Liability for Loans Taken in Your Name and Debt Harassment Remedies (Philippines)

Liability for Loans Taken in Your Name and Debt-Harassment Remedies (Philippines)

This is general information for the Philippine setting and not a substitute for tailored legal advice.


Executive Summary

  • You are not civilly liable for a “loan” you did not consent to (e.g., forged/wrongfully obtained e-signature), unless you later ratify it or your own negligence substantially enabled the fraud.
  • Creditors must prove a valid loan contract (consent, object, cause). A forged signature or fabricated digital assent vitiates consent.
  • Digital loans rely on device ownership, OTPs, selfies, and e-signatures; these can be rebutted with evidence (SIM-swap, device loss, phishing, deepfake, etc.).
  • If you co-signed or guaranteed, you’re liable only to the extent of your undertaking, and defenses differ for surety vs guaranty.
  • Harassment and shaming tactics by collectors are unlawful. You can demand they stop, and report them to the SEC (lending/financing), BSP (banks/e-money), the National Privacy Commission (data/privacy), and law enforcement for threats, coercion, or libel.
  • Correct the record with the lender and credit bureaus, keep a paper trail, and contest adverse credit with the Credit Information Corporation and private credit bureaus.
  • Act fast: file fraud reports, freeze accounts, preserve evidence (screenshots, call logs), and issue a written dispute within days.

Part I — Civil Liability for Loans in Your Name

1) When are you liable?

Civil liability generally arises when a valid loan contract exists:

  • Consent: You signed (wet ink or valid e-signature) or clearly assented in-app (agree checkbox, OTP/SMS, device-based authentication) and understood the terms.
  • Object and cause: Money was delivered (cash, wallet top-up, bank credit), and you were the intended recipient/beneficiary.
  • Ratification: Even if there was an initial defect (e.g., a relative applied without telling you), you accepted the money, made payments, or otherwise affirmed the loan after learning of it.
  • Negligence enabling fraud: If your carelessness (e.g., sharing OTPs, lending your ID/device, obvious PIN on a sticky note) substantially enabled the impostor, a court may apportion liability or deny recovery of losses you could reasonably have prevented.

Key idea: Lenders carry the burden to show you consented. Your task is to create doubt or rebut that proof with credible evidence and a consistent timeline.

2) When are you not liable?

  • Forgery / identity theft: Your signature was forged, your selfie was spoofed, or someone used your ID and phone without authority.
  • Lack of authority: A spouse, relative, employee, or agent had no authority (or exceeded it).
  • No delivery / unjust enrichment: The proceeds never reached you (e.g., sent to a stranger’s wallet).
  • Defective assent: Consent was vitiated by fraud, intimidation, or mistake (e.g., you thought you were confirming an unrelated transaction or a “KYC update”).

If the lender cannot prove genuine consent or delivery to you, the “loan” is void/unenforceable against you. The lender’s recourse is against the impostor or any negligent intermediary.

3) Electronic & App-Based Loans: What counts as “consent”?

Modern lenders rely on multi-factor signals:

  • Device/SIM ownership, OTP entry, in-app clicks, e-sign platform logs, IP/device fingerprints, live selfie/LVA checks, and liveness challenges.
  • These are rebuttable. SIM-swaps, malware, phishing, remote-access tools, cloned devices, and recycled numbers can break the link between you and the transaction.

Your counter-evidence can include:

  • Police/NBI or ACG report; telco SIM-swap/port-out logs; device theft report; forensic report (if available); timestamped alibis (CCTV, time-clock, airline boarding passes); screenshots of phishing; bank/e-wallet alerts; and witness statements.

4) Special roles and their liabilities

  • Co-borrower / Joint borrower: You are primary on the debt; the lender can pursue either of you for the entire amount (solidarity—depending on terms).

  • Guarantor vs Surety:

    • A guarantor is secondary; the lender must first proceed against the principal debtor unless the guaranty is solidary.
    • A surety is solidarily liable as if the debt were yours; defenses are narrower.
  • Authorized agent misuse: If you truly authorized someone (SPA, email/letter, in-app delegation), you can be bound within the scope of that authority; otherwise, no.

