I. Introduction
In the Philippines, a person may suddenly discover that their name, identity, contact information, or personal details have been used in connection with a loan they did not apply for, authorize, guarantee, or benefit from. The situation often becomes worse when online lending applications, creditors, collectors, or private individuals begin sending threatening messages, posting defamatory content online, contacting relatives, or publicly shaming the supposed borrower.
This issue sits at the intersection of civil law, criminal law, data privacy law, cybercrime law, consumer protection, debt collection regulation, and constitutional rights. The available remedies depend on several key facts: whether the victim’s identity was falsely used, whether documents were forged, whether the victim was listed as a reference or guarantor, whether there was harassment, whether private data was unlawfully processed, and whether defamatory or threatening statements were posted online.
This article discusses the legal consequences and remedies under Philippine law when another person’s name is used in a loan and the affected person faces online harassment.
II. Common Scenarios
The problem may arise in several ways.
One common scenario is identity misuse, where a person applies for a loan using another person’s name, mobile number, identification card, address, email, signature, or photo without permission.
Another is unauthorized listing as a co-maker, guarantor, reference, emergency contact, or contact person. In many online loan applications, borrowers are required to give access to their phone contacts or list other people. The listed individuals may later receive collection messages even though they never consented to become liable.
A third scenario is forgery or falsification, where documents, signatures, IDs, employment records, payslips, certificates, or digital forms are fabricated to make it appear that the victim applied for or guaranteed a loan.
A fourth scenario is online harassment, where collectors, lenders, or other persons send threats, insults, false accusations, public posts, private messages, group chats, edited photos, or humiliating content to pressure payment.
A fifth scenario is data privacy abuse, where the lender or collector accesses, stores, shares, posts, or uses the victim’s personal information without lawful basis.
Each of these scenarios can trigger different remedies.
III. No One Becomes Liable for a Loan Merely Because Their Name Was Used
As a rule, a person is not liable for a loan unless they personally consented to the obligation or validly authorized another person to act on their behalf.
Under Philippine civil law, obligations arise from law, contracts, quasi-contracts, crimes, and quasi-delicts. A loan contract requires consent, object, and cause. If a person did not sign, agree, authorize, receive the money, act as co-maker, or bind themselves as guarantor, then there is generally no valid contractual obligation against that person.
The mere fact that a victim’s name appears in a loan application does not automatically make them liable. The creditor must prove the existence of a valid obligation. In civil cases, the lender must establish that the supposed borrower or guarantor consented to the loan.
A victim should firmly dispute liability in writing and state that they did not apply for, authorize, guarantee, or benefit from the loan.
IV. Important Distinction: Borrower, Co-Maker, Guarantor, Surety, and Reference
A key issue is the capacity in which the person’s name was used.
A borrower is the person who received or agreed to repay the loan.
A co-maker is usually solidarily liable with the principal borrower, depending on the terms of the loan document.
A guarantor generally answers only if the principal debtor fails to pay, subject to the rules on guaranty.
A surety is usually directly and solidarily liable with the debtor.
A reference, contact person, or emergency contact is not automatically liable for the debt. Being listed as a reference does not create an obligation to pay. Consent to be contacted is different from consent to become financially liable.
Many harassment incidents arise because collectors treat references as if they were debtors. This is improper. A reference who did not sign as guarantor, surety, or co-maker generally has no duty to pay.
V. Possible Civil Remedies
A. Denial of Liability and Demand to Cease Collection
The first civil remedy is to issue a written notice denying liability. The notice should say that the person:
- did not apply for the loan;
- did not authorize the use of their name;
- did not sign as borrower, co-maker, guarantor, or surety;
- did not receive loan proceeds;
- demands proof of the alleged obligation;
- demands that collection, harassment, and data processing stop; and
- reserves the right to file civil, criminal, administrative, and data privacy complaints.
This written denial is important because it creates a record that the alleged debt is disputed.
B. Action for Damages
If the misuse of the person’s name or the harassment caused injury, the victim may consider a civil action for damages.
