuse of personal data. A business that relies on a fake regulatory advisory may miss a filing deadline, transfer funds to fraudsters, or disclose confidential records. A lawyer or compliance officer who fails to verify a government source risks acting on false notices, fabricated circulars, or altered issuances.

This article explains, in Philippine legal and practical context, how to verify whether a government website is official, how phishing schemes commonly operate, what warning signs matter most, what laws are relevant, what steps individuals and organizations should take, and how to preserve evidence and respond if a scam has already occurred.


I. Why verification matters in the Philippine setting

Government impersonation scams work because the victim already trusts the name, logo, and authority of the agency being copied. In the Philippines, common targets include agencies involved in taxes, identity systems, social benefits, migration, customs, licensing, permits, labor compliance, police clearances, court notices, and local government collections.

The harm often falls into several categories:

First, theft of credentials. Fake portals may capture usernames, passwords, one-time passwords, security questions, or registered email addresses.

Second, theft of personal data. Attackers may collect names, addresses, birth dates, government identification numbers, mobile numbers, taxpayer information, or scanned identity documents.

Third, fraudulent payment. Fake payment pages may imitate official collection channels and divert funds to private bank accounts, e-wallets, or payment gateways not actually authorized by the agency.

Fourth, malware delivery. A fake advisory, downloadable “form,” or supposed “clearance document” may install spyware, ransomware, or remote access tools.

Fifth, legal and administrative consequences. The victim may believe a requirement was complied with, only to discover that the submission, payment, or registration was made through an illegitimate site.

In public law terms, authenticity of source matters because rights and obligations are often triggered by actual official notices, lawful publication, real issuances, and authorized channels. A forged page or imitation domain cannot create legitimate legal duties just because it looks official.


II. The legal landscape in the Philippines

A full discussion of every statute is extensive, but the main legal framework includes cybercrime law, data privacy law, electronic commerce rules, penal law concepts on fraud and falsification, and agency-specific regulations on official publication and electronic transactions.

1. Cybercrime prevention

The principal anti-cybercrime framework criminalizes unlawful access, computer-related fraud, computer-related identity theft, data interference, system interference, misuse of devices, cybersquatting in proper cases, and related offenses. Phishing campaigns that imitate government sites may involve several of these offenses at once. If the scam captures credentials, accesses accounts, diverts money, or falsely uses another person’s identifying data, criminal liability may arise under cybercrime provisions and related penal laws.

2. Data privacy

When a fake site harvests personal information, the issue is not only fraud but also unauthorized processing, disclosure, and misuse of personal data. In the Philippine context, personal information, sensitive personal information, and privileged information are protected categories. Government agencies themselves also have obligations when processing personal data, and citizens should expect legitimate agencies to act through identifiable, secure, and accountable channels.

A suspicious site that asks for excessive information unrelated to the service should be treated with extreme caution. Even where a real agency does request data, the principles of proportionality, transparency, and legitimate purpose remain important guideposts for the user’s own risk assessment.

3. Electronic commerce and authenticity of electronic documents

Electronic documents and electronic communications may be legally recognized, but legal recognition does not mean every email, PDF, website, or text message is authentic. Authenticity still depends on source, integrity, authority, and reliability. A forged advisory or cloned website does not become valid merely because it appears online.

This distinction is critical. The law accepts electronic means, but it does not remove the need to verify origin.

4. Fraud, estafa, falsification, and related offenses

Where a scam induces a person to part with money, property, or confidential information through deceit, traditional fraud concepts may also apply. If logos, signatures, seals, IDs, permits, certificates, or official-looking notices are fabricated or altered, falsification-related offenses may come into view depending on the circumstances and the nature of the instrument used.

5. Consumer and public protection concerns

Although government transactions are not identical to consumer sales, many scams intersect with payment services, intermediaries, electronic money issuers, online platforms, and financial channels. Fraud involving payment diversion can implicate broader regulatory concerns, including financial consumer protection and suspicious transaction reporting.


III. What makes a government website “official”

An official government website is not merely one that uses a government name or logo. In practical legal terms, an official site is one that is authorized, controlled, or recognized by the government entity it claims to represent.

The strongest indicators usually include the following.

