Remedies for Identity Theft and a Wrongful Criminal Case in the Philippines

I. Introduction

Identity theft can destroy a person’s reputation, finances, employment prospects, family life, and liberty. In the Philippine setting, the harm becomes even more serious when the stolen identity is used to commit a crime or when an innocent person is mistakenly charged, arrested, detained, or prosecuted because another person used their name, documents, photograph, digital accounts, SIM card, bank account, or personal information.

A wrongful criminal case arising from identity theft usually involves two overlapping problems. First, there is the identity theft itself, which may be punishable under cybercrime, data privacy, falsification, fraud, estafa, and related laws. Second, there is the wrongful criminal proceeding, where the victim must clear their name before law enforcement agencies, prosecutors, courts, employers, banks, government offices, and the public.

This article discusses the legal remedies available in the Philippines for a person whose identity has been stolen and who has become the subject of a wrongful criminal complaint, investigation, warrant, arrest, charge, or conviction.

This is general legal information, not a substitute for advice from a Philippine lawyer who can review the records and represent the affected person.


II. What Identity Theft Means in the Philippine Legal Context

Identity theft is not limited to someone using another person’s name. It can involve the unauthorized use, possession, transfer, alteration, or exploitation of another person’s personal information, credentials, documents, digital accounts, or identifying details.

Common examples include:

  1. Use of another person’s name, photograph, address, birthday, signature, government ID, or employment details;
  2. Use of another person’s SIM card, mobile number, email, social media account, e-wallet, online banking account, or digital wallet;
  3. Opening a bank account, loan account, crypto account, remittance account, or payment account using another person’s identity;
  4. Registering a SIM card using another person’s documents or photograph;
  5. Using another person’s ID to obtain goods, loans, credit, subscriptions, or services;
  6. Using another person’s name when arrested, investigated, booked, or charged;
  7. Creating fake documents, fake affidavits, fake IDs, fake authority letters, fake contracts, or forged signatures;
  8. Impersonating another person online to scam, harass, defame, extort, or commit fraud;
  9. Using another person’s identity in criminal activity, causing that person to be named as suspect, respondent, accused, or convict.

In Philippine law, the precise label of the offense depends on the facts. The same act may violate several laws at the same time.


III. Relevant Philippine Laws

A. Cybercrime Prevention Act of 2012

The Cybercrime Prevention Act punishes several acts committed through or with the use of information and communications technology.

Identity theft may fall under computer-related identity theft, which involves the intentional acquisition, use, misuse, transfer, possession, alteration, or deletion of identifying information belonging to another, whether natural or juridical, without right.

Other cybercrime-related offenses may also apply, such as:

  1. Computer-related fraud;
  2. Computer-related forgery;
  3. Illegal access;
  4. Data interference;
  5. System interference;
  6. Misuse of devices;
  7. Cyberlibel, if the stolen identity was used for defamatory publications;
  8. Cybersex, online exploitation, scams, phishing, or related cyber-enabled crimes, depending on the facts.

Cybercrime is especially relevant when the impersonation involved Facebook, Messenger, Instagram, TikTok, email, online banking, e-wallets, websites, digital documents, cloud accounts, messaging apps, or other electronic systems.

B. Data Privacy Act of 2012

The Data Privacy Act protects personal information and sensitive personal information. It may apply where a person’s personal data was unlawfully collected, processed, disclosed, sold, shared, stored, or used.

Possible violations include unauthorized processing, improper disposal, unauthorized access, intentional breach, concealment of a security breach, or malicious disclosure.

The law is relevant when the identity thief obtained personal data through a company, employer, school, bank, lending app, government office, clinic, online platform, business, or data processor.

Remedies may include complaints before the National Privacy Commission, administrative sanctions, criminal liability, and civil damages.

C. Revised Penal Code

Even without cyber elements, identity theft may involve traditional crimes under the Revised Penal Code, including:

  1. Falsification of public, official, commercial, or private documents;
  2. Use of falsified documents;
  3. Estafa or swindling;
  4. Other deceits;
  5. Usurpation of authority or official functions, if a person pretended to be a public officer;
  6. Using fictitious name or concealing true name;
  7. Perjury, if false statements were made under oath;
  8. False testimony, if identity misuse occurred in court proceedings;
  9. Malicious mischief, if property or digital property was damaged;
  10. Unjust vexation, depending on the facts;
  11. Grave coercion, threats, or extortion, if the identity theft was used to intimidate or extract money.

