Identity Theft and Unauthorized Use of a Name Online

I. Introduction

A person’s name is not a mere label. It is a legal identifier, a marker of personality, reputation, family relations, professional standing, and social identity. In the digital age, a name can be copied, misused, impersonated, attached to false statements, placed on fake accounts, or exploited for scams within seconds. Online misuse of a person’s name can result in financial loss, reputational harm, emotional distress, privacy violations, harassment, and even criminal liability wrongly attributed to the victim.

In the Philippine context, identity theft and unauthorized use of a name online may involve several overlapping areas of law: cybercrime, data privacy, civil liability, criminal law, intellectual property, consumer protection, election law, and special rules on minors, public officers, professionals, and businesses. The legal consequences depend on how the name was used, whether personal information was collected or processed, whether deception or fraud occurred, whether defamatory content was published, and whether the act was committed through a computer system or online platform.

This article discusses the legal framework, common scenarios, possible causes of action, remedies, evidentiary issues, and practical steps available in the Philippines.


II. Meaning of Identity Theft Online

Identity theft generally refers to the unauthorized acquisition, use, misuse, transfer, possession, or manipulation of another person’s identifying information with intent to deceive, defraud, impersonate, or cause damage.

Online identity theft may involve the use of:

  • A person’s full name;
  • Photographs or profile pictures;
  • Signature;
  • Address;
  • mobile number or email address;
  • government-issued identification details;
  • usernames or account credentials;
  • social media account names;
  • professional titles;
  • business names;
  • school or employment affiliations;
  • bank, e-wallet, or credit card information;
  • biometric or sensitive personal information.

Not every unauthorized use of a name is automatically “identity theft” in the strict criminal sense. The legal classification depends on the surrounding facts. For example, merely mentioning someone’s name in a post may not be identity theft. But creating a fake Facebook profile using another person’s name and photo to solicit money, harass others, or damage reputation may trigger criminal, civil, and data privacy consequences.


III. Unauthorized Use of a Name Online

Unauthorized use of a name online occurs when a person uses another person’s name without consent in a manner that violates law, rights, or legitimate interests.

It may appear in many forms:

  1. Fake social media accounts Someone creates an account using another person’s name, photograph, or personal details.

  2. Online scams A scammer uses a person’s name to borrow money, sell fake products, solicit donations, or deceive contacts.

  3. False endorsements A person’s name or image is used to imply endorsement of a product, service, investment scheme, or political cause.

  4. Defamatory posts A person’s name is attached to false accusations, insults, malicious statements, or fabricated screenshots.

  5. Romance scams and catfishing A person’s identity is used to build fake relationships or obtain money, images, or confidential information.

  6. Professional impersonation Someone pretends to be a lawyer, doctor, teacher, accountant, government employee, or company officer using another person’s name.

  7. Business impersonation A person uses the name of a business owner, trade name, brand, or corporate officer to transact online.

  8. Unauthorized account access Someone hacks or takes over an online account and uses the victim’s name to communicate or transact.

  9. Doxxing and malicious publication A person’s name is published with private information to expose, shame, threaten, or endanger them.

  10. Fraudulent documents or applications A name is used in online forms, lending apps, job applications, SIM registration, e-wallet accounts, or delivery platforms without authority.


IV. Key Philippine Laws That May Apply

A. Cybercrime Prevention Act of 2012

The Cybercrime Prevention Act is central to online identity misuse because it penalizes offenses committed through computer systems.

Relevant offenses may include:

1. Computer-related identity theft

This is the closest statutory offense to online identity theft. It generally concerns the intentional acquisition, use, misuse, transfer, possession, alteration, or deletion of identifying information belonging to another person, without right.

A person’s “identifying information” may include data that can identify or authenticate a person, such as name, username, password, personal details, or account information.

This offense may apply when someone uses another person’s identity online to deceive others, access accounts, create fake profiles, or perform acts as if they were the victim.

2. Illegal access

If the offender accessed a person’s email, social media account, online banking, cloud storage, or device without permission, illegal access may be involved.

3. Data interference or system interference

If the offender altered, deleted, or damaged account data, messages, profile details, or stored files, other cybercrime offenses may arise.

4. Computer-related fraud

If the unauthorized use of a name was part of a scheme to obtain money, property, credit, e-wallet transfers, goods, or services, computer-related fraud may apply.