Possible legal bases include:
Abuse of rights. Under the Civil Code, a person must act with justice, give everyone their due, and observe honesty and good faith. A creditor or collector who abuses collection efforts may be liable.
Acts contrary to morals, good customs, or public policy. Harassment, humiliation, shaming, or malicious public accusations may create liability.
Quasi-delict. A person who causes damage to another through fault or negligence may be liable for damages.
Defamation-related damages. If false statements damaged reputation, civil liability may arise independently or alongside criminal proceedings.
Recoverable damages may include actual damages, moral damages, exemplary damages, attorney’s fees, and litigation expenses, depending on proof and circumstances.
C. Injunction or Restraining Relief
In serious cases, a victim may seek court relief to stop continuing harassment, publication, or unlawful use of personal data. Injunctive relief may be appropriate where there is ongoing or threatened harm, such as repeated online posts or continuing contact with family, employers, or friends.
D. Small Claims or Regular Civil Action
If the dispute involves money claims, the procedural route depends on the claim. A creditor may file a collection case, and the victim may defend by denying consent, signature, receipt of proceeds, or authority. A victim may also file a separate civil action for damages if the injury suffered goes beyond the alleged loan amount.
VI. Possible Criminal Remedies
Using another person’s name in a loan can involve several criminal offenses depending on the facts.
A. Estafa
Estafa may be relevant if a person used deceit, false pretenses, or fraudulent means to obtain a loan or money. If someone represented themselves as another person, used another person’s identity, or falsely claimed authority, this may constitute fraud.
The victim of the identity misuse may not always be the direct financial victim; the lender may be the one deceived into releasing funds. However, the person whose identity was used may still report the matter because their name and reputation were exploited.
B. Falsification of Documents
Falsification may apply if documents were altered or fabricated, including loan applications, signatures, IDs, certificates, authorization letters, payslips, employment documents, or other records.
Falsification may involve public, official, commercial, or private documents, depending on the document used. A forged signature on a loan contract, promissory note, deed of undertaking, or guaranty agreement is a serious matter.
C. Use of Falsified Documents
Even a person who did not personally forge the document may be liable if they knowingly used a falsified document.
D. Identity Theft Under the Cybercrime Prevention Act
The Cybercrime Prevention Act recognizes computer-related identity theft. If a person acquires, uses, misuses, transfers, possesses, alters, or deletes identifying information belonging to another, whether natural or juridical, without right, this may be punishable when committed through information and communications technology.
This is especially relevant where the loan application was made through a mobile app, website, online form, digital platform, or electronic submission.
E. Computer-Related Fraud
If information and communications technology was used to obtain money through fraudulent input, alteration, deletion, or suppression of computer data, computer-related fraud may be considered.
F. Cyber Libel
If false and defamatory statements were posted online, sent through social media, published on a page, group chat, website, or digital platform, cyber libel may be relevant.
Examples may include falsely calling someone a scammer, thief, swindler, criminal, or intentionally refusing to pay a debt when the statement is untrue and maliciously published to others.
Cyber libel generally requires a defamatory imputation, publication, identification of the person defamed, and malice.
G. Grave Threats, Light Threats, or Other Threat-Related Offenses
If the victim receives threats of harm, exposure, humiliation, violence, or unlawful acts, criminal liability may arise. The classification depends on the nature of the threat and the surrounding facts.
Threatening to post private information, contact an employer, shame the person online, or fabricate accusations may also support other complaints depending on the language used.
H. Unjust Vexation
Repeated annoying, harassing, or distressing acts may fall under unjust vexation when they unjustly irritate, annoy, or torment another person without necessarily falling under a more specific offense.
I. Slander, Oral Defamation, or Intriguing Against Honor
Where the statements are made orally or through non-cyber means, traditional crimes against honor may be relevant. If the statements are online, cyber libel may be considered.
J. Coercion
If the victim is forced or pressured through intimidation to pay a debt they do not owe, or to do something against their will, coercion-related offenses may be considered depending on the facts.