If someone used another person’s name when arrested, booked, or charged, there may also be liability for giving false information, falsification, obstruction-related acts, or perjury depending on how the deception was carried out.

D. Access Devices Regulation Act

Where credit cards, debit cards, ATM cards, online banking credentials, account numbers, or other access devices were misused, the Access Devices Regulation Act may apply.

This is relevant in cases involving credit card fraud, unauthorized bank transactions, identity-based loan fraud, account takeover, and fraudulent financial transactions.

E. E-Commerce Act and Rules on Electronic Evidence

Electronic documents, emails, logs, screenshots, metadata, digital signatures, authentication records, and online communications may be admissible in Philippine proceedings if properly presented and authenticated.

In identity theft cases, evidence often depends on digital records. The Rules on Electronic Evidence and related procedural rules are therefore important.

F. SIM Registration Law

If a mobile number was registered using another person’s identity, the SIM Registration Law and related regulations may be relevant. Victims may need to coordinate with the telecommunications company, law enforcement, and regulators to prove that the SIM registration was fraudulent.

G. Anti-Photo and Video Voyeurism Act, Safe Spaces Act, and Other Special Laws

Where identity theft includes fake accounts, sexualized impersonation, harassment, doxxing, stalking, threats, non-consensual image sharing, or gender-based online abuse, special laws may apply depending on the facts.

H. Civil Code

Apart from criminal remedies, a victim may seek civil damages under the Civil Code. Possible claims include damages for fraud, negligence, abuse of rights, invasion of privacy, defamation, emotional distress, reputational injury, and other wrongful acts.


IV. The Immediate Priorities for a Victim

When identity theft leads to a wrongful criminal case, the first objective is to prevent the harm from worsening. The victim should act quickly and preserve evidence.

A. Secure Proof of True Identity

The victim should gather:

  1. Birth certificate;
  2. Valid government IDs;
  3. Passport, if available;
  4. Driver’s license, UMID, PhilSys ID, PRC ID, SSS, GSIS, voter’s ID or certification, or other IDs;
  5. Barangay certification;
  6. Employment certification;
  7. School records;
  8. Travel records;
  9. Immigration records, if relevant;
  10. Proof of residence;
  11. Specimen signatures;
  12. Photos showing physical differences from the impostor;
  13. Biometrics, if relevant;
  14. NBI or police clearance, where appropriate.

If the wrongful case involves a person arrested using the victim’s name, the victim must establish that the person in custody or charged in court is not the same person as the victim.

B. Preserve Digital Evidence

The victim should preserve:

  1. Screenshots of fake profiles, messages, posts, transactions, emails, or registrations;
  2. URLs and profile links;
  3. Email headers;
  4. Transaction receipts;
  5. Bank statements;
  6. E-wallet transaction histories;
  7. Device logs, where available;
  8. Phone numbers used;
  9. SIM registration notices;
  10. IP logs, if later obtainable through lawful process;
  11. Names of accounts, usernames, handles, and profile IDs;
  12. Dates and times of all relevant events;
  13. Communications with banks, platforms, telcos, police, prosecutors, and complainants.

Screenshots should show the full screen, date, time, URL, sender, recipient, and account details where possible. The victim should avoid deleting messages or accounts before evidence is preserved.

C. Execute an Affidavit of Denial and Identity Theft

A victim should usually prepare a sworn affidavit stating:

  1. Their true identity and personal circumstances;
  2. The discovery of the identity theft;
  3. The fact that they did not commit the alleged act;
  4. The documents, accounts, phone numbers, addresses, or signatures that were misused;
  5. Their whereabouts at the relevant dates and times;
  6. Any evidence proving alibi, non-participation, or impossibility;
  7. Any physical, biometric, or documentary differences from the impostor;
  8. A request for investigation and correction of records.

This affidavit may be used before the police, NBI, prosecutor’s office, court, banks, telcos, online platforms, and government agencies.