5) Collateralized loans and pawns

  • Chattel/mortgage/pawn: The lender may repossess or foreclose the collateral on default, but cannot harass or seize unrelated property. Surplus/deficiency rules depend on contract and auction results. If the underlying loan is void (identity theft), challenge the lien.

Part II — What to Do if a Loan Was Taken in Your Name

1) Immediate (first 24–72 hours)

  1. Freeze and alert

    • Call the lender’s fraud desk and file a written dispute. Ask for an account freeze, transaction logs, and stop-collection while under investigation.
    • Notify your bank/e-wallet; change PINs; lock your SIM; enable 2FA everywhere.
  2. Report the crime

    • File with PNP Anti-Cybercrime Group or NBI Cybercrime Division. Get a case referral number.
    • Make a sworn statement (affidavit of identity theft/forgery). Attach evidence.
  3. Preserve evidence

    • Keep screenshots of phishing/chats/calls, call logs, SMS, emails, and app notices.
    • Request telco event logs (SIM-swap/porting) and phone location history, if any.

2) Within 7–14 days

  • Formal dispute package to the lender: Cover letter + affidavit + police/NBI report + timeline + device/telco records + proof of non-receipt of proceeds + specimen signatures + ID copies. Demand suspension of collection, removal from negative listing, and written findings.

  • Credit report checks and corrections: Request your file from the Credit Information Corporation (CIC) and private bureaus (e.g., TransUnion, CIBI). File a dispute for any erroneous trade lines.

  • Data privacy complaint (if your contacts were scraped or data misused): Prepare a complaint for the National Privacy Commission (NPC) if collectors messaged your phonebook, publicized your debt, or processed your data without a lawful basis.

  • Consider a notarized “Cease and Desist” letter to collectors (see model below).

3) If the lender sues you

  • Do not ignore summons. File an Answer raising affirmative defenses: no consent, forgery, no privity, no delivery, fraud, privacy violations, spoliation if logs were withheld.
  • Move for discovery: original documents, audit trails, e-KYC footage, server logs, call recordings, and chain-of-custody of evidence.
  • If amount qualifies, the lender may file a Small Claims case; defenses still apply (you can’t be ordered to pay a debt you never agreed to).

Part III — Harassment and Unfair Debt Collection: What is (Not) Allowed

1) Prohibited practices (illustrative, not exhaustive)

  • Shaming tactics: Posting your face/name as “delinquent” on social media, group chats, or contacting your phonebook or co-workers.
  • Threats, coercion, or intimidation: Threats of arrest, criminal cases without basis, or physical harm.
  • Obscene or abusive language; repeated calls at odd hours; calling your employer after being told to stop.
  • False representations: Posing as a lawyer, prosecutor, or “court sheriff,” or implying final judgments exist.
  • Data privacy violations: Processing or disclosing your personal data without lawful basis or beyond what’s necessary to collect a legitimate, valid debt.

Even when a debt is valid, collectors must follow fair collection standards: identify themselves, state the true amount, and communicate during reasonable hours using lawful channels.

2) Where and how to complain

  • Securities and Exchange Commission (SEC): For lending and financing companies and their third-party collectors (esp. online lending apps).
  • Bangko Sentral ng Pilipinas (BSP): For banks, EMIs/e-wallets, credit cards, and BSP-supervised institutions.
  • National Privacy Commission (NPC): For unauthorized data processing/disclosure (e.g., contacting your phonebook).
  • PNP/NBI: For grave threats, coercion, libel/cyber libel, illegal access, and other crimes.
  • Local authorities / Barangay: For initial interventions/record of harassment.
  • Courts: For damages, injunctions, and to challenge illegal collections.

3) Practical tools

  • Cease-and-Desist (C&D) Notice: Direct it to the lender and all agents. Demand they: (a) stop contacting third parties; (b) limit calls to your chosen channel/day/time; (c) preserve and furnish their collection logs; (d) acknowledge the dispute status.
  • Demand for documents: Request the original contract, e-KYC capture, device/OTP logs, statement of account, and assignment documents if a collector claims to own the debt.
  • Damages claim: For mental anguish, besmirched reputation, and privacy breaches if harassment caused injury.
  • Evidence discipline: Record call dates/durations (and, where lawful, contents), keep envelopes, SMS headers, and screenshots. Maintain a contact log.