VII. Data Privacy Remedies
Online loan harassment often involves misuse of personal data. The Philippines has the Data Privacy Act of 2012, enforced by the National Privacy Commission.
Personal information includes names, addresses, contact numbers, photos, IDs, employment details, financial information, and other data from which a person may be identified. Sensitive personal information includes government-issued identifiers, health information, and other protected categories.
A. Unlawful Processing of Personal Information
A lender, lending app, collector, or private person may violate data privacy rights by collecting, accessing, sharing, posting, or using personal information without lawful basis.
Examples include:
- accessing a borrower’s contact list without valid consent;
- messaging all contacts to shame the borrower;
- posting the victim’s name or photo online;
- revealing an alleged debt to relatives, friends, employers, or co-workers;
- using a non-borrower’s personal data without consent;
- storing IDs or photos without lawful purpose;
- refusing to delete or correct false information;
- using personal data for harassment rather than legitimate collection.
B. Rights of the Data Subject
A victim may invoke data subject rights, including the right to be informed, object, access, correct, erase or block, and claim damages where appropriate.
A person whose name was used without consent may demand that the lender or collector disclose the source of the data, stop processing the data, correct the records, delete unlawfully obtained information, and cease sharing the information with third parties.
C. Complaint Before the National Privacy Commission
A victim may file a complaint with the National Privacy Commission if personal data was misused. Evidence should include screenshots, messages, call logs, app names, lender names, collector names, phone numbers, links, proof of posts, and proof that the victim did not consent.
The NPC may investigate privacy violations and impose appropriate measures under the Data Privacy Act and related issuances.
VIII. Online Lending Applications and Abusive Debt Collection
Online lending harassment has been a recurring problem in the Philippines. Some lending or financing companies, collection agents, or online lending platforms use shame-based collection tactics, including mass messaging contacts, public accusations, threats, and privacy invasions.
A. Regulatory Agencies
Depending on the entity involved, possible agencies include:
Securities and Exchange Commission. Lending companies and financing companies are generally regulated by the SEC. Complaints may be filed against abusive lending or collection practices, especially if the lender is a registered lending or financing company.
National Privacy Commission. Privacy violations, unlawful processing of personal data, unauthorized contact scraping, or public posting of personal information may be brought to the NPC.
Philippine National Police Anti-Cybercrime Group or National Bureau of Investigation Cybercrime Division. Cyber harassment, cyber libel, identity theft, online threats, and computer-related fraud may be reported to cybercrime authorities.
Bangko Sentral ng Pilipinas. If the entity is a BSP-supervised financial institution, complaint channels may apply.
Department of Trade and Industry. Consumer protection issues may sometimes fall within DTI jurisdiction, depending on the nature of the transaction and entity.
B. Prohibited or Improper Collection Practices
Even when a debt is valid, collection must not be abusive. Creditors and collectors may pursue lawful collection, but they should not threaten, shame, defame, harass, disclose private information, or contact unrelated third parties in a manner that violates privacy and dignity.
If the alleged debt is not valid as to the victim, collection efforts against that victim become even more problematic.
IX. Cyber Harassment and Online Defamation
Online harassment can appear in many forms:
- repeated threatening private messages;
- public Facebook posts calling the victim a scammer;
- edited photos or memes;
- posting the victim’s ID, address, phone number, or employer;
- tagging relatives, friends, or workmates;
- creating group chats to shame the victim;
- contacting the employer to damage employment;
- using fake accounts;
- sending threats of arrest, imprisonment, or public exposure;
- pretending to be police, lawyers, courts, or government officials.
A victim should preserve evidence immediately. Online posts may be deleted quickly, so screenshots should include the full URL, username, date, time, profile link, comments, and visible context. Where possible, use another device to record the screen showing the account, post, URL, and date. For stronger evidentiary value, the victim may seek notarization, certification, or assistance from cybercrime authorities.
X. Demand Letter to the Lender, Collector, or Person Responsible
A demand letter may be useful before filing complaints. It should be firm, factual, and concise.
