Online Scam Reporting Procedures in the Philippines

A practical legal guide for victims, counsel, compliance officers, and platform operators


I. Overview

Online scams in the Philippines may trigger criminal, civil, administrative, and regulatory consequences. Depending on the modus, they can fall under the Revised Penal Code (RPC) (e.g., estafa/swindling), the Cybercrime Prevention Act of 2012 (Republic Act No. 10175), the Data Privacy Act of 2012 (RA 10173), the Electronic Commerce Act (RA 8792), the Access Devices Regulation Act (RA 8484), the Financial Consumer Protection Act of 2022 (FCPA), the Securities Regulation Code (RA 8799) and related issuances (for investment scams), consumer protection rules of the DTI, and sectoral circulars of the BSP, SEC, Insurance Commission, and NTC, among others.

This article explains: (1) how to triage an incident; (2) where and how to report; (3) evidentiary and jurisdictional rules; (4) interactions with banks, e-wallets, and platforms; and (5) remedies and recovery pathways.


II. Immediate Triage (First 24–48 Hours)

  1. Preserve evidence.

    • Take full-screen captures of messages, ads, profiles, listings, receipts, and transaction confirmations; save original files (HTML, PDFs, images, videos), including metadata where possible.
    • Export chat logs and email headers; download bank/e-wallet logs and SMS.
    • Keep device and app logs and note dates/times (Philippine Standard Time).
  2. Contain the breach.

    • Change credentials; enable MFA; revoke unknown sessions/tokens.
    • If a device is compromised, disconnect from networks and have it imaged by a qualified examiner.
  3. Contact financial intermediaries.

    • Notify your bank/e-wallet via official channels and request transaction hold/recall, account freeze, or fraud dispute under internal fraud management rules and BSP consumer-protection standards.
    • For card transactions, initiate a chargeback/dispute through your issuer; comply with documentary and time-limit requirements.
  4. Secure the scene for criminal reporting.

    • Log the sequence of events and identifiers: handles, URLs, phone/SIM numbers, email addresses, IPs if available, device IDs, wallet/account numbers, courier tracking, and bank reference numbers.

III. Where to Report (Philippine Authorities & Regulators)

A. Law Enforcement (Criminal Complaints)

  • PNP Anti-Cybercrime Group (PNP-ACG). Primary police unit for cybercrime. File a blotter and complaint; provide a sworn statement and evidence.
  • National Bureau of Investigation – Cybercrime Division (NBI-CCD). Alternative/in addition to PNP-ACG, especially for complex, multi-region, or syndicated cases.
  • Department of Justice – Office of Cybercrime (DOJ-OOC). Policy coordination, MLAT, and assistance to prosecutors; useful for cross-border evidence requests.
  • Cybercrime Investigation and Coordinating Center (CICC). Coordinates national response and can channel reports to enforcement partners.

Tip: Reporting to both PNP-ACG and NBI-CCD is acceptable; provide the same evidence set and note any case reference numbers to avoid duplication.

B. Sectoral & Economic Regulators (Administrative/Consumer Remedies)

  • Bangko Sentral ng Pilipinas (BSP). For bank/e-money disputes, unauthorized electronic fund transfers, and financial consumer protection issues.
  • Securities and Exchange Commission (SEC). For investment solicitations, Ponzi-type schemes, unregistered securities, boiler rooms, or unlicensed brokers.
  • Department of Trade and Industry (DTI). For e-commerce consumer complaints (non-delivery, defective goods, deceptive marketing) and platform seller issues.
  • National Telecommunications Commission (NTC). For fraudulent SIMs, spam/phishing SMS, and number complaints; coordination for deactivation/blacklisting.
  • National Privacy Commission (NPC). For data breaches, identity theft, doxxing, unauthorized disclosure/processing of personal data.
  • Insurance Commission (IC). For scams involving insurance/micro-insurance or health maintenance organizations.

IV. What Offenses May Apply

  1. Estafa (RPC Art. 315). False pretenses, fraudulent acts causing damage.

  2. Cybercrime Act (RA 10175).

    • Computer-related fraud (Sec. 4(b)(2)); identity theft (Sec. 4(b)(3)); illegal access; data interference.
    • Qualified penalties when the computer system is a tool, target, or means.
  3. Access Devices Regulation Act (RA 8484). Skimming, stolen cards, unauthorized use of account numbers/One-Time Passwords.

  4. Data Privacy Act (RA 10173). Unauthorized processing or negligent handling of personal data; security breaches.

  5. Securities Regulation Code (RA 8799) & SEC rules. Selling unregistered securities; acting as an unlicensed broker/dealer; investment fraud.

