Legal Steps to Take Against Poser Accounts and Online Defamation

The digital landscape in the Philippines is a double-edged sword. While it facilitates unprecedented connectivity, it also provides a fertile ground for "poser" accounts and character assassination. For victims of identity theft and online defamation, the Philippine legal system offers several avenues for redress, primarily governed by the Revised Penal Code (RPC) and Republic Act No. 10175, otherwise known as the Cybercrime Prevention Act of 2012.


1. Understanding the Offenses

Computer-Related Identity Theft

Under Section 4(b)(3) of R.A. 10175, identity theft is the intentional acquisition, use, misuse, transfer, possession, or alteration of identifying information belonging to another, whether natural or juridical, without right.

In the context of "poser" accounts, the mere act of creating a profile using someone else's name and photo to deceive the public or cause damage constitutes a criminal offense. It is not necessary for the poser to solicit money; the unauthorized use of the persona is sufficient for the crime to be considered.

Cyber Libel

Cyber Libel is essentially traditional libel—defined under Article 353 of the RPC—committed through a computer system. The elements of libel are:

  1. Allegation of a discreditable act or condition: An imputation of a crime, vice, defect, or any act that tends to cause dishonor or contempt.
  2. Publicity: The defamatory statement was seen or read by a third person.
  3. Malice: The intent to injure the reputation of another.
  4. Identifiability: The victim must be clearly identifiable.

Note on Penalty: Under the Cybercrime Prevention Act, the penalty for libel is one degree higher than that prescribed by the RPC.


2. Immediate Steps: Gathering Evidence

Before a lawyer or the police can act, the victim must secure "digital footprints." Digital evidence is volatile and can be deleted in seconds.

  • Screenshots: Capture the profile URL, the specific defamatory posts, the comments, and the timestamps. Ensure the screenshots show the "poser" account’s unique ID or username.
  • Link Preservation: Copy and save the direct URLs of the offending posts and the poser's profile.
  • Do Not Engage: Avoid "flaming" or arguing with the account. This can be used by the defense to claim "provocation" or "mutual combat," potentially mitigating the offender's liability.

3. Reporting to Platforms

Most social media platforms (Meta, X, Instagram) have internal reporting mechanisms for "Impersonation."

  1. Report the account for Impersonation.
  2. Provide the platform with a government-issued ID if requested to prove you are the real owner of the identity.
  3. Request a "Take-down," but only after you have secured your screenshots for legal evidence.

4. Filing a Formal Criminal Complaint

If the perpetrator is known or if you seek to identify an anonymous attacker, you must involve state authorities.

Step A: The Law Enforcement Phase

You may approach two primary agencies:

  • PNP-ACG: Philippine National Police - Anti-Cybercrime Group.
  • NBI-CCD: National Bureau of Investigation - Cybercrime Division.

These agencies can issue subpoenas to Service Providers (like ISPs or platforms) to help track IP addresses or registration data, although international platforms often require a court order (Warrant to Disclose Computer Data) to release private user information.

Step B: The Prosecutor’s Office

Once a suspect is identified, a Complaint-Affidavit is filed before the Office of the City Prosecutor. The prosecutor determines "probable cause"—whether there is a well-founded belief that a crime was committed and the respondent is likely guilty.


5. Civil Liability and Damages

Apart from criminal prosecution, a victim can file a separate civil action for Damages under the Civil Code (Art. 33). This allows the victim to seek:

  • Moral Damages: For mental anguish, wounded feelings, and besmirched reputation.
  • Exemplary Damages: To set an example for the public.
  • Attorney’s Fees: To cover the costs of litigation.

6. Key Legal Considerations

Feature Cyber Libel Computer-Related Identity Theft
Primary Law RPC Art. 353 + RA 10175 RA 10175 Sec. 4(b)(3)
Prescriptive Period Traditionally 1 year, but jurisprudence suggests up to 12 years. 15 years
Main Element Defamation/Damage to Reputation Unauthorized use of identifying info
Publicity Required Yes No (Acquisition/Use is enough)

7. The Defense of "Truth" and "Fair Comment"

In the Philippines, "Truth" is not an absolute defense in libel if it was published with malice. However, if the subject is a public official or a public figure, the "Actual Malice" doctrine applies. The victim must prove the offender knew the statement was false or acted with reckless disregard for the truth.

For private individuals, the burden of proof is lower; the law often presumes malice if the statement is defamatory on its face (Libel per se).

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.