The letter may include the following points:
- The victim did not apply for or authorize the loan.
- The victim did not sign as borrower, co-maker, guarantor, or surety.
- Any use of the victim’s name, number, ID, image, or signature was unauthorized.
- The alleged debt is disputed.
- The sender demands copies of all documents allegedly linking the victim to the loan.
- The sender demands cessation of collection calls, messages, harassment, threats, public posts, and third-party disclosures.
- The sender demands deletion, correction, or blocking of unlawfully processed personal data.
- The sender warns that complaints may be filed before the SEC, NPC, PNP-ACG, NBI Cybercrime Division, prosecutor’s office, and courts.
- The sender reserves all civil, criminal, administrative, and data privacy remedies.
A demand letter is not always required, especially when threats or serious harassment are ongoing, but it can help establish that the victim objected and gave notice.
XI. Barangay Remedies
For disputes between individuals who live in the same city or municipality, barangay conciliation under the Katarungang Pambarangay system may be required before certain court actions may proceed.
However, barangay conciliation may not apply in all cases, especially where the dispute involves corporations, persons from different cities or municipalities, offenses punishable beyond the barangay’s authority, urgent legal relief, or cybercrime matters. Complaints involving online lenders, companies, or serious criminal conduct are often more appropriately brought before law enforcement, regulators, prosecutors, or courts.
Barangay blotter reports may still be useful to document harassment, threats, or identity misuse.
XII. Police, NBI, and Prosecutor Remedies
A. Filing a Police or NBI Complaint
For identity theft, cyber harassment, cyber libel, threats, online fraud, and falsification, the victim may approach:
- PNP Anti-Cybercrime Group;
- NBI Cybercrime Division;
- local police station for blotter and referral;
- city or provincial prosecutor’s office.
The victim should bring printed and digital evidence, valid ID, screenshots, URLs, phone numbers, names of suspects if known, demand letters, proof of non-consent, and any loan-related documents received.
B. Prosecutor’s Office
Criminal complaints are generally evaluated through preliminary investigation where required. The complainant submits a complaint-affidavit and supporting evidence. The respondent is given an opportunity to submit a counter-affidavit. The prosecutor determines whether probable cause exists.
C. Affidavit Evidence
A complaint-affidavit should narrate:
- the victim’s identity and personal circumstances;
- how the victim discovered the unauthorized loan;
- why the victim did not consent;
- what personal data was used;
- who contacted or harassed the victim;
- what statements were made;
- when and where the online posts or messages appeared;
- how the victim was damaged;
- what evidence is attached.
XIII. Evidence to Gather
Evidence is crucial. The victim should gather and preserve:
- screenshots of loan messages;
- screenshots of online posts, comments, group chats, and private messages;
- URLs and profile links;
- call logs;
- SMS messages;
- emails;
- app notifications;
- names of lending apps or companies;
- SEC registration details if available;
- proof that the victim did not receive funds;
- bank or e-wallet records;
- copies of IDs allegedly used;
- forged documents or signatures;
- affidavits of witnesses who received harassment messages;
- proof of emotional, reputational, employment, or financial damage;
- medical or counseling records if emotional distress is severe;
- employer notices or workplace consequences;
- correspondence with the lender or collector;
- demand letters and replies.
Screenshots should be preserved in original form and backed up. Do not edit or crop the only copy. Keep metadata where possible.
XIV. What the Victim Should Avoid Doing
The victim should avoid paying merely to stop harassment unless strategically advised, because payment may be misinterpreted as acknowledgment of the debt.
The victim should avoid admitting liability in messages. Avoid saying “I will pay” or “I owe this” if the debt is disputed.
The victim should avoid retaliatory posts that may expose them to defamation or privacy complaints.
The victim should avoid deleting evidence.
The victim should avoid giving additional personal information to unknown collectors.
The victim should avoid negotiating by phone only. Written communication is better because it creates a record.
The victim should avoid ignoring a formal court summons. Even if the debt is false, failure to respond to a court case may have serious consequences.
