Legal Remedies for Unauthorized Access and Hacking of Email Accounts

Philippine Context

Unauthorized access to an email account is not a minor digital inconvenience. In the Philippines, it can amount to several distinct legal wrongs at once: a cybercrime, an unlawful interference with data or systems, identity misuse, privacy violation, fraud, defamation, extortion, or a gateway offense to more serious crimes such as theft, estafa, and corporate espionage. Because email is often the center of a person’s personal, financial, and professional life, hacking an email account can trigger both criminal liability and civil liability, along with administrative or regulatory consequences.

This article explains the legal remedies available in the Philippines when an email account is accessed without authority, what laws may apply, what evidence matters, what victims can do, what prosecutors usually need to prove, and what practical limits exist in enforcement.


I. What counts as unauthorized access to an email account

In Philippine legal context, unauthorized access generally means intentionally entering, using, controlling, interfering with, or remaining in an email account, system, or related data without permission, beyond the scope of consent, or through deceit, circumvention, or exploitation.

This may include:

  • guessing or stealing a password
  • logging into another person’s Gmail, Yahoo, Outlook, company mail, or school email without permission
  • bypassing two-factor authentication
  • using malware, phishing, keyloggers, spyware, or credential-stuffing tools
  • taking over recovery email or phone settings
  • reading, copying, forwarding, deleting, altering, or suppressing emails without authority
  • impersonating the owner of the account
  • using access to commit fraud, blackmail, defamation, harassment, or business sabotage
  • continuing to access an email after consent has been withdrawn
  • accessing a former partner’s or employee’s email without authority
  • using an “I knew the password” theory as an excuse despite lack of legal permission

The law looks less at the hacker’s label for what they did and more at the act, intent, means used, and the harm caused.


II. Main Philippine laws that may apply

1. Cybercrime Prevention Act of 2012

Republic Act No. 10175

This is the primary law for email hacking cases in the Philippines. The most relevant offense is typically illegal access, which punishes access to the whole or any part of a computer system without right.

Because email accounts exist within a computer system or networked service, breaking into an email account commonly falls within illegal access. Depending on what the offender did after entry, other offenses under the same law may also apply.

Potentially relevant cybercrime offenses include:

a. Illegal Access

This is the core offense where someone intentionally accesses a computer system without right. Accessing another person’s email inbox, sent folder, drafts, archives, or administrative settings without permission can fall here.

b. Illegal Interception

If the offender captures transmissions of non-public data to, from, or within a computer system, such as intercepting credentials, messages, or login sessions, this may apply.

c. Data Interference

Deleting emails, altering message content, corrupting stored communications, changing filters, suppressing delivery, or tampering with account settings may amount to data interference.

d. System Interference

If the attacker impairs the functioning of the email service or related systems, for example by locking out the user, triggering denial-of-service effects, or sabotaging enterprise mail systems, system interference may be charged.

e. Misuse of Devices

Possessing, producing, selling, procuring, importing, distributing, or making available devices, programs, passwords, access codes, or similar data primarily designed or adapted to commit cyber offenses may be punishable.

f. Computer-Related Forgery

Using the compromised email to create false electronic communications, falsify headers, make it appear that the victim sent a message, or manipulate electronic records can support this charge.

g. Computer-Related Fraud

If the hacked email is used to deceive others into sending money, disclosing secrets, or approving transactions, computer-related fraud may arise.

h. Computer-Related Identity Theft

Taking over someone’s email to impersonate them, represent oneself as the account owner, or exploit their identifying information may support identity theft charges.

i. Cyber Libel, Threats, Extortion, or Other Offenses through the hacked account

If the attacker sends defamatory statements, threats, blackmail messages, or extortion demands through the victim’s email, liability may expand beyond illegal access.

2. Electronic Commerce Act of 2000

Republic Act No. 8792

This law remains relevant because it penalizes certain forms of hacking and unauthorized access involving computer systems and networks. Although more recent cybercrime law is usually central, RA 8792 may still be invoked alongside or as supporting framework depending on the facts.

It is especially relevant where the unauthorized access affects electronic documents, electronic data messages, e-commerce systems, or integrity of digital transactions.

3. Data Privacy Act of 2012

Republic Act No. 10173

Email accounts often contain personal information, sensitive personal information, correspondence, financial data, IDs, medical records, business records, and personal communications. If unauthorized access involves personal data, the Data Privacy Act may become important.