  6. Electronic Commerce Act (RA 8792). Electronic documents and signatures; liability for certain acts in e-commerce.

  7. Other special laws as applicable. (E.g., anti-voyeurism for sextortion, intellectual property for counterfeit goods, SIM-related rules.)


V. Elements of a Strong Report or Complaint

  • Identities & Handles. Usernames, display names, phone numbers, emails, wallet IDs, and any KYC artifacts you obtained.
  • Narrative of Facts. Chronology from first contact to loss; specify each representation relied upon.
  • Transactional Trail. Account numbers, reference IDs, gateway names, time stamps, IPs (if you have them), device/app used.
  • Loss Quantification. Principal amounts, fees, consequential damages.
  • Digital Evidence. Original files (not just screenshots); hash values if forensic imaging was done.
  • Witnesses/Counterparties. Couriers, bank officers, platform support, or bystanders.
  • Reliefs Requested. Freeze/recall, preservation orders, takedown of accounts/pages, investigation and prosecution, and restitution.

VI. Filing Mechanics

A. Police/NBI Complaint

  1. Prepare a Complaint-Affidavit (notarized) attaching your exhibits with Annex labels.
  2. Submit to PNP-ACG or NBI-CCD (in person or via their official channels).
  3. Obtain a reference or docket number; keep certified copies of your affidavit and receiving stamp.
  4. Cooperate in digital forensics and follow-up interviews.

B. Prosecutorial Process

  1. Law enforcement may file an Inquest for arrests without warrant; otherwise, a regular preliminary investigation is commenced.
  2. Respondent files Counter-Affidavit; complainant may file Reply.
  3. Prosecutor resolves with a Resolution; if probable cause is found, an Information is filed in court.

C. Venue & Jurisdiction (Cybercrime Act, Rules on Venue)

  • Venue lies where any element of the offense occurred, where any computer system used is located, or where data is found/accessible.
  • Cybercrime cases are raffled to designated RTC cybercrime courts.

VII. Evidence Law & Digital Proof

  • Rules on Electronic Evidence (A.M. No. 01-7-01-SC). Define electronic documents and electronic signatures, set authenticity and integrity standards, and allow ephemeral electronic communications to be admitted upon proper proof.
  • Chain of Custody. Keep devices and storage media sealed; document every transfer.
  • Hearsay & Authentication. Identify the witness competent to testify about system operation, log generation, and business records exceptions.
  • Privacy & Lawful Access. Certain datasets (subscriber info, traffic content) require lawful orders or data preservation requests through investigators/prosecutors.

VIII. Working with Banks, E-Wallets, and Platforms

  1. Banks/E-Money Issuers.

    • File disputes promptly and in writing; attach police/NBI reference numbers.
    • Ask for transaction recall, merchant retrieval, and fraud-affidavit procedures.
    • Expect KYC/AML escalations; be ready to provide identity verification.
  2. Merchants/Marketplaces/Logistics.

    • Use in-platform buyer protection workflows.
    • Request seller suspension, listing takedown, and evidence preservation.
  3. Social Networks/Messaging Apps.

    • Report impersonation, phishing, and malicious pages; request content removal and account disablement.
    • Provide case numbers to speed cooperation.

IX. Specialized Scams & Tailored Reporting

  • Investment/Ponzi/Forex/Crypto Solicitation.

    • Report to SEC (unregistered securities/illegal solicitation) and file a criminal complaint for estafa and cyber fraud.
    • Preserve wallet addresses/transaction hashes; provide exchange identifiers if used.
  • Business Email Compromise (BEC).

    • Bank-to-bank recalls are time-critical; notify all banks in the chain and submit a police report.
    • Preserve email headers and DKIM/SPF results.
  • Account Takeover/Phishing/Smishing.

    • Report the SIM/number to NTC and your telco; coordinate SIM deactivation when applicable.
    • File NPC complaint if personal data misuse occurred.
  • Sextortion/Online Sexual Exploitation.

    • File urgent reports with PNP-ACG/NBI; request takedowns and preservation; consider psychosocial support services.

X. Civil, Criminal, and Administrative Remedies

  1. Criminal: Prosecution under the RPC and cybercrime/special laws; penalties may include imprisonment, fines, forfeiture, and restitution.

  2. Civil:

    • Damages (actual, moral, exemplary) under the Civil Code;
    • Rescission and unjust enrichment theories;
    • Small Claims for money recovery up to ₱1,000,000 (no lawyers’ appearance required; amount subject to Supreme Court rules).
  3. Administrative/Regulatory:

    • Cease-and-desist orders (e.g., SEC);
    • Sanctions against supervised financial institutions (BSP) and consumer redress via DTI.