D. Report to the Proper Authorities

Depending on the facts, reports may be made to:

  1. Philippine National Police Anti-Cybercrime Group;
  2. National Bureau of Investigation Cybercrime Division;
  3. Local police station;
  4. Prosecutor’s office;
  5. National Privacy Commission;
  6. Bank, e-wallet provider, lending company, or financial institution;
  7. Telecommunications company;
  8. Online platform or social media company;
  9. Barangay;
  10. Court where the wrongful case is pending.

The report should be supported by documentary and digital evidence.


V. Remedies Before Law Enforcement

If the wrongful case is still at the police investigation stage, the victim should immediately notify the investigating officer that the suspect’s identity is disputed.

Possible steps include:

  1. Filing an affidavit of identity theft;
  2. Asking the investigator to compare IDs, photos, signatures, addresses, phone numbers, and biometrics;
  3. Requesting that the police verify the real identity of the person who committed the crime;
  4. Submitting proof that the victim was elsewhere when the alleged offense occurred;
  5. Asking for correction or annotation of police blotter entries;
  6. Requesting certified copies of the blotter, complaint, booking sheet, or investigation report;
  7. Filing a separate criminal complaint against the impostor;
  8. Asking the police or NBI cybercrime unit to trace digital evidence through lawful channels.

If the identity thief used the victim’s name during arrest, the police booking records, fingerprints, mugshots, arrest documents, and inquest records may be crucial. The victim should request that these records be compared with their own identity documents and physical appearance.


VI. Remedies During Preliminary Investigation

If a criminal complaint has been filed with the prosecutor and the victim is named as respondent, the victim must participate actively in the preliminary investigation.

A. Counter-Affidavit

The primary remedy is to file a counter-affidavit denying the accusation and explaining the identity theft.

The counter-affidavit should attach supporting evidence, such as:

  1. Government IDs;
  2. Proof of residence;
  3. Employment records;
  4. Attendance logs;
  5. CCTV screenshots;
  6. Travel records;
  7. Affidavits of witnesses;
  8. Device ownership records;
  9. Bank or telco certifications;
  10. Screenshots and digital evidence;
  11. Police or NBI reports;
  12. Proof that the account, number, document, or signature was not the victim’s.

The counter-affidavit should directly attack probable cause. It should show that the complainant identified the wrong person or that someone else used the respondent’s identity.

B. Motion to Dismiss or Resolution Finding No Probable Cause

The respondent may ask the prosecutor to dismiss the complaint for lack of probable cause. The argument may be that:

  1. The respondent is not the person who committed the act;
  2. The identifying evidence is unreliable;
  3. The documents used were forged;
  4. The account, number, or ID was fraudulently obtained;
  5. The complainant merely relied on stolen or fabricated identity details;
  6. The evidence does not connect the respondent to the offense.

C. Motion for Reinvestigation

If an information has already been filed in court, the accused may seek a reinvestigation, usually with leave of court, especially where new evidence shows identity theft or mistaken identity.

D. Petition for Review

If the prosecutor issues a resolution finding probable cause, the respondent may file a petition for review with the Department of Justice, subject to applicable rules, periods, and procedural requirements. In certain cases involving local prosecution offices, the procedure may involve review by higher prosecution authorities.

The petition should emphasize that the prosecution of an identity theft victim is a miscarriage of justice and that probable cause rests on false identity data.


VII. Remedies After a Criminal Case Is Filed in Court

Once an information is filed in court, the person named as accused must treat the matter urgently. A pending criminal case can lead to a warrant of arrest, hold-departure issues, reputational damage, and possible detention.

A. Motion to Quash Information

A motion to quash may be available on specific legal grounds under the Rules of Criminal Procedure. Mistaken identity alone may not always fit neatly into a motion to quash if it requires evidence outside the information, but if the defect appears on the face of the information or there are jurisdictional or legal defects, it may be considered.

B. Motion for Determination of Probable Cause

The accused may ask the court to examine whether probable cause exists for the issuance of a warrant of arrest. If the issue is identity theft, the motion may argue that the evidence does not establish that the named accused is the offender.