Possible implications include:

  • Unauthorized processing or access to personal data
  • Improper disclosure
  • Negligent security by organizations
  • Failure of a personal information controller or processor to protect email-linked personal data
  • Possible complaints before the National Privacy Commission

This law becomes especially significant when the hacked account belongs to an employee, customer, client, student, patient, or any person whose data an organization is obliged to protect.

4. Revised Penal Code, as supplemented by cybercrime law where applicable

Even when the entry point is an email hack, the conduct may also fall under traditional crimes, especially if the email compromise was merely a means to commit them. These can include:

  • Estafa through deception or fraudulent inducement
  • Qualified theft or related property offenses where access leads to misappropriation
  • Falsification where altered messages or fake instructions are used
  • Grave threats, unjust vexation, coercion, or similar offenses
  • Unjust enrichment-type factual patterns in civil terms
  • Libel or other crimes against honor, depending on the platform and facts

Where the offense is committed by, through, and with the use of information and communications technologies, penalties may be affected by cybercrime rules.

5. Anti-Wiretapping Act

Republic Act No. 4200, in limited cases

This law traditionally concerns unauthorized recording or interception of private communications. It is not the first law cited in a typical email hack, but in a fact pattern involving interception of private communications or surreptitious capture of communications, it may become relevant depending on the precise conduct and the kind of communication involved.

6. Special laws on financial fraud, access devices, or sectoral regulations

If the email hack is used to compromise online banking, e-wallets, securities accounts, or card accounts, additional laws may apply depending on the mechanism used. Corporate, banking, telecom, labor, school, and regulatory rules may also matter.


III. Why email hacking is usually more than one offense

A single compromise can produce layered liability.

Example:

A person guesses an ex-partner’s password, opens the email, downloads private photos, resets the social media account connected to that email, sends messages to contacts asking for money, and threatens to leak sensitive material.

That can involve:

  • illegal access
  • identity theft
  • computer-related fraud
  • data interference
  • unlawful disclosure of private information
  • extortion or grave threats
  • possible Data Privacy Act issues
  • civil damages for mental anguish, reputational harm, and actual losses

In practice, prosecutors often assess the case transactionally, meaning they look at the whole chain of conduct.


IV. Elements that generally matter in proving the case

To pursue remedies, the victim usually needs to show some combination of the following:

1. Ownership, control, or lawful use of the email account

This can be shown by:

  • the registered email address
  • subscriber details
  • recovery phone or recovery email
  • long-term usage history
  • device linkage
  • business records or HR records for corporate email
  • screenshots of profile settings

2. Lack of authorization

This is crucial. The issue is not just whether the accused physically accessed the account, but whether they had legal authority to do so.

Common points:

  • Knowing the password does not automatically mean having permission.
  • Prior consensual access does not justify later access after breakup, termination, revocation, or account separation.
  • A spouse, partner, parent, employer, or IT staff member does not have unlimited authority by default.
  • Shared devices do not automatically create consent to access accounts.

3. Intentional access or interference

Criminal liability generally requires intentional conduct, though some privacy or organizational failures may involve negligence on the civil or administrative side.

4. Digital traces linking the accused to the intrusion

Such as:

  • IP logs
  • login timestamps
  • device fingerprints
  • browser or app session records
  • recovery-email changes
  • SIM swap records
  • OTP requests
  • forensic artifacts
  • forwarded-message trails
  • cloud audit logs
  • employer network records
  • CCTV showing device use
  • admissions in chat or text messages

5. Resulting harm or unlawful objective

Though illegal access itself may already be punishable, proving downstream harm strengthens the case:

  • financial loss
  • emotional distress
  • identity misuse
  • disclosure of secrets
  • reputational damage
  • blackmail
  • sabotage of work or business
  • loss of accounts linked to the email

V. Criminal remedies available to victims

1. Filing a criminal complaint

The most direct legal remedy is to file a complaint with law enforcement for cybercrime investigation. In the Philippines, victims commonly approach:

  • the PNP Anti-Cybercrime Group
  • the NBI Cybercrime Division
  • the prosecutor’s office, after investigation materials are assembled
  • other relevant law enforcement or specialized desks, depending on the facts

A complaint can lead to:

  • forensic investigation
  • preservation requests
  • subpoenas or applications for production of data, subject to law and process
  • identification of suspects
  • filing of criminal information in court

2. Offenses that can be charged

Depending on facts, the complaint may allege one or more of the following:

  • illegal access
  • illegal interception
  • data interference
  • system interference
  • misuse of devices
  • computer-related forgery
  • computer-related fraud
  • computer-related identity theft
  • estafa
  • threats or extortion
  • libel or cyber libel
  • other related offenses

3. Penalties

Penalties depend on the exact offense charged. In general, cybercrime law imposes serious criminal penalties, including imprisonment and fines. Where a traditional crime is committed through ICT, the penalty may be imposed at a higher degree under cybercrime rules, subject to statutory interpretation and the exact charge.

Because penalty language depends on the specific section and charging theory, the precise exposure must be determined offense by offense.

4. Attempt, conspiracy, and accomplice liability

People who assist the hack may also face liability:

  • the person who obtained the password
  • the one who supplied malware or phishing tools
  • the one who received and used stolen data
  • the insider who gave access
  • the person who benefitted from the fraudulent email scheme

In business or domestic disputes, victims often focus only on the person who clicked “log in,” but anyone who knowingly participated may be relevant.


VI. Civil remedies and damages

Even where criminal prosecution is pursued, the victim may also seek civil relief.

1. Civil damages under the Civil Code and related principles

A hacked-email victim may claim damages where there is:

  • violation of rights
  • abuse of rights
  • unlawful interference with privacy
  • fraud
  • bad faith
  • willful injury
  • defamation
  • breach of confidence
  • breach of contractual or professional obligations

Possible damages include:

a. Actual or compensatory damages

For proven financial loss, such as:

  • stolen funds
  • lost business
  • remediation expenses
  • forensic expenses
  • account recovery costs
  • legal fees where recoverable
  • replacement of devices or services
  • costs of notifying clients or contacts

b. Moral damages

Where the victim suffers:

  • anxiety
  • embarrassment
  • sleeplessness
  • humiliation
  • mental anguish
  • social stigma
  • emotional distress from exposure of intimate or private communications

This is especially important in cases involving family disputes, romantic partners, leaked personal messages, and public humiliation.

c. Exemplary damages

Possible where the defendant acted in a wanton, fraudulent, reckless, oppressive, or malevolent manner.

d. Nominal damages

Where a legal right was violated even if large measurable loss is hard to quantify.

2. Injunctive relief

Where ongoing harm exists, the victim may seek relief to stop further misuse, disclosure, access, or publication. Depending on circumstances, counsel may pursue temporary restraining or injunctive remedies in court.

This becomes important when:

  • the attacker still controls the account
  • confidential business information is being leaked
  • intimate content is being threatened for release
  • fraudulent messages are continuing
  • there is continuing identity impersonation

3. Recovery from third parties in appropriate cases

An organization may face civil exposure if its poor security, negligent administration, or unauthorized employee conduct contributed to the compromise. This is highly fact-specific.

Possible targets may include:

  • the direct hacker
  • an employer or organization that mishandled access credentials
  • an insider employee
  • a service provider, in unusual cases involving proven fault
  • a data controller or processor under privacy law principles

VII. Data Privacy Act remedies

When the hacked email contains personal data or the breach involves an organization’s handling of personal information, the Data Privacy Act becomes especially important.

1. Complaint before the National Privacy Commission

Victims may file a complaint where there is:

  • unauthorized access to personal data
  • failure to secure personal information
  • unlawful disclosure
  • improper processing
  • failure to observe data subject rights

This is especially useful when the issue is not only “someone hacked me,” but also “a company failed to protect my email-linked data” or “my employer unlawfully accessed my mailbox.”

2. Organizational obligations

Businesses, schools, clinics, and other entities may have duties involving:

  • security measures
  • access controls
  • retention policies
  • breach response
  • protection of employee and customer data
  • lawful processing standards

A company that casually allows supervisors, IT personnel, or former administrators to access email content without lawful basis can create separate legal exposure.

3. Personal data breach implications

A hacked corporate or institutional email account may trigger internal breach analysis and possible notification obligations, depending on the severity, the type of data involved, and regulatory standards.