5. Cyberlibel

If the offender used the victim’s name in defamatory online posts, comments, messages, articles, videos, or other electronic publication, cyberlibel may be implicated.

Cyberlibel is especially relevant where the misuse of a name is not merely impersonation but also reputational attack.


B. Revised Penal Code

The Revised Penal Code may apply independently or in combination with cybercrime laws.

Possible offenses include:

1. Estafa

If a person uses another’s name to deceive someone into parting with money or property, estafa may arise. Online scams using a fake identity often involve estafa.

Examples include:

  • pretending to be a relative asking for emergency funds;
  • using another person’s name to sell nonexistent products;
  • soliciting donations using a victim’s identity;
  • pretending to be a company officer to obtain payments.

2. Falsification

If the offender used another person’s name in falsified documents, electronic forms, fake IDs, certificates, receipts, or screenshots, falsification may be relevant.

3. Usurpation of authority or official functions

If someone pretends to be a public officer or performs acts under the name of a public official, criminal liability may arise.

4. Slander, libel, or unjust vexation

Depending on the conduct, defamatory or harassing use of a name may fall under offenses involving honor or personal disturbance.

5. Threats or coercion

If the unauthorized use of a name is accompanied by threats, blackmail, extortion, or intimidation, additional offenses may be involved.


C. Data Privacy Act of 2012

The Data Privacy Act protects personal information and sensitive personal information. A person’s name, especially when combined with other identifying details, is personal information.

Unauthorized use of a name online may violate data privacy rules when there is improper collection, use, disclosure, retention, or processing of personal data.

Possible issues include:

  • using someone’s name and photo without consent;
  • publishing private details without lawful basis;
  • processing personal information for fraud or harassment;
  • exposing contact details, addresses, IDs, or employment information;
  • using personal data obtained from hacked accounts or leaked databases.

The National Privacy Commission may become relevant where the issue involves personal data misuse, data breaches, unauthorized processing, or privacy violations.

However, the Data Privacy Act does not automatically cover every casual mention of a name online. The law is strongest where there is “processing” of personal information and where no lawful basis exists.


D. Civil Code

Even when criminal prosecution is difficult, civil remedies may be available.

The Civil Code recognizes that rights must be exercised with justice, honesty, and good faith. It also provides remedies for damages caused by fault, negligence, abuse of rights, defamation, invasion of privacy, or acts contrary to morals, good customs, or public policy.

Possible civil claims may include:

1. Damages for injury to reputation

If the unauthorized use of a name damaged a person’s honor, reputation, business, or profession, the victim may claim damages.

2. Moral damages

Moral damages may be claimed for mental anguish, serious anxiety, social humiliation, wounded feelings, or similar injury caused by wrongful acts.

3. Exemplary damages

Where the act is particularly malicious, fraudulent, or oppressive, exemplary damages may be sought to deter similar conduct.

4. Injunction

A court may be asked to order the offender to stop using the victim’s name, remove content, cease impersonation, or refrain from further publication.

5. Damages for abuse of rights

Even if a person claims freedom of expression, that right may not be exercised in a way that maliciously harms another.


E. Intellectual Property and Trade Name Issues

For individuals, a name is generally protected through personality, privacy, civil, and criminal law. For businesses, brands, celebrities, influencers, and professionals, intellectual property may also be relevant.

Unauthorized use of a name may involve:

  • trademark infringement;
  • unfair competition;
  • false designation of origin;
  • passing off;
  • unauthorized commercial endorsement;
  • misuse of a business name or trade name;
  • fake pages pretending to be an official seller or company.

A person’s personal name may sometimes function as a brand, especially for artists, influencers, professionals, public figures, and business owners. If the name is registered or used commercially in a way that identifies goods or services, intellectual property remedies may be available.


F. Consumer Protection and Online Scams

Where the unauthorized use of a name is connected to online selling, fake shops, investment schemes, or fraudulent advertisements, consumer protection laws and regulations may be relevant.

Examples include:

  • fake seller pages using a legitimate person’s name;
  • fake investment offers using a public figure’s name;
  • fraudulent endorsements;
  • misleading online advertisements;
  • unauthorized use of a business owner’s name to collect payments.

Victims may report scams to appropriate law enforcement agencies and, where consumer transactions are involved, to relevant regulatory bodies.


G. Special Laws and Sector-Specific Rules

Depending on the facts, other laws may apply:

1. SIM Registration-related misuse

If a person’s name or documents are used to register a SIM card without consent, this may involve identity theft, falsification, data privacy violations, and regulatory concerns.