XV. Possible Liability of the Person Who Used the Name
The person who used another’s name may face civil and criminal liability.
Potential consequences include:
- civil damages for injury caused;
- criminal liability for estafa;
- criminal liability for falsification;
- cybercrime liability for identity theft or computer-related fraud;
- liability for data privacy violations if personal data was misused;
- liability for defamation if false accusations were made;
- liability for harassment, threats, coercion, or unjust vexation.
If the person benefited from the loan proceeds, that fact strengthens possible fraud or unjust enrichment claims.
XVI. Possible Liability of the Lender or Collector
A lender or collector may also face liability if they:
- failed to verify the borrower’s identity;
- processed personal data without lawful basis;
- disclosed the alleged debt to third parties;
- harassed the victim;
- posted defamatory statements;
- threatened arrest or imprisonment without basis;
- contacted employers, relatives, or friends to shame the victim;
- used fake accounts;
- refused to correct records after notice;
- continued collection despite proof of identity misuse;
- used abusive or unfair collection methods.
A lender is not automatically liable for every false application submitted by a fraudster. However, once notified of the dispute, the lender should act responsibly, verify the claim, suspend improper collection, preserve records, and avoid further harm.
XVII. When the Victim Was Listed as a Contact Reference
Being listed as a contact reference is one of the most common causes of harassment. A reference generally does not owe the debt.
A reference may tell the collector:
“I am not the borrower, co-maker, guarantor, or surety. I did not consent to be liable for this loan. Do not contact me again regarding collection. Do not process or share my personal information. Any further contact, harassment, or disclosure will be documented for legal action.”
Collectors may contact references only within lawful limits and without harassment, threats, shaming, or unlawful disclosure. They cannot transform a reference into a debtor.
XVIII. When the Victim’s ID or Signature Was Used
If an ID, selfie, signature, or document was used, the victim should immediately dispute the authenticity of the transaction.
Possible steps include:
- demand a copy of the loan application and supporting documents;
- compare signatures and details;
- check whether the ID was stolen, lost, copied, or previously submitted elsewhere;
- file a police blotter or cybercrime report;
- submit a notarized affidavit of denial;
- notify the lender in writing;
- request correction and blocking of data;
- monitor credit records and future collection notices.
Forgery should be treated seriously because it can affect reputation, creditworthiness, employment, and future transactions.
XIX. When the Victim’s Employer Is Contacted
Collectors sometimes contact employers to pressure payment. This may create claims for privacy violation, defamation, harassment, or damages, especially if the collector reveals an alleged debt to co-workers or supervisors.
The victim should document:
- who was contacted;
- what was said;
- when it happened;
- whether false accusations were made;
- whether employment consequences resulted;
- whether the employer received screenshots, calls, or emails.
An affidavit from the employer, HR officer, supervisor, or co-worker may help.
XX. When Private Photos or Personal Details Are Posted Online
Posting someone’s photo, address, phone number, ID, workplace, family details, or alleged debt online can trigger several remedies.
Depending on the facts, this may involve:
- violation of the Data Privacy Act;
- cyber libel;
- unjust vexation;
- grave coercion;
- threats;
- civil damages;
- platform reporting;
- takedown requests;
- complaints to cybercrime authorities.
The victim should immediately save evidence before requesting takedown, because once the content is removed, proof may become harder to obtain.
XXI. Defenses Against a Collection Case
If the lender sues the victim, possible defenses may include:
- lack of consent;
- forgery;
- identity theft;
- absence of authority;
- no receipt of loan proceeds;
- not a party to the contract;
- no valid guaranty or suretyship;
- invalid electronic consent;
- lack of proof of obligation;
- fraud by a third person;
- violation of due process in collection;
- unlawful or abusive charges, depending on the loan terms.
The victim should not ignore summons or notices. Court deadlines are strict.
XXII. Electronic Contracts and Digital Consent
Online loans often rely on electronic forms, OTPs, e-signatures, selfies, uploaded IDs, and app-based consent. Philippine law recognizes electronic documents and electronic signatures under certain conditions.