VIII. Employer, workplace, and corporate email issues

Unauthorized access disputes often arise in workplaces. The legal analysis differs depending on whether the account is personal or company-issued.

1. Company email does not always mean unlimited employer access

An employer may have stronger rights over a company-provided email system, especially if policies clearly state monitoring, access control, security review, and acceptable use rules. But that does not mean any manager may freely pry into email contents at will.

What matters includes:

  • written policy
  • notice to employees
  • scope of monitoring
  • legitimate business purpose
  • due process
  • privacy considerations
  • data protection obligations

2. IT administrators and supervisors

IT personnel who access email beyond authorized maintenance or security functions may face liability. Technical ability is not the same as legal right.

3. Former employees

After separation, disputes arise over mailbox ownership, redirection, preservation of business data, and residual access. If a former employee keeps logging in after authority has ended, that can become illegal access. Likewise, if an employer accesses a departed employee’s personal email using retained credentials, that can also create liability.

4. Trade secrets and confidential business communications

If hacked email contains trade secrets, client lists, legal strategies, procurement information, or financial records, the case may expand into commercial harm, breach of confidence, or unfair competition-type issues depending on facts.


IX. Domestic, relationship, and family settings

A large number of email hacking incidents happen in intimate or family contexts.

Common examples:

  • spouse opens spouse’s email secretly
  • ex-partner keeps access after breakup
  • parent monitors adult child’s account without consent
  • relative uses a shared laptop to open private email
  • partner resets passwords and locks out owner

In these cases, the emotional and privacy aspects are often severe. The fact that the parties know each other does not erase illegality. Consent is the key issue. Prior relationship is not a blanket defense.

Where threats, coercion, surveillance, stalking, or abuse are involved, other protective laws and remedies may also enter the picture.


X. Hacking plus fraud: common business email compromise scenarios

One of the most damaging forms of email hacking is business email compromise:

  • attacker takes over executive or accounting email
  • attacker reads invoice threads
  • attacker sends fake payment instructions
  • clients or staff wire funds to the wrong account
  • attacker deletes or hides warning emails

Possible legal consequences include:

  • illegal access
  • computer-related fraud
  • falsification or forgery-related theories
  • estafa
  • identity theft
  • civil damages for the victim company and deceived third parties

These cases are evidence-heavy and often require quick preservation of logs, bank records, payment trails, and correspondence.


XI. Evidence: what victims should preserve

In cybercrime matters, early evidence preservation often determines whether a case is prosecutable.

Important items include:

1. Account activity records

  • login alerts
  • security notifications
  • “new device” alerts
  • password reset emails
  • OTP messages
  • recovery-setting changes
  • account access history

2. Screenshots and exports

  • inbox changes
  • deleted or sent messages
  • account settings
  • recovery email or phone modifications
  • suspicious forwarding rules
  • filter settings
  • trash and archive contents

3. Device and network data

  • device used when compromise was discovered
  • browser history
  • app logs
  • antivirus or anti-malware reports
  • router logs, where available
  • corporate VPN or network logs

4. Communications with the suspect

  • admissions in text, chat, or email
  • threats
  • blackmail messages
  • proof of motive
  • knowledge that only the hacker could have had

5. Financial and consequential-loss records

  • bank statements
  • proof of fraudulent transfers
  • invoices
  • client complaints
  • contracts lost
  • expenses incurred for remediation

6. Witnesses

  • IT personnel
  • co-workers
  • recipients of fraudulent messages
  • family members who saw access or admissions
  • custodians of business records

Original data should be preserved carefully. Manipulating evidence, using only edited screenshots, or wiping compromised devices can weaken the case.


XII. Immediate practical steps with legal significance

Though the question is about legal remedies, some technical steps have direct evidentiary and legal value.

A victim should promptly:

  • change password from a secure device
  • activate or reset two-factor authentication
  • revoke suspicious sessions and connected apps
  • preserve logs before they disappear
  • save headers and raw email data where relevant
  • check forwarding, filters, delegation settings, and recovery settings
  • notify affected contacts if impersonation occurred
  • alert banks, e-wallet providers, and counterparties if fraud is possible
  • report internally if the account is business-related
  • consult counsel where sensitive or regulated data is involved
  • file a complaint with the appropriate cybercrime authorities

The sequence matters. Secure first, but preserve evidence before overwriting or deleting material where feasible.