C. Motion to Recall or Lift Warrant of Arrest

If a warrant has been issued because the accused was misidentified, the person may ask the court to recall or lift the warrant. The motion should attach strong identity evidence, such as:

  1. Proof that the named accused is different from the actual offender;
  2. Photographs or biometrics;
  3. NBI/police certifications;
  4. Affidavits;
  5. Documentary proof that the identity was stolen;
  6. Proof of voluntary appearance, where appropriate.

Counsel is especially important here because appearing in court without strategy may expose the victim to arrest if a warrant is outstanding.

D. Voluntary Appearance and Bail

If the court insists that the person named in the information must appear, the accused may need to address bail while contesting identity. Posting bail does not necessarily mean admitting guilt. It is often a practical remedy to avoid detention while the case proceeds.

However, in identity theft cases, counsel should carefully preserve the defense that the accused is not the offender and that the name was misused.

E. Motion to Dismiss Based on Lack of Evidence or Mistaken Identity

At appropriate stages, the defense may seek dismissal if the prosecution cannot prove that the accused is the person who committed the offense.

F. Demurrer to Evidence

After the prosecution rests, the accused may file a demurrer to evidence if the prosecution’s evidence is insufficient. In identity theft cases, this may argue that the prosecution failed to prove identity beyond reasonable doubt.

G. Trial Defense: Mistaken Identity

If the case proceeds to trial, the central defense may be mistaken identity. The prosecution must prove beyond reasonable doubt not only that a crime occurred but also that the accused committed it.

Evidence may include:

  1. Alibi and physical impossibility;
  2. Digital forensic evidence;
  3. Account ownership evidence;
  4. Device possession evidence;
  5. IP/location evidence;
  6. Witness testimony;
  7. Expert testimony;
  8. Signature comparison;
  9. Fingerprints;
  10. Biometrics;
  11. CCTV;
  12. Travel and employment records;
  13. Proof that the documents were falsified or fraudulently obtained.

H. Acquittal and Correction of Records

After acquittal or dismissal, the victim should obtain certified copies of the order, decision, entry of judgment, and related records. These documents are needed to correct records with courts, police, NBI, employers, banks, licensing authorities, and other institutions.


VIII. If the Victim Was Arrested or Detained Because of Identity Theft

A wrongful arrest caused by identity theft is one of the gravest scenarios.

A. Immediate Remedies

The victim or counsel should immediately:

  1. Identify the basis of arrest;
  2. Obtain a copy of the warrant, complaint, or booking record;
  3. Verify whether the warrant is for the victim or an impostor;
  4. Present identity documents;
  5. Request comparison of fingerprints, mugshots, and physical descriptions;
  6. Contact the issuing court;
  7. File urgent motions to recall the warrant, release the detainee, or correct the identity;
  8. Consider habeas corpus if detention is unlawful.

B. Habeas Corpus

A petition for habeas corpus may be appropriate where a person is unlawfully restrained of liberty, including where the detained person is not the person named or intended in the warrant, or where detention persists despite clear proof of mistaken identity.

C. Inquest Proceedings

If the person was arrested without warrant and subjected to inquest, the victim should raise the identity theft immediately before the inquest prosecutor. The defense may argue that the person arrested is not the offender or that the evidence does not justify filing charges.

D. Administrative and Civil Remedies for Wrongful Detention

Depending on the conduct of authorities and private complainants, remedies may include:

  1. Administrative complaint against officers who ignored clear evidence;
  2. Civil action for damages;
  3. Criminal complaint if there was malicious prosecution, perjury, falsification, unlawful arrest, arbitrary detention, or other punishable conduct;
  4. Complaint before oversight agencies, if applicable.

IX. If the Victim Was Convicted Under a Stolen Identity

A more complex situation arises where the identity thief was convicted using the victim’s name, or a conviction record appears under the victim’s identity even though the victim was not the offender.

Possible remedies include:

  1. Motion before the trial court to correct the record;
  2. Petition to reopen or correct proceedings, depending on procedural posture;
  3. Petition for relief from judgment in limited circumstances;
  4. Appeal, if period remains available;
  5. Certiorari or other extraordinary remedy in exceptional cases;
  6. Coordination with the court, prosecutor, police, BJMP, BuCor, NBI, and other record-keeping agencies;
  7. Presentation of fingerprints, mugshots, biometrics, and identity records;
  8. Criminal complaint against the impostor.