2. E-wallet and banking fraud

If a person’s name is used for bank accounts, e-wallets, loans, or online financial transactions, banking, anti-fraud, anti-money laundering, and financial consumer protection rules may become relevant.

3. Lending apps

Some lending apps misuse names, contacts, photos, and personal information to shame borrowers or contact third parties. This may involve privacy violations, harassment, unfair collection practices, and cyber offenses.

4. Election-related impersonation

During election periods, fake accounts and unauthorized name use may involve election laws, misinformation, cyberlibel, or unlawful campaigning depending on the facts.

5. Professional regulation

If someone uses another person’s name and professional title, such as attorney, doctor, engineer, nurse, architect, or accountant, the matter may also be reported to the relevant professional regulatory body.


V. Is Using Another Person’s Name Online Always Illegal?

No. The legality depends on context.

A person’s name may be lawfully used in certain situations, such as:

  • news reporting;
  • fair comment on matters of public interest;
  • court pleadings or official records;
  • academic writing;
  • legitimate criticism;
  • public documents;
  • lawful business records;
  • consented use;
  • parody or satire, within limits;
  • ordinary references where no privacy, fraud, or defamation issue exists.

However, lawful mention becomes legally risky when it includes deception, impersonation, fraud, malice, defamation, privacy invasion, harassment, or unauthorized processing of personal data.

The key question is not simply, “Was the name used?” The better questions are:

  • Was there consent?
  • Was the use deceptive?
  • Was the use malicious?
  • Was personal information processed without lawful basis?
  • Was the victim impersonated?
  • Was money or property obtained?
  • Was reputation harmed?
  • Was private information exposed?
  • Was a computer system or online account involved?
  • Was the public misled?
  • Was the name used commercially?

VI. Common Online Scenarios and Legal Treatment

1. Fake Facebook, Instagram, TikTok, or X Account

A fake account using another person’s name and photo may constitute identity theft, especially if used to deceive others. If the account posts defamatory statements, cyberlibel may also arise. If it asks for money, estafa or computer-related fraud may be involved.

Immediate steps include preserving evidence, reporting the account to the platform, warning contacts, and filing a complaint with cybercrime authorities if harm occurred.

2. Someone Uses Your Name to Borrow Money Online

This may involve identity theft, estafa, computer-related fraud, and civil liability. The victim should collect screenshots of messages, transaction receipts, sender details, account names, phone numbers, and any proof showing lack of consent.

3. Your Name Is Used in a Fake Online Store

This may involve fraud, unfair competition, consumer deception, or identity theft. If the fake store uses your business name, trademark, logo, or personal identity, both criminal and intellectual property remedies may be considered.

4. Your Name and Photo Are Used for a Fake Dating Profile

This may involve identity theft, data privacy violations, harassment, unjust vexation, or civil damages. If the fake profile solicits money or intimate images, additional offenses may arise.

5. Your Name Is Attached to a Defamatory Post

This may involve cyberlibel if the statement is defamatory, identifiable, published online, and malicious. Civil damages may also be available.

6. Your Name Is Used in an Online Loan or E-wallet Account

This may involve identity theft, falsification, data privacy violations, and financial fraud. The victim should immediately notify the financial institution, request account freezing or investigation, and file complaints with relevant authorities.

7. Your Name Is Used in a Fake Endorsement

If someone uses your name to imply that you endorse a product, investment, political campaign, or service, remedies may include civil damages, takedown requests, intellectual property claims, consumer protection complaints, and cybercrime complaints if fraud is involved.

8. Someone Hacks Your Account and Uses Your Name

This may involve illegal access, identity theft, data interference, fraud, privacy violations, and possibly cyberlibel if defamatory content is posted. Account recovery and evidence preservation are urgent.


VII. Elements Commonly Considered in Identity Misuse Cases

Although exact legal elements depend on the specific charge, authorities and courts often consider:

  1. Identification Was the victim clearly identifiable?

  2. Unauthorized use Did the offender use the name or identity without permission?

  3. Intent Was the use intentional, fraudulent, malicious, deceptive, or harmful?

  4. Means Was a computer system, social media platform, messaging app, or electronic device used?

  5. Damage or risk Did the use cause financial loss, reputational harm, emotional distress, privacy invasion, or risk of harm?