XI. Cross-Border & Asset Tracing

  • Mutual Legal Assistance (MLAT) via DOJ-OOC for foreign evidence and service-provider data.
  • Preservation Requests to platforms and hosts to prevent deletion while legal process is secured.
  • AML Coordination: suspicious transaction reporting and potential freeze/hold actions through regulated entities.
  • Blockchain Tracing: maintain chain-of-custody for analytics exports and link on-chain activity to KYC’ed exchange accounts where possible.

XII. Reporting Templates & Checklists

A. One-Page Incident Intake (for any authority/platform)

  • Reporter identity and contact details
  • Date/time (PST) and location (city/province)
  • Scam type (investment, phishing, marketplace, BEC, romance, sextortion, others)
  • Narrative (max 300 words)
  • Loss amount and currency
  • Counterparty identifiers (handles, numbers, emails, accounts, URLs)
  • Payment rails used (bank, e-wallet, card, crypto) with reference IDs
  • Evidence list (Annexes A–K)
  • Reliefs requested (freeze/recall, takedown, investigation, restitution)

B. Evidence Packing List

  • Original emails (EML/MSG), headers, server logs
  • Messaging exports (JSON/TXT), screenshots (PNG/PDF), screen recordings
  • Bank/e-wallet statements and SMS OTP logs (do not share OTPs beyond evidentiary need)
  • Device info (OS, app version), IP addresses, MAC/IMEI if available
  • Chain-of-custody sheet and hashing report (if forensically imaged)

XIII. Common Pitfalls (and How to Avoid Them)

  • Late reporting → reduces chance of recall; report immediately.
  • Only screenshots → keep original electronic records for authenticity.
  • Ad hoc communications → use single case reference numbers and written updates.
  • Victim self-incrimination (e.g., sharing private images) → consult counsel before widespread disclosure.
  • Paying “recovery agents.” High risk of secondary scams; verify credentials and authority.

XIV. Role of Counsel & Data Protection Officers

  • Counsel can frame charges, protect privileges, and navigate multi-forum strategy (criminal, civil, administrative).
  • DPOs must evaluate breach notification to the NPC and to data subjects when personal data is involved, and maintain incident registers and SOPs.

XV. Employer & Platform SOP (for Compliance Teams)

  1. Intake & Verification. KYC match, anomaly detection, red-flag checklist.
  2. Immediate Controls. Freeze/suspend suspected accounts; enhanced due diligence.
  3. Regulatory Notifications. BSP/SEC/DTI/NPC as applicable; STR/CTR filings under AMLA.
  4. Evidence Preservation. Litigation hold, log retention, secure export.
  5. Victim Communication. Clear timelines, dispute rights, documentation requirements.
  6. Law-Enforcement Cooperation. Designated contact points; lawful process workflows.

XVI. Frequently Asked Questions

1) Do I need a lawyer to report? No. You can file with PNP-ACG/NBI yourself. A lawyer helps for strategy, drafting, and court.

2) Can I get my money back? Recovery depends on speed, traceability, and counterparty identification. Bank recalls, chargebacks, civil actions, and regulatory orders may help.

3) If the scammer is overseas? Cross-border tools (MLAT, platform cooperation, exchange KYC) still permit evidence gathering and asset tracing.

4) Are screenshots enough? Screenshots help, but original electronic files carry more weight under the Rules on Electronic Evidence.


XVII. Practical Timeline (Illustrative)

  • Day 0–1: Containment, bank recall/chargeback initiation, law-enforcement report, regulator intake as relevant.
  • Week 1–4: Preliminary investigation intake, supplemental evidence, platform takedowns.
  • Month 2–6: Prosecutorial resolution; parallel civil/regulatory actions as needed.

XVIII. Conclusion

Effective reporting of online scams in the Philippines hinges on speed, complete documentation, and multi-channel escalation—law enforcement, regulators, financial intermediaries, and platforms. By following the structured procedures above, victims and compliance teams can maximize the chances of takedown, prosecution, and recovery, while preserving admissible digital evidence for court.


Annex: Model Complaint-Affidavit Headings (Outline)

  1. Parties (Complainant/Respondent)
  2. Jurisdiction & Venue Allegations
  3. Statement of Facts (Chronology)
  4. Legal Causes of Action (Estafa; Cybercrime Act; Special laws)
  5. Prayer for Relief (Investigation, issuance of subpoenas, preservation/freeze, filing of Information)
  6. Verification & Certification
  7. Annexes (A–K: Evidence list and descriptions)

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.