Part IV — Model Language You Can Adapt

Dispute & Fraud Affidavit (extract) “I, [Name], of legal age, Filipino, state that I did not apply for nor consent to Loan No. [____] allegedly granted by [Lender] on [date]. My signature/e-consent was forged/fraudulently obtained. I did not receive loan proceeds. On [date], I reported the incident to [PNP/NBI Case No. ___]. Attached are [SIM-swap report/device theft report/screenshots]. I request immediate account freeze, investigation, and removal of negative credit reporting pending resolution…”

Cease-and-Desist to Collectors (extract) “This is to demand that you cease contacting my relatives, employer, and other third parties and refrain from shaming tactics. Limit any necessary communications to [email/number] on weekdays 9:00–17:00 only. Provide within 5 days (1) the original loan contract/e-KYC and OTP logs, (2) your legal basis to process my data, and (3) proof of your authority to collect. Continued harassment will be reported to SEC/BSP/NPC and law enforcement and may give rise to civil and criminal liability.”


Part V — Evidence & Burden of Proof: How Cases Are Won

  • Lender’s burden: Authentic loan documentation; proper identification; delivery of proceeds to you; and accurate ledgering.

  • Your rebuttal:

    • Signature/biometrics denial backed by specimen signatures and expert comparison (if needed).
    • Digital trail inconsistencies: IP in another city/country; device model/OS that isn’t yours; OTP delivered when your SIM was inactive; timestamps while you were provably elsewhere.
    • No benefit rule: No funds reached you/your accounts; “benefit to impostor” breaks causation.
  • Comparative fault: If both sides were careless, a court may allocate losses; you aim to show the lender’s KYC and anti-fraud lapses were the proximate cause.


Part VI — Credit Reporting & Rehabilitation

  • Pull your reports: CIC + private bureaus.
  • File a written dispute: Identify the tradeline, attach your fraud documents; ask for re-investigation and temporary suppression while under review.
  • Get lender’s written clearance after they find fraud; submit it to the bureaus.
  • Build positive history: Use a secured card or small, fully repaid product to rebuild scores once the fraud item is removed.

Part VII — Frequently Asked Questions

Q1: The app used my selfie and ID. Am I doomed? No. Liveness checks and KYC can be spoofed. Challenge with contrary timestamps, device logs, telco evidence, and expert affidavits.

Q2: I repaid a few installments before realizing the fraud. That can look like ratification. Explain why you paid (duress, harassment, mistaken belief it was another account) and stop after filing the dispute.

Q3: Collectors keep calling my boss. Send a C&D identifying a single permitted contact channel and time window. Log and report each violation to SEC/NPC and, where threatening, to law enforcement.

Q4: Can they have me arrested for non-payment? No for pure civil debt. Arrest requires a crime (e.g., fraud, estafa). If you’re a fraud victim, document it and file reports.

Q5: Should I change my SIM? Yes—after you’ve received case numbers and set up forwarding/port-out blocks. Keep the old SIM off but retained to receive OTPs for account recovery if needed.


Part VIII — Practical Checklist

  • Freeze/dispute with lender; request stop-collection.
  • File PNP/NBI report; get case number.
  • Notify bank/e-wallet; change credentials; SIM lock/replace.
  • Compile evidence timeline; notarize affidavits.
  • Send C&D to collectors; set communication window.
  • Pull and dispute CIC/credit-bureau entries.
  • File NPC complaint if contacts were harassed/disclosed.
  • Keep a contact log and evidence binder.
  • Respond to any court summons on time.

Part IX — When to Involve Counsel

  • High amounts, collateral at risk, or you’ve been sued.
  • Complex digital forensics (device cloning/SIM-swap).
  • Repeated privacy violations and reputational harm (consider damages and injunction).

Final Notes

  • A lender’s KYC and fraud controls are not your burden; if those fail and you did not consent, you can defeat liability.
  • Harassment is never necessary to collect even valid debts and may itself create regulatory and civil exposure for the collector.
  • Your strongest assets are speed, documentation, and consistency.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.