1. The domain name

In the Philippines, official government websites commonly use the .gov.ph domain or a subdomain under an established government domain. This is the single most important first check.

Examples of stronger patterns:

  • agencyname.gov.ph
  • service.agency.gov.ph
  • region.agency.gov.ph

Examples of weak or suspicious patterns:

  • domains ending in .com, .org, .net, or unusual country-code endings while claiming to be the official Philippine government site
  • domains that add extra words like -verify, -support, -portal, or -helpdesk around an agency name
  • misspelled versions of agency names
  • domains using hyphens or extra letters to mimic the real one
  • a page hosted only on free website builders or unrelated domains

A private website may lawfully discuss government programs, but it is not the government’s official site unless clearly authorized.

2. Clear agency attribution

A legitimate site should identify the agency, office, or unit operating it. It should usually contain:

  • the full legal or official agency name
  • office address
  • official contact details
  • links to the agency’s main portal
  • privacy notice or data privacy statement
  • terms of use or website policy
  • often, information on mandates or legal basis

A vague site with no responsible office named, or with only a contact form and no verifiable office details, is a warning sign.

3. Secure connection

Look for https:// and a valid security certificate. This is necessary, but not sufficient. Many phishing sites now also use HTTPS. A padlock alone does not prove that the site is official. It only means the connection is encrypted between the device and the site that owns the certificate.

The question is not only “Is it encrypted?” but “Encrypted to whom?”

4. Consistency with known official channels

The website should be linked from:

  • the main agency website
  • official press releases
  • official memoranda or advisories
  • verified official social media accounts
  • recognized inter-agency portals

If a portal cannot be traced back to the agency’s own main domain or official announcements, caution is warranted.

5. Coherent public-sector design and content governance

An official site is more likely to have structured menus, accessibility features, notices, office mandates, downloadable issuances, procurement or transparency sections where applicable, and institutional content consistent with public administration. A phishing page often focuses almost entirely on login boxes, urgent warnings, payment prompts, or document upload requests.


IV. The strongest practical test: verify the domain first

The best first rule is simple:

Do not trust a claimed government website until the domain itself is verified.

In the Philippine context, this usually means checking whether it is truly under .gov.ph or a known official government subdomain. Many scams succeed because users look only at the logo, layout, or Facebook post, not at the domain in the address bar.

Common domain tricks used by phishers

  • letter substitution, such as using similar-looking characters
  • extra words before or after the agency name
  • misspellings that look correct at a glance
  • fake subdomains, such as bir.secure-login.example.com, where the real domain is example.com
  • URL shorteners that hide the destination
  • domains that place the agency name in the path instead of the actual domain, such as randomsite.com/bir-login
  • misleading sponsored search results or ads
  • cloned pages on unrelated hosting services

The legal lesson here is that identity is determined by the actual operator and address of the site, not by surface appearance.


V. Why logos, seals, and Facebook posts are not enough

People often assume that use of an agency seal or logo means the site is official. That is dangerous. Graphics can be copied instantly. Even government forms, colors, official portraits, and public announcements can be duplicated.

Likewise, a social media post that claims to link to an agency page should not be trusted automatically. Pages may be fake, hacked, spoofed, or made to resemble official accounts. Even where an account is real, the post itself may have been manipulated through comments, ads, quote graphics, or account compromise.

The safer method is this:

  1. independently go to the known official domain,
  2. navigate from there to the service you need,
  3. compare the exact URL.

A user should avoid relying on links received by email, SMS, chat apps, QR codes, or comment sections unless independently confirmed.


VI. Common phishing patterns involving Philippine government impersonation

1. Fake tax notices

A victim receives an email saying there is a tax deficiency, refund problem, account suspension, or urgent filing issue. The email contains a “verify now” or “settle immediately” link. The linked site copies the branding of a tax authority, asks for taxpayer details, and then either steals credentials or collects payment.

2. Fake identity verification

The victim is told to “update national ID details,” “complete e-verification,” or “reactivate records.” The site requests full identity profiles, selfies, signatures, ID scans, or OTPs.

3. Fake social service or benefit claims

The site promises cash aid, scholarship release, pension verification, or subsidy confirmation. It asks for bank details, mobile wallet credentials, or document uploads.