However, recognition of electronic records does not mean every digital transaction is valid against the person named. The lender still needs to prove that the person actually consented, that authentication was reliable, and that the transaction was not the result of identity theft or unauthorized use.
A victim may challenge whether the alleged digital consent was truly theirs.
Relevant issues include:
- whose device was used;
- whose SIM or email received the OTP;
- whether the phone number belonged to the victim;
- whether the ID was stolen or copied;
- whether biometric verification was used;
- whether the app accessed contacts unlawfully;
- whether the lender verified the applicant’s identity;
- whether the e-wallet or bank account receiving proceeds belonged to the victim.
XXIII. Administrative Complaints Against Lending Companies
If the entity is a lending or financing company, the victim may file an administrative complaint with the appropriate regulator. Complaints may involve unfair collection practices, abusive conduct, unauthorized disclosure, misleading representations, or operating without proper registration.
The complaint should attach:
- screenshots;
- company name;
- app name;
- phone numbers used;
- proof of harassment;
- proof that the complainant is not the borrower;
- demand letters;
- replies from the lender;
- SEC registration information if known.
Administrative remedies may not always award personal damages, but they can lead to regulatory action and help stop abusive practices.
XXIV. Data Subject Request Template
A victim may send a data privacy request to the lender or collector:
I dispute any alleged loan under my name. I did not apply for, authorize, guarantee, or receive proceeds from the alleged loan. I demand that you disclose the source of my personal data, the purpose of processing, the categories of data processed, the recipients to whom my data was disclosed, and copies of documents allegedly bearing my consent. I object to further processing of my personal data and demand correction, blocking, or deletion of unlawfully processed data. I further demand that you cease contacting me, my relatives, employer, friends, or other third parties regarding this disputed obligation.
This request should be sent through traceable means such as email, registered mail, official support channels, or documented messaging platforms.
XXV. Demand to Stop Harassment Template
A concise anti-harassment notice may say:
I am not the borrower, co-maker, guarantor, or surety of the alleged loan. I did not authorize the use of my name or personal information. Your repeated messages, threats, and disclosures to third parties are unlawful and are causing damage to my reputation and privacy. I demand that you immediately stop contacting me and all third parties regarding this alleged debt. I also demand that you preserve all records relating to the loan application, communications, data processing, and collection activities, as these may be used in civil, criminal, administrative, and data privacy proceedings.
XXVI. Complaint-Affidavit Outline
A complaint-affidavit may be structured as follows:
- Personal details of complainant.
- Statement that the complainant did not apply for or authorize the loan.
- Description of how complainant learned of the loan.
- Identification of the lender, app, collector, borrower, or suspected offender.
- Description of personal data used.
- Description of forged documents, if any.
- Description of harassment, threats, or online posts.
- Dates, times, phone numbers, accounts, links, and witnesses.
- Damage suffered.
- Legal violations believed to have been committed.
- List of attached evidence.
- Prayer for investigation and prosecution.
The affidavit should be truthful, specific, and supported by evidence.
XXVII. Remedies Against Social Media Posts
For online posts, the victim may take parallel steps:
- preserve screenshots and URLs;
- report the post to the platform;
- send a takedown request;
- send a demand letter to the poster;
- file a cybercrime complaint;
- file a data privacy complaint;
- consider a civil action for damages;
- request the platform or authorities to preserve account information where legally available.
A takedown request may remove harmful content, but it should usually come after evidence is preserved.
XXVIII. Prescription and Timing Concerns
Legal claims are subject to prescriptive periods. The applicable period depends on the offense or cause of action. Cybercrime, defamation, falsification, civil damages, and data privacy complaints may have different deadlines.
Because online harassment can be continuous, every new post, message, or threat may create additional evidence and potentially a separate actionable event. However, delay can weaken a case, especially if accounts disappear, posts are deleted, or records become unavailable.
Prompt action is advisable.
XXIX. Practical Step-by-Step Response
A victim may proceed as follows:
- Do not admit liability.