  6. Publication or communication Was the name used publicly or sent to specific persons?

  7. Benefit to offender Did the offender gain money, access, attention, advantage, or leverage?

  8. Evidence linking offender to act Can the fake account, device, number, IP address, email, payment account, or platform activity be connected to the suspect?


VIII. Evidence in Online Identity Theft Cases

Evidence is often the most important part of an online identity misuse case. Online content can be deleted quickly, so preservation is critical.

Useful evidence includes:

  • screenshots showing the URL, account name, date, time, and content;
  • screen recordings showing navigation to the fake account or post;
  • profile links and usernames;
  • message threads;
  • email headers;
  • transaction receipts;
  • GCash, Maya, bank, or remittance details;
  • phone numbers used;
  • SIM details if available;
  • account recovery notices;
  • login alerts;
  • witness statements;
  • notarized affidavits;
  • platform reports;
  • police blotter or cybercrime complaint;
  • proof of ownership of the real account;
  • proof of actual identity;
  • proof of damage, such as lost clients, cancelled transactions, emotional distress, or reputational injury.

For stronger evidentiary value, victims often secure notarized affidavits and, when appropriate, request technical assistance from authorities. Screenshots should be preserved in their original form when possible. Avoid editing or cropping evidence in a way that removes context.


IX. Where to Report in the Philippines

Depending on the facts, reports may be made to:

1. Philippine National Police Anti-Cybercrime Group

For cybercrime complaints, online identity theft, hacking, scams, fake accounts, cyberlibel, and related matters.

2. National Bureau of Investigation Cybercrime Division

For cybercrime investigation, digital evidence evaluation, and complaints involving online fraud, identity theft, impersonation, or cyberlibel.

3. National Privacy Commission

For unauthorized processing, disclosure, or misuse of personal information.

4. Social media platforms

For takedown, impersonation reports, fake account removal, hacked account recovery, or content moderation.

5. Banks, e-wallets, telcos, and online platforms

For account freezing, transaction disputes, fraud reports, KYC-related concerns, SIM misuse, or recovery.

6. Barangay or police blotter

For documentation, especially if the incident involves harassment, threats, or known suspects. However, cybercrime matters often require escalation to specialized cybercrime units.

7. Courts

For civil actions, injunctions, damages, or criminal proceedings through proper prosecution channels.


X. Remedies Available to Victims

A. Platform Takedown

The quickest remedy is often to report the fake account, impersonation, scam page, or defamatory content to the platform. This may not replace legal action, but it can reduce harm.

B. Account Recovery

If the victim’s actual account was hacked, immediate recovery steps should be taken:

  • change passwords;
  • enable two-factor authentication;
  • log out unknown devices;
  • recover email access;
  • check forwarding rules;
  • secure linked phone numbers;
  • review authorized apps;
  • notify contacts.

C. Criminal Complaint

A criminal complaint may be appropriate if there is identity theft, fraud, hacking, cyberlibel, threats, extortion, or falsification.

D. Civil Action

A victim may seek damages, injunction, or other civil remedies.

E. Data Privacy Complaint

If personal information was collected, posted, sold, shared, or used without lawful basis, a complaint may be filed with the National Privacy Commission.

F. Demand Letter

A demand letter may ask the offender to:

  • stop using the victim’s name;
  • take down fake accounts or posts;
  • issue a correction;
  • preserve evidence;
  • pay damages;
  • cease contacting others;
  • stop further publication.

A demand letter should be carefully drafted, especially if criminal proceedings are contemplated.

G. Protective Measures

Where there are threats, stalking, harassment, domestic abuse, sexual exploitation, or danger to minors, additional protective remedies may be needed.


XI. Liability of Platforms

Online platforms usually provide reporting tools for impersonation, fake accounts, scams, harassment, or privacy violations. Whether a platform itself can be held liable depends on complex facts, including notice, control, participation, compliance with law, terms of service, and applicable regulations.

In most cases, victims first pursue:

  • takedown requests;
  • impersonation reports;
  • hacked account recovery;
  • fraud reports;
  • preservation requests through law enforcement;
  • subpoenas or official requests during investigation.

Private individuals generally cannot compel a platform to disclose account registration data without proper legal process.


XII. Public Figures and Unauthorized Use of Name

Public figures, politicians, celebrities, influencers, and professionals face special issues. Their names are more likely to be mentioned in news, commentary, criticism, satire, or public debate. However, public visibility does not authorize identity theft, fraud, fake endorsements, or malicious impersonation.