4. Fake immigration, customs, or overseas processing notices

Scammers target workers, travelers, importers, and foreign nationals by claiming that a permit, package, visa, or travel record must be validated urgently.

5. Fake local government collection portals

Victims are lured into paying permit fees, business taxes, property charges, traffic penalties, or clearance fees through unauthorized payment channels.

6. Fake procurement or compliance alerts

Businesses may receive notices claiming to come from regulators or procurement entities, asking them to re-register suppliers, renew certificates, or pay processing fees.

7. QR code phishing

A QR code in a post, message, or printed notice directs the user to a spoofed website. Because the domain is hidden until after scanning, users often miss the destination check.

8. Messaging-app impersonation

Someone claiming to be from an agency contacts the victim through chat, sends a portal link, and pressures immediate action.


VII. Red flags that strongly suggest phishing

The following signs should immediately raise suspicion.

1. Urgency and fear tactics

Messages that say:

  • final notice
  • account will be closed today
  • immediate arrest or penalty
  • payment required within hours
  • benefits forfeited unless you act now

Government agencies may issue deadlines, but scams exaggerate urgency to suppress verification.

2. Requests for passwords or OTPs

A legitimate agency should not ask you to disclose your email password, banking password, or one-time password in a general web form or through email, chat, or SMS. OTP disclosure is one of the clearest fraud markers.

3. Unofficial payment instructions

Be cautious if the site or message directs payment to:

  • a personal bank account
  • an individual’s e-wallet
  • a QR code with no agency verification
  • a payment processor unrelated to the agency’s announced channels

4. Poor language, inconsistent formatting, or odd visual elements

Errors do not always prove fraud, but multiple inconsistencies can be revealing:

  • strange grammar
  • inconsistent fonts
  • low-quality logos
  • broken links
  • placeholders left on pages
  • unusual capitalization
  • mismatched dates

5. Excessive data collection

A website that asks for information beyond what is reasonably necessary should be treated as suspicious. For example:

  • full bank PIN
  • unrelated family details
  • copies of multiple IDs without explanation
  • security answers not relevant to the transaction
  • passwords for third-party services

6. No privacy notice or accountability information

A legitimate government portal should ordinarily explain who processes the data, for what purpose, and through what office or system.

7. Pop-up warnings that trap the user

Some scam sites display alarming pop-ups that prevent navigation and urge immediate “verification” or “payment.”

8. Links that do not match visible text

The text may say one thing, but the hidden destination is another domain entirely.


VIII. A Philippine due-diligence checklist for verifying a government website

A cautious user should apply a layered method.

1. Type the known official domain manually

Avoid clicking links from email, SMS, random social media posts, or messaging apps. Manually enter the agency’s known official website or use a trusted bookmark you created yourself after prior verification.

2. Confirm the domain ends in .gov.ph or is an established official subdomain

This is the most valuable first-line control.

3. Check whether the page is linked from the agency’s main site

If the service is real, the main official website will usually point to it.

4. Check the “About,” “Contact,” and privacy notice pages

Look for a real office, not a vague description.

5. Compare with previous official advisories or forms you already know to be genuine

Consistency helps expose clones.

6. Verify payment channels separately

Before paying, confirm through the agency’s main site or known hotline:

  • official merchant name
  • authorized banks or wallets
  • official collection partner
  • correct reference format

7. Inspect the full URL before logging in

Particularly on mobile devices, where the address bar is shortened.

8. Be skeptical of search-engine results and ads

Even a top result may not be the official site. The ad label matters.

9. Use official contact numbers already published on the main domain

Do not rely on phone numbers listed only on the suspicious page.

10. Preserve evidence if anything appears questionable

Take screenshots, save headers, note the time, and do not delete the message immediately.


IX. Special caution for mobile users in the Philippines

Many Philippine users primarily access government services by smartphone. This increases risk because mobile screens hide details.

Key mobile precautions

  • expand the full address bar before entering any data
  • do not trust app-browser previews
  • avoid downloading “required forms” from chat apps unless verified through the official site
  • be careful with shortened links and QR codes
  • verify whether an “app” is truly official before installing it
  • turn on device-level anti-phishing and app verification features
  • keep operating systems and browsers updated

On mobile, phishing works because users often see only the page design, not the full URL.