XIII. Can the victim sue even if the hacker is unknown

Yes. The victim may begin with a complaint against unknown persons while investigation proceeds. Cybercrime investigations often start with an unidentified intruder and build toward identification through:

  • platform records
  • ISP information
  • phone number links
  • device associations
  • insider leads
  • financial trails
  • correlated account behavior

Civil action is harder when the offender is unknown, but criminal investigation can still begin.


XIV. Jurisdiction and venue issues

Email hacking often crosses cities and countries. The Philippines may still assert jurisdiction where material elements occurred in the country, where the victim is in the Philippines, where the account use or damage is tied to Philippine territory, or where statutes allow prosecution of cyber offenses with Philippine nexus.

Venue and jurisdiction in cybercrime cases can be more complex than in ordinary crimes because acts may occur across multiple places. Investigators usually assess where access occurred, where harm was felt, where servers or victims are located, and where relevant acts took place.


XV. Service providers, subpoenas, and cross-border evidence problems

Many email providers are foreign-based. This creates practical challenges:

  • logs may be retained only for limited periods
  • data may require formal requests or lawful process
  • content and subscriber data may be treated differently
  • foreign disclosure rules may apply
  • the speed of local investigation may not match retention windows

This is one reason early reporting matters. Even a strong claim can weaken if records expire before preservation is sought.


XVI. Defenses commonly raised by accused persons

1. “I had the password”

Not enough by itself. The issue is authorization, not mere capability.

2. “We were married / dating / family”

Relationship status is not automatic consent.

3. “It was company email”

This depends on policy, scope, notice, and role. Company ownership does not always immunize unjustified access.

4. “I just looked, I didn’t steal anything”

Illegal access may already be punishable even without proven financial theft.

5. “The account was left open on a shared computer”

This may affect proof and intent, but it is not a universal defense.

6. “I was just helping with security”

Security-related access must still be authorized and within scope.

7. “The victim consented before”

Prior consent may be limited, revocable, or irrelevant to later acts.


XVII. Limits and challenges in Philippine enforcement

Even where the law is favorable, actual enforcement can be difficult.

Common obstacles include:

  • lack of preserved digital evidence
  • delayed reporting
  • anonymous tools, VPNs, spoofing, or disposable accounts
  • foreign providers and cross-border process delays
  • poor chain of custody
  • victims relying only on screenshots
  • inability to identify the exact human actor behind a device
  • underestimation of domestic or insider threats
  • mixing personal disputes with weak digital proof

This does not mean there is no remedy. It means success depends heavily on evidence quality and speed.


XVIII. Special issue: hacked email used to access other accounts

Email is often the “master key” to other digital identities. Once hacked, it may be used to reset:

  • social media accounts
  • bank accounts
  • e-wallets
  • cloud storage
  • e-commerce accounts
  • work platforms
  • government portals
  • messaging apps

This multiplies legal exposure. Each linked misuse may generate additional charges and damage claims.


XIX. Email confidentiality and privacy interests

Email usually contains highly private communications. Even where a hacker claims curiosity, jealousy, or informal entitlement, the law can recognize the wrongful invasion of privacy. The victim’s injury is not limited to money. The intrusion into private correspondence, dignity, and autonomy is itself serious.

In Philippine disputes, this matters particularly in:

  • intimate-partner surveillance
  • blackmail with personal content
  • workplace snooping
  • access to lawyer-client, doctor-patient, HR, or disciplinary communications
  • political or journalistic correspondence
  • student and school matters

XX. Interaction with constitutional and evidentiary concerns

The victim’s right to pursue remedies is separate from the rules governing admissibility of evidence and constitutional protections.

Important considerations:

  • Evidence must be obtained and preserved lawfully.
  • Vigilante counter-hacking is risky and can create separate liability.
  • Employers and private complainants should avoid unlawful evidence-gathering tactics.
  • Forensic collection should respect chain-of-custody principles.

A victim should not “hack back” into the suspect’s systems. That can complicate both the case and the victim’s legal position.


XXI. Can settlement happen

Yes. Some cases settle, especially where the harm is reputational, relational, or commercial and the victim’s priority is cessation, apology, account return, deletion of copied data, and compensation. But not all cyber offenses are simply erasable by private compromise. The criminal dimension may remain subject to public prosecution rules.