The key is to distinguish between the true legal person and the impostor who used that person’s identity. Courts and agencies must be asked to correct the record so that the innocent person is not treated as the convict.


X. Clearing Records After Identity Theft

Even after dismissal or acquittal, the victim may continue to suffer because records remain in databases.

A. NBI Clearance Hit

If the victim gets an NBI “hit” because of a wrongful case, they should present certified court documents showing dismissal, acquittal, identity correction, or proof of mistaken identity.

The victim may need to request annotation, correction, or clarification of records.

B. Police Records and Blotters

The victim may request certified copies and correction or annotation of police records. Police blotters are historical records, so agencies may not simply erase them, but they may annotate or issue certifications clarifying mistaken identity.

C. Court Records

The victim should obtain:

  1. Certified true copy of dismissal order;
  2. Certified true copy of acquittal decision;
  3. Entry of judgment;
  4. Order recalling warrant;
  5. Order correcting identity;
  6. Certification from the court, where available.

D. Prosecutor’s Records

The victim may request copies of the prosecutor’s resolution dismissing the complaint or recognizing lack of probable cause.

E. Bank, Telco, and Platform Records

The victim should ask institutions to:

  1. Freeze fraudulent accounts;
  2. Close accounts opened using stolen identity;
  3. Preserve records;
  4. Issue certification of fraud;
  5. Correct internal records;
  6. Remove negative reports where legally justified;
  7. Cooperate with law enforcement.

F. Credit and Financial Reputation

If fraudulent loans or debts were opened, the victim should dispute them with lenders, collection agencies, credit bureaus, and financial institutions. The victim should provide police reports, affidavits, and proof of identity theft.


XI. Criminal Complaints Against the Identity Thief

The victim may file criminal complaints against the person who stole or misused the identity. Depending on the facts, possible charges include:

  1. Computer-related identity theft;
  2. Computer-related fraud;
  3. Computer-related forgery;
  4. Falsification of documents;
  5. Use of falsified documents;
  6. Estafa;
  7. Perjury;
  8. Libel or cyberlibel;
  9. Threats, coercion, or extortion;
  10. Unauthorized access;
  11. Data privacy offenses;
  12. Access device fraud;
  13. Illegal use of SIM registration information;
  14. Other special law violations.

The complaint should be supported by affidavits, documents, screenshots, certifications, and digital evidence.


XII. Complaints Against Negligent Companies or Institutions

Sometimes identity theft occurs because an institution failed to verify identity, protect data, secure accounts, or respond to fraud reports.

Possible targets include:

  1. Banks;
  2. Lending companies;
  3. Financing companies;
  4. E-wallet providers;
  5. Telecommunications companies;
  6. Employers;
  7. Schools;
  8. Hospitals;
  9. Online platforms;
  10. Government offices;
  11. Data processors;
  12. Collection agencies.

Possible remedies include:

  1. Complaint with the National Privacy Commission;
  2. Complaint with the Bangko Sentral ng Pilipinas for regulated financial institutions;
  3. Complaint with the Securities and Exchange Commission for lending or financing companies where applicable;
  4. Complaint with the National Telecommunications Commission for telco-related issues where applicable;
  5. Civil action for damages;
  6. Demand for correction, deletion, blocking, or annotation of records;
  7. Demand to cease collection efforts;
  8. Demand to preserve evidence.

XIII. Data Privacy Remedies

The Data Privacy Act gives data subjects important rights, including rights to be informed, to access, to object, to correct, and to seek damages in appropriate cases.

A victim may request a personal information controller or processor to:

  1. Confirm whether their data was processed;
  2. Provide access to records;
  3. Explain the source of the data;
  4. Identify recipients of the data;
  5. Correct inaccurate information;
  6. Block or remove unlawfully processed information;
  7. Preserve evidence of breach or unauthorized access.

If the institution refuses or mishandles the matter, the victim may file a complaint with the National Privacy Commission.

For identity theft cases, the privacy angle is especially important when the victim’s documents were leaked, sold, improperly shared, or used without adequate verification.


XIV. Civil Remedies and Damages

A victim may sue for damages where identity theft caused financial loss, emotional distress, reputational injury, detention, loss of employment, denial of credit, business damage, or legal expenses.