A public figure may have claims where their name is used to:

  • sell products without consent;
  • promote scams;
  • imply false endorsement;
  • create fake accounts;
  • spread defamatory statements;
  • deceive voters, clients, or followers;
  • misuse professional reputation.

Freedom of expression protects fair comment and legitimate criticism, but it does not protect fraud, impersonation, or knowingly false defamatory claims.


XIII. Children and Minors

Unauthorized use of a minor’s name or image online is especially sensitive. Parents or guardians may act to protect the child’s privacy, safety, and dignity.

Potential concerns include:

  • fake accounts using a child’s name;
  • cyberbullying;
  • sexual exploitation;
  • doxxing;
  • use of school details;
  • unauthorized posting of images;
  • scams targeting family members;
  • impersonation in messaging apps.

Where minors are involved, immediate reporting, evidence preservation, and safety planning are important.


XIV. Employees, Employers, and Workplace Identity Misuse

Identity misuse may occur in employment settings. Examples include:

  • fake HR accounts;
  • unauthorized use of an employee’s name to send instructions;
  • fake resignation letters;
  • impersonation of executives for payment scams;
  • misuse of employee IDs;
  • fake job postings using a company officer’s name;
  • former employees using company identities after separation.

Employers should have internal protocols for phishing, account compromise, data breaches, and identity misuse. Employees should report incidents promptly to HR, IT, legal, or compliance teams.


XV. Businesses and Corporate Names

For businesses, unauthorized use of a name online can damage goodwill and customer trust.

Common examples include:

  • fake Facebook pages pretending to be the business;
  • fraudulent sellers using a registered business name;
  • fake customer service accounts;
  • phishing emails using company officer names;
  • fake job recruitment pages;
  • unauthorized use of logos, trade names, or trademarks.

Possible remedies include cybercrime complaints, intellectual property enforcement, consumer protection complaints, platform takedowns, public advisories, and civil actions.


XVI. Cyberlibel and Identity Theft Compared

Cyberlibel and identity theft often overlap but are distinct.

Identity theft focuses on unauthorized use of identifying information.

Cyberlibel focuses on defamatory online publication.

A fake account using another person’s name may be identity theft even without defamatory content. A defamatory post mentioning a person’s name may be cyberlibel even without impersonation. If someone creates a fake account under the victim’s name and posts defamatory content, both issues may arise.


XVII. Data Privacy and Defamation Compared

Data privacy protects personal information from unlawful processing, misuse, exposure, or disclosure.

Defamation protects reputation against false and malicious statements.

A post may violate privacy even if it is not defamatory. For example, publishing someone’s home address, ID number, or private medical information may be a privacy issue even without insults. Conversely, a false accusation may be defamatory even if it does not reveal private data.


XVIII. Freedom of Expression as a Defense

A person accused of unauthorized name use may invoke freedom of speech. However, freedom of expression is not absolute.

It generally does not protect:

  • fraud;
  • impersonation;
  • identity theft;
  • hacking;
  • threats;
  • extortion;
  • cyberlibel;
  • unauthorized processing of personal data;
  • false commercial endorsements;
  • malicious harassment;
  • unlawful disclosure of private information.

The balance depends on the content, purpose, context, public interest, truth or falsity, and harm caused.


XIX. Practical Checklist for Victims

A victim of online identity theft or unauthorized use of name should consider the following:

  1. Do not immediately engage the offender emotionally. Interaction may escalate the situation or alert the offender to delete evidence.

  2. Capture evidence. Take screenshots, screen recordings, URLs, timestamps, and account identifiers.

  3. Preserve original files. Save messages, emails, receipts, and notifications.

  4. Warn affected contacts. Tell friends, clients, family, or coworkers not to transact with the fake account.

  5. Report to the platform. Use impersonation, scam, harassment, or privacy reporting tools.

  6. Secure your accounts. Change passwords and enable two-factor authentication.

  7. Check financial accounts. Monitor e-wallets, banks, credit cards, and online loans.

  8. File reports when necessary. Approach cybercrime authorities, banks, telcos, or the NPC depending on the incident.

  9. Consult a lawyer for serious cases. Especially where there is fraud, reputation damage, threats, extortion, or financial loss.

  10. Avoid public accusations without proof. Publicly naming a suspected offender without sufficient evidence may create legal risk.