Settlement also does not guarantee that copied data has actually been destroyed.


XXII. Typical legal pathways depending on the fact pattern

1. Pure privacy intrusion

A person secretly reads another’s email but does not steal money.

Likely remedies:

  • criminal complaint for illegal access
  • civil action for damages
  • possible privacy complaint if personal data issues are present

2. Fraud through email takeover

Attacker impersonates victim and obtains money.

Likely remedies:

  • illegal access
  • computer-related fraud
  • identity theft
  • estafa
  • civil damages

3. Employer or insider snooping

Manager or IT personnel opens employee mailbox beyond authority.

Likely remedies:

  • cybercrime complaint depending on facts
  • Data Privacy Act complaint
  • labor, administrative, and civil consequences
  • internal discipline or dismissal for the wrongdoer

4. Ex-partner account takeover and blackmail

Former partner keeps access, downloads private messages, threatens disclosure.

Likely remedies:

  • illegal access
  • data interference if content was altered or deleted
  • identity-related or threat-related charges
  • civil damages
  • possible injunction
  • other protective legal remedies depending on abuse context

5. Corporate mailbox breach with client data exposure

Attacker compromises officer’s email and customer data is exposed.

Likely remedies:

  • cybercrime prosecution
  • privacy compliance actions
  • NPC complaint or regulatory exposure
  • civil suits by affected parties
  • contractual claims and insurance issues

XXIII. What victims should be ready to explain in a complaint

A strong complaint usually tells a clean chronology:

  1. What the email account is and who lawfully controls it
  2. When unusual activity began
  3. How the victim discovered the intrusion
  4. What unauthorized acts were observed
  5. Why the suspect had no authority
  6. What evidence ties the suspect to the access
  7. What losses or injuries resulted
  8. What immediate steps were taken
  9. Whether other linked accounts were compromised
  10. Whether threats, fraud, or disclosure occurred

Specificity matters more than emotion. Dates, times, screenshots, logs, and copies of suspicious messages strengthen the complaint.


XXIV. Prescription, delay, and urgency

Victims should act quickly. Delay can affect:

  • evidence availability
  • provider log retention
  • traceability of IP and device data
  • recovery chances
  • financial clawback possibilities
  • credibility of the narrative

Even if a case is still legally viable, late action can make proof much harder.


XXV. Key distinctions that often decide the case

1. Password knowledge vs legal authority

A person may know the credentials and still have no right to enter.

2. Shared device vs shared account

Using the same laptop does not mean consent to read a private email.

3. Company ownership vs personal privacy

Corporate control over infrastructure does not mean limitless personal intrusion.

4. Curiosity vs criminal intent

“Just checking” can still be unlawful access.

5. Viewing vs interfering

Reading alone may already be punishable; deleting, forwarding, or impersonating makes the case stronger.


XXVI. Bottom line on available remedies

In the Philippines, the victim of unauthorized access or hacking of an email account may have several remedies at the same time:

  • Criminal remedies under the Cybercrime Prevention Act and, where applicable, the Electronic Commerce Act, Data Privacy Act, and Revised Penal Code
  • Civil remedies for actual, moral, nominal, and exemplary damages, plus injunction where ongoing harm exists
  • Administrative or regulatory remedies, especially before the National Privacy Commission in personal-data cases
  • Workplace and corporate remedies such as internal discipline, dismissal, contractual enforcement, and compliance action
  • Evidence-preservation and forensic measures that are indispensable to making any legal remedy effective

The most important legal insight is that email hacking is rarely only about “someone opened my inbox.” Under Philippine law, it is often a doorway offense that implicates privacy, identity, property, reputation, and data protection all at once. The available remedy depends on the full factual chain: how access was obtained, what was done inside the account, whose data was exposed, whether money or confidential information was involved, and how strong the digital evidence is.

Practical conclusion

For Philippine purposes, unauthorized access to an email account can support a serious legal case even where no money was stolen. The law protects not only against direct theft, but also against the invasion of digital privacy, manipulation of electronic data, impersonation, and downstream fraud. The strongest cases are built early, with preserved logs, a clean chronology, proof of lack of consent, and prompt reporting to cybercrime authorities. Where personal data, business losses, or ongoing threats are involved, criminal, civil, and privacy-law remedies may all proceed in parallel.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.