Possible damages include:

  1. Actual damages;
  2. Moral damages;
  3. Exemplary damages;
  4. Nominal damages;
  5. Temperate damages;
  6. Attorney’s fees and litigation expenses.

Civil liability may arise from:

  1. Fraud;
  2. Negligence;
  3. Abuse of rights;
  4. Defamation;
  5. Malicious prosecution;
  6. Violation of privacy;
  7. Breach of contract;
  8. Quasi-delict;
  9. Bad faith refusal to correct records;
  10. Wrongful collection of fraudulent debts.

The defendant may be the identity thief, a negligent institution, a malicious complainant, or another responsible party.


XV. Malicious Prosecution and False Accusation

If a person knowingly caused the filing of a baseless criminal case using false identity evidence, the victim may consider remedies for malicious prosecution or related wrongdoing.

A malicious prosecution claim generally requires more than the fact that the criminal case was dismissed. The victim must usually show bad faith, malice, lack of probable cause, and damage.

Related criminal or civil issues may include:

  1. Perjury;
  2. Falsification;
  3. Offering false testimony or evidence;
  4. Slander by deed or defamation;
  5. Abuse of rights;
  6. Damages under the Civil Code.

A person who merely made a good-faith complaint may not automatically be liable. Liability depends on whether they acted maliciously, recklessly, fraudulently, or without reasonable basis.


XVI. Proving That the Accused Is Not the Offender

In a wrongful criminal case, identity is often the central issue. The defense should build a clear evidentiary record.

Helpful evidence includes:

A. Documentary Evidence

  1. Birth certificate;
  2. Government IDs;
  3. Passport stamps;
  4. Employment records;
  5. Attendance records;
  6. School records;
  7. Barangay certification;
  8. Utility bills;
  9. Lease documents;
  10. Travel bookings;
  11. Immigration records;
  12. Hospital records;
  13. Bank records;
  14. Transaction histories.

B. Digital Evidence

  1. Account login history;
  2. IP addresses;
  3. Device IDs;
  4. Email headers;
  5. Platform records;
  6. Mobile number records;
  7. SIM registration records;
  8. E-wallet logs;
  9. GPS/location records;
  10. CCTV timestamps.

C. Testimonial Evidence

  1. Witnesses who can confirm the victim’s location;
  2. Employer or supervisor testimony;
  3. Family members;
  4. Barangay officials;
  5. Bank or telco representatives;
  6. Digital forensic experts;
  7. Handwriting or document examiners.

D. Physical and Biometric Evidence

  1. Fingerprints;
  2. Mugshots;
  3. facial comparison;
  4. Height, scars, tattoos, or other distinguishing features;
  5. Signature comparison;
  6. Voice comparison, where relevant.

The defense should avoid relying only on denial. It should present affirmative evidence showing that another person used the victim’s identity.


XVII. Electronic Evidence Concerns

Digital evidence must be preserved and authenticated. Screenshots alone may help, but stronger evidence may include:

  1. Device extraction reports;
  2. Certified platform records;
  3. Bank certifications;
  4. Telco records;
  5. Email headers;
  6. Server logs;
  7. Affidavit of the person who captured the screenshots;
  8. Chain of custody documentation;
  9. Forensic examination.

The victim should not alter, crop, or manipulate evidence. Original files, devices, and metadata should be preserved.


XVIII. Dealing With Fake Social Media Accounts

If an impostor created a fake account, the victim should:

  1. Capture screenshots showing the profile, URL, username, posts, messages, and date;
  2. Report the account to the platform;
  3. Ask friends and contacts not to engage with the account;
  4. File a police or NBI cybercrime report;
  5. Preserve communications;
  6. Avoid threatening the impostor online;
  7. Consider a takedown request;
  8. Use the evidence in a criminal complaint.

Where the fake account was used to commit scams, harassment, libel, threats, or fraud, the victim should document each victim, transaction, message, and representation.


XIX. Dealing With Fraudulent Loans and Debts

If loans were taken using the victim’s identity, the victim should:

  1. Immediately dispute the debt in writing;
  2. Send an affidavit of identity theft;
  3. Attach police or NBI reports;
  4. Demand copies of the loan application, KYC documents, signatures, selfies, IP logs, bank disbursement records, and phone numbers used;
  5. Demand suspension of collection;
  6. Demand correction of credit reporting;
  7. File complaints with regulators where appropriate;
  8. File criminal complaints if fraud is clear.