X. How government agencies usually behave when acting legitimately

No universal rule covers every agency, but legitimate government digital practice is more likely to involve:

  • publication on official domains
  • reference to legal basis, circular, memorandum, resolution, or advisory
  • clear office ownership
  • consistent official branding across known channels
  • stated contact details
  • accessible privacy information
  • transparent service descriptions
  • authorized payment channels
  • no request for unrelated credentials

A person should become suspicious when a site or message departs sharply from these norms.


XI. The role of the Data Privacy Act in user verification

The Data Privacy Act does not only impose duties on controllers and processors. It also gives the public a framework for evaluating legitimacy.

A cautious user should ask:

  • Why is this information being collected?
  • Is the requested data proportionate to the service?
  • Is the purpose clearly explained?
  • Is the collecting entity identified?
  • Is there a privacy notice?
  • Is the transmission reasonably secure?
  • Is this the minimum information needed?

These are not merely technical questions. They are indicators of lawful and responsible processing. A fake site often collapses under this test because it seeks too much information with too little explanation.

For sensitive personal information, the level of caution should be even higher.


XII. Evidence and burden: what to save when you suspect a fake government site

If a suspicious site or message appears, preserve evidence immediately. This matters for law enforcement, internal reporting, payment disputes, data breach response, and possible litigation.

Save the following:

  • screenshots of the message and webpage
  • the exact URL
  • email headers if it came by email
  • sender address and display name
  • phone number if by SMS or messaging app
  • date and time
  • payment instructions given
  • merchant or recipient account details
  • downloaded files
  • reference numbers used
  • browser history entry if relevant

Do not edit the screenshots. Save originals where possible.

Where money has been transferred, record:

  • transaction reference number
  • account name
  • account number or wallet identifier
  • time of transfer
  • amount
  • screenshots of confirmation pages

Good evidence handling improves the chance of freezing funds, supporting a complaint, or assisting investigation.


XIII. What to do if you already entered information into a fake site

The response should be immediate and methodical.

1. Change passwords right away

Change the password of the affected account and any other account using the same or similar password. If the compromised password was tied to email, prioritize the email account because it can be used to reset others.

2. Revoke sessions where possible

Log out of other devices and active sessions.

3. Enable or strengthen multi-factor authentication

Use authenticator-based methods where available. Do not rely only on SMS if stronger alternatives exist.

4. Contact your bank, e-wallet, or payment provider immediately

If money was sent, report it at once and request appropriate fraud controls, dispute handling, or account protection.

5. Report identity-document exposure

If government IDs, tax records, or sensitive documents were uploaded, monitor for downstream fraud.

6. Scan the device for malware

If you downloaded forms, executables, or browser extensions, inspect the device promptly.

7. Report the phishing incident to the relevant agency and cybercrime authorities

Use verified official channels only.

8. Preserve evidence

Do not destroy the messages or browser traces before documenting them.

9. Monitor accounts and records

Watch for:

  • suspicious password resets
  • new device logins
  • unauthorized applications
  • unusual financial transactions
  • fraudulent account registrations

XIV. Reporting avenues in the Philippines

The exact channel depends on the nature of the incident, but the practical reporting path often includes:

1. The impersonated government agency

Report the fake website, social page, or email so it can issue warnings and coordinate takedown efforts.

2. Cybercrime law enforcement units

Where there is fraud, unlawful access, extortion, identity theft, or system abuse, specialized cybercrime reporting may be appropriate.

3. The National Privacy Commission

If personal data has been compromised, especially on a significant scale or involving sensitive information, privacy-related reporting and guidance may become relevant.

4. Banks, e-wallets, and payment intermediaries

Immediate reporting is crucial if there is financial loss or attempted diversion.

5. Domain hosts, registrars, email providers, and platforms

Fake pages can sometimes be disabled faster through platform abuse reporting.

6. The DICT or relevant government ICT office

Where the problem concerns fake government digital infrastructure, coordination with public ICT authorities may be useful.