XX. Practical Checklist for Accused Persons

A person accused of identity theft or unauthorized use of a name should:

  1. preserve communications and evidence;
  2. avoid deleting material if legal proceedings are likely, unless advised regarding takedown obligations;
  3. stop any questionable use immediately;
  4. avoid contacting the complainant in a threatening or harassing manner;
  5. consult counsel before responding to demand letters or investigators;
  6. prepare proof of consent, parody, public interest, or legitimate purpose if applicable;
  7. avoid retaliatory posts.

Even where the accused believes the matter is a misunderstanding, careless online statements can worsen liability.


XXI. Preventive Measures

To reduce the risk of identity misuse:

  • use strong, unique passwords;
  • enable two-factor authentication;
  • limit public visibility of personal information;
  • avoid posting IDs, addresses, travel details, and financial information;
  • watermark publicly shared photos if appropriate;
  • monitor fake accounts using your name;
  • secure email accounts because they often control password resets;
  • avoid sharing OTPs;
  • verify requests for money by calling the person directly;
  • regularly review account login activity;
  • educate family members, employees, and clients about impersonation scams.

Businesses should also maintain verified pages, publish official contact channels, train staff on phishing, and issue quick advisories when fake accounts appear.


XXII. Sample Demand Letter Structure

A demand letter for unauthorized use of a name may include:

  1. identity of the complainant;
  2. description of the unauthorized use;
  3. links, screenshots, or evidence;
  4. statement that no consent was given;
  5. specific demands, such as takedown, cessation, correction, apology, or damages;
  6. deadline for compliance;
  7. reservation of rights to pursue criminal, civil, administrative, or data privacy remedies.

The tone should be firm but not threatening beyond lawful remedies.


XXIII. Sample Affidavit Points

An affidavit may state:

  • the affiant’s identity;
  • ownership of the real name, account, business, or professional identity;
  • discovery of the fake account or unauthorized use;
  • absence of consent;
  • details of harm or risk;
  • screenshots and attachments;
  • names of persons deceived or contacted;
  • financial losses, if any;
  • steps taken to report or mitigate;
  • request for investigation or legal action.

Affidavits should be truthful, specific, and supported by attachments.


XXIV. Challenges in Enforcement

Identity theft cases can be difficult because offenders may use:

  • fake names;
  • prepaid SIMs;
  • VPNs;
  • hacked accounts;
  • mule bank accounts;
  • foreign platforms;
  • anonymous email addresses;
  • deleted posts;
  • disposable devices.

Even so, digital traces may remain through payment records, phone numbers, IP logs, platform data, device identifiers, email headers, and witness communications. Timely reporting improves the chance of preservation.


XXV. Prescription and Urgency

Victims should act promptly. Delay can cause evidence loss, continued harm, and difficulty in tracing offenders. Legal deadlines may vary depending on the claim or offense. Because prescription periods and procedural requirements can be technical, serious cases should be evaluated promptly by counsel or appropriate authorities.


XXVI. Ethical and Social Dimensions

Unauthorized use of a person’s name online is not merely a technical violation. It attacks trust. It can destroy relationships, livelihoods, reputations, and safety. In the Philippines, where social media is deeply woven into family, business, politics, and community life, identity misuse can spread rapidly and cause harm beyond the original post.

Responsible digital conduct requires:

  • verifying identity before sending money;
  • avoiding reposting unverified accusations;
  • respecting privacy;
  • reporting fake accounts;
  • not using another person’s name for jokes, revenge, or profit;
  • understanding that online acts have offline consequences.

XXVII. Conclusion

In the Philippines, identity theft and unauthorized use of a name online may give rise to criminal, civil, administrative, privacy, intellectual property, and consumer protection consequences. The Cybercrime Prevention Act, Data Privacy Act, Revised Penal Code, Civil Code, and related laws may all become relevant depending on the facts.

The central legal issues are consent, deception, harm, intent, publication, personal data use, and proof. A victim should preserve evidence immediately, secure accounts, report to platforms and authorities, and consider legal action where the harm is serious. A person accused of unauthorized use should stop questionable conduct, preserve evidence, and seek legal advice before making public statements or responses.

The law recognizes that a person’s name carries dignity, identity, and rights. Online spaces do not erase those rights. Misusing another person’s name on the internet can lead to real legal consequences in the Philippines.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.