Collection agencies should be told in writing that the debt is disputed due to identity theft. If they continue harassment, threats, public shaming, or unauthorized disclosure, additional remedies may arise.


XX. Dealing With Fraudulent SIM Registration or Mobile Number Use

If a SIM or mobile number was registered or used under the victim’s identity, the victim should:

  1. Contact the telco immediately;
  2. Request investigation and deactivation or correction;
  3. Ask for records of registration and documents used;
  4. File an affidavit of identity theft;
  5. Report to law enforcement;
  6. Preserve any messages or OTP activity;
  7. Secure accounts linked to the number;
  8. Change passwords and enable stronger authentication.

Because many scams use mobile numbers, proving that the victim did not own or control the number may be crucial.


XXI. Dealing With Bank or E-Wallet Account Takeover

If identity theft involves unauthorized financial transactions, the victim should:

  1. Freeze accounts immediately;
  2. Change passwords and PINs;
  3. Report unauthorized transactions in writing;
  4. Request chargeback or reversal where available;
  5. Ask for investigation reports;
  6. Demand preservation of logs;
  7. Report to law enforcement;
  8. File regulatory complaints if the institution fails to act properly.

The victim should record all case numbers, names of representatives, dates of calls, and written responses.


XXII. Immigration, Travel, and Hold-Departure Problems

A wrongful criminal case may affect travel if a warrant, hold departure order, watchlist, or immigration record is involved.

Possible remedies include:

  1. Motion to lift or recall warrant;
  2. Motion to lift hold departure order, if one exists;
  3. Court certification of dismissal or mistaken identity;
  4. Presentation of court orders to immigration authorities;
  5. Coordination through counsel before travel;
  6. Certified copies of court records when passing immigration.

A person with an outstanding warrant should not assume the problem is harmless. It must be resolved formally.


XXIII. Employment and Professional Licensing Issues

Identity theft and wrongful criminal cases can affect employment, board licensing, background checks, visas, and professional reputation.

The victim should maintain a clearance packet containing:

  1. Affidavit of identity theft;
  2. Police or NBI report;
  3. Prosecutor’s dismissal resolution;
  4. Court dismissal or acquittal order;
  5. Entry of judgment;
  6. Court certification;
  7. NBI or police clearance explanation, if available;
  8. Certifications from banks, telcos, or platforms.

If an employer takes action based on false criminal information, the employee may have labor, civil, or contractual remedies depending on the circumstances.


XXIV. Administrative Remedies Against Public Officers

If police officers, jail officers, prosecutors, court personnel, or other public officers negligently or maliciously ignored clear proof of mistaken identity, possible remedies include administrative complaints.

Depending on the officer and facts, complaints may be filed with:

  1. The officer’s agency;
  2. Internal affairs or disciplinary bodies;
  3. Office of the Ombudsman, where applicable;
  4. Civil Service Commission, where applicable;
  5. Supervising courts or offices, where applicable.

Administrative liability may arise from gross neglect, oppression, misconduct, grave abuse of authority, or conduct prejudicial to the service.


XXV. Public Attorney’s Office and Legal Aid

A person who cannot afford private counsel may seek help from the Public Attorney’s Office, subject to eligibility requirements. Law school legal aid clinics, Integrated Bar of the Philippines legal aid programs, and human rights organizations may also assist in appropriate cases.

Because criminal cases involve liberty, the victim should obtain legal assistance as early as possible, especially if there is a warrant, pending arraignment, or detention.


XXVI. Practical Case Strategy

A strong identity theft defense usually follows this structure:

  1. Stop the immediate harm: secure accounts, freeze transactions, report fraud, address warrants.
  2. Document the identity theft: affidavits, screenshots, records, certifications.
  3. Clear the criminal case: counter-affidavit, motions, reinvestigation, trial defense.
  4. Correct official records: court, prosecutor, NBI, police, banks, telcos, platforms.
  5. Pursue offenders: criminal complaint against the impostor.
  6