- Preserve all evidence.
- Identify the lender, app, collector, borrower, and phone numbers involved.
- Send a written denial of liability.
- Demand copies of all loan documents and proof of consent.
- Demand cessation of collection and harassment.
- Send a data privacy objection and deletion/correction request.
- Report online posts to the platform after preserving evidence.
- File a barangay blotter if appropriate.
- File a complaint with the SEC if a lending or financing company is involved.
- File a complaint with the NPC for privacy violations.
- File a complaint with PNP-ACG or NBI Cybercrime for online harassment, identity theft, threats, or cyber libel.
- Consult counsel for civil damages, injunction, or defense against any collection suit.
- Respond immediately to any court summons.
XXX. Special Considerations for Minors, Students, Employees, and OFWs
If the victim is a minor, additional protections may apply, and the parent or guardian should act promptly.
If the victim is a student, harassment directed at classmates, teachers, or school administrators may aggravate reputational harm.
If the victim is an employee, contacting the employer may cause employment-related damage and strengthen claims for moral damages or privacy violations.
If the victim is an OFW, online harassment may affect work abroad, family reputation, and immigration or employment concerns. Evidence should be preserved digitally, and complaints may be coordinated through Philippine authorities or representatives in the Philippines.
XXXI. Liability for False Accusations Against the Victim
A person who falsely accuses another of being a debtor, scammer, fraudster, thief, or criminal may be liable if the accusation is defamatory and communicated to others.
The defense that “there was a loan record” may not automatically protect the accuser if the statement was made recklessly, maliciously, publicly, or after the victim had already denied liability. Truth, good motives, fair comment, privileged communication, and absence of malice may be raised as defenses depending on the case, but abusive public shaming is legally risky.
XXXII. Debt Collection Does Not Justify Harassment
Even a valid debt does not authorize harassment. Creditors may demand payment, send notices, negotiate, or file a collection case. They may not use threats, defamation, public humiliation, unlawful data disclosure, or coercion.
Where the target is not even the borrower, the collector’s conduct becomes more vulnerable to legal challenge.
XXXIII. Importance of Written Communication
Victims should communicate in writing as much as possible. Written communication creates a record and reduces the risk of misquotation.
Good written communication should be:
- factual;
- calm;
- firm;
- non-defamatory;
- specific;
- dated;
- saved in multiple copies.
Avoid emotional threats or insults. Let the evidence speak.
XXXIV. Possible Remedies Summary
The victim may have the following remedies:
Civil remedies: denial of liability, damages, injunction, correction of records, defense in collection suit.
Criminal remedies: estafa, falsification, use of falsified documents, cyber identity theft, computer-related fraud, cyber libel, threats, coercion, unjust vexation, and related offenses depending on facts.
Data privacy remedies: data subject request, objection to processing, request for deletion or correction, NPC complaint.
Administrative remedies: complaints against lending or financing companies, abusive online lending apps, or regulated financial entities.
Platform remedies: takedown requests, reporting fake accounts, reporting harassment, requesting preservation of evidence.
Practical remedies: evidence preservation, written notices, affidavits, police blotter, cybercrime complaint, employer notification, and legal counsel.
XXXV. Conclusion
When another person’s name is used in a loan, the central legal question is consent. A person who did not apply for, authorize, guarantee, or benefit from a loan is generally not liable merely because their name or contact details appear in the records. If their personal data, signature, ID, or identity was misused, the matter may involve civil liability, criminal offenses, cybercrime, and data privacy violations.
Online harassment makes the situation more serious. Public shaming, threats, defamatory posts, unauthorized disclosure of personal data, and abusive collection practices are not legitimate debt collection methods. The victim should preserve evidence, dispute the debt in writing, demand cessation of harassment and data processing, and pursue appropriate remedies before regulators, cybercrime authorities, prosecutors, or courts.
This article is for general legal information in the Philippine context and is not a substitute for advice from a lawyer who can evaluate the specific facts, documents, evidence, and procedural options.