A victim should not wait for perfect certainty before preserving evidence and making a good-faith report.


XV. Organizational risk: businesses, law firms, schools, and NGOs

The danger is not limited to individual citizens. Philippine organizations routinely interact with regulators, local governments, courts, procurement systems, labor offices, and tax platforms. A successful phishing event can expose employee data, payroll information, client records, permits, corporate filings, and financial credentials.

Organizations should adopt internal controls such as:

  • a written verification protocol for government communications
  • a rule against paying based solely on email instructions
  • dual verification for regulatory payment requests
  • a whitelist of official domains
  • phishing awareness training using local examples
  • centralized reporting of suspicious notices
  • browser bookmarks for verified government portals
  • legal/compliance review of unusual directives
  • document retention for incident response

In legal risk terms, failure to implement ordinary verification controls may compound operational loss.


XVI. How lawyers and compliance officers should approach online government notices

A legal professional should avoid acting on a digital notice until the following are checked:

  • source domain
  • office authority
  • legal basis cited
  • internal consistency of the issuance
  • publication channel
  • whether the notice appears in the agency’s actual official repositories
  • whether the required action matches the agency’s statutory powers

The correct question is not merely whether the document looks official, but whether it originates from an authorized source and falls within real legal competence.

For compliance work, every urgent online directive should be authenticated before reliance, especially if it demands payment, confidential data, or immediate system access.


XVII. Can a private site ever lawfully provide government-related services?

Yes, but with caution.

A private website may:

  • discuss government requirements
  • help users understand procedures
  • offer consultancy or filing assistance
  • aggregate public information
  • provide value-added services

But it should not misrepresent itself as the government. It should not use confusing branding, fake domains, deceptive layouts, or unauthorized payment representations that cause a user to believe it is the official agency.

The legal risk grows where the site falsely implies government endorsement, authority, or identity.

Thus, the key distinction is between informational assistance and deceptive impersonation.


XVIII. Search results, ads, and SEO manipulation

One of the biggest modern risks is the assumption that the first result is the official one. That is false. Search results can include:

  • advertisements
  • manipulated rankings
  • typo-squatted pages
  • content farms
  • third-party service sellers
  • archived or outdated pages

A user must never treat search ranking as legal authenticity. In the government context, domain verification outranks search placement.

The safer habit is to rely on manually entered official domains and verified bookmarks.


XIX. QR codes, PDFs, and attachments deserve separate scrutiny

Phishing is no longer limited to fake websites. It often arrives through:

  • PDF advisories
  • downloadable forms
  • QR codes on posters or social media graphics
  • spreadsheet attachments
  • macros or executable “installers”
  • browser-extension prompts

A PDF using official logos may still link to a fake site. A QR code may conceal the destination until scanned. A spreadsheet may contain malicious formulas or macros. A compressed file claiming to contain “clearance results” may install malware.

Therefore:

  • do not trust the document merely because it looks official
  • inspect links before opening
  • verify the source domain separately
  • avoid enabling macros
  • treat executable downloads with extreme suspicion

XX. Social engineering beyond the website itself

Many victims are not fooled by the site alone but by the surrounding narrative. The attacker may call first, message later, and then send the link. Or the attacker may impersonate a government employee and use procedural language to lower suspicion.

Common pressure points include:

  • “This must be completed today”
  • “Your record is flagged”
  • “This is part of the audit”
  • “This is confidential, do not call the hotline”
  • “The main website is down, use this alternate portal”

That last phrase is especially dangerous. Alternate portals should be verified from the main official domain, not accepted at face value.


XXI. What ordinary citizens should never disclose to a supposed government website without careful verification

Never casually disclose:

  • passwords
  • OTPs
  • ATM PINs
  • full banking credentials
  • e-wallet login details
  • recovery codes
  • security question answers
  • complete scans of multiple IDs
  • selfies holding ID unless clearly required by a verified official process
  • highly sensitive records unrelated to the transaction

Even when an official site requests data, the user should still ask whether the request is proportionate and expected.


XXII. The importance of official publication and lawful process

In the Philippine legal system, not every online statement attributed to a government office has the same legal force. Some actions require formal issuance, publication, proper signing authority, or procedural steps before they can bind the public or produce legal effects.

This matters because phishing often mimics legal tone:

  • “pursuant to regulations”
  • “under authority of”
  • “final compliance order”
  • “mandatory update”

But language alone does not create legal validity. A citizen should distinguish between:

  • a real official issuance,
  • an informal advisory,
  • a third-party explanation,
  • and an outright fraudulent imitation.

XXIII. Best practices for schools, barangays, LGUs, and public institutions

Government impersonation harms public trust, so public institutions also have preventive responsibilities. Good practices include:

  • using consistent official domains
  • publishing verified contact lists
  • warning against unofficial channels
  • maintaining updated privacy notices
  • promptly debunking fake advisories
  • coordinating with ICT and legal offices on takedowns
  • training frontline staff never to send ad hoc payment links from personal accounts
  • implementing authenticated official social media presence
  • using clear publication workflows for notices and circulars

Where institutions are inconsistent in their own digital practices, phishing becomes easier.


XXIV. A practical legal standard for ordinary users

A reasonable Philippine user should apply this rule:

Treat any government-related digital communication as unverified until three things match: the domain, the agency source, and the transaction channel.

That means:

  • the domain is official,
  • the agency openly owns the page,
  • the payment or submission path is one the agency itself recognizes.

If any one of those three fails, the risk is substantial.


XXV. A model step-by-step verification workflow

For individuals and businesses, this is a defensible workflow:

Step 1: Stop and inspect

Do not click immediately, especially when threatened with deadlines or penalties.

Step 2: Read the actual domain

Ignore the logo and headline for the moment.

Step 3: Independently open the official agency website

Do not use the link in the message.

Step 4: Navigate from the main site to the relevant service

See whether the same portal appears.

Step 5: Check official notices and contact information

Look for matching advisories or procedural guidance.

Step 6: Verify payment details separately

No payment should be made to unconfirmed recipients.

Step 7: Preserve evidence if suspicious

Take screenshots before the page disappears.

Step 8: Report through known official channels

Do not reply to the suspicious sender for guidance.

This workflow is simple enough for ordinary users and strong enough to reduce legal and practical risk significantly.


XXVI. Key misconceptions that cause victims to fall for fake government websites

“It has a padlock, so it must be safe.”

False. The padlock shows encryption, not government authenticity.

“It came from social media, so it must be official.”

False. Social media is easily spoofed or compromised.

“It was the first result in search.”

False. Ranking is not proof of legitimacy.

“The logo looks real.”

False. Logos are easy to copy.

“They knew my name, so it must be the agency.”

False. Attackers may already have partial personal data.

“The payment QR code worked.”

False. A functioning payment channel can still send money to a fraudster.

“The website asked for my OTP only to verify my account.”

False. OTP requests are classic takeover mechanisms.


XXVII. The minimum rules every Filipino internet user should memorize

  1. Check the domain, not the design.
  2. Prefer .gov.ph for official Philippine government websites.
  3. Never trust links in urgent messages without independent verification.
  4. Never give OTPs, passwords, or banking credentials to a supposed government portal without strong separate confirmation.
  5. Verify payment channels from the main official website.
  6. Use official contact information already published on the verified site.
  7. Save evidence immediately if a site looks fake.
  8. Report fast if money or personal data may have been compromised.

Conclusion

Verifying official government websites in the Philippines is not a matter of convenience; it is a matter of legal prudence, digital hygiene, and personal protection. A citizen or business should not assume that a site is official because it uses a state logo, official-sounding language, or a convincing interface. Authenticity depends on the real domain, identifiable agency control, and consistency with authorized public channels.

Phishing thrives where people act first and verify later. The most effective defense remains disciplined verification: independently access the main official domain, confirm the site is truly under a recognized government address such as .gov.ph, validate the office and payment channel, and refuse to disclose sensitive credentials or make urgent payments based solely on unverified digital prompts.

In the Philippine legal environment, the issue sits at the intersection of cybercrime, privacy, electronic transactions, fraud, and public accountability. The practical rule is clear: a government transaction should never proceed until the user has verified the source, the site, and the channel. When that habit becomes standard, fake portals lose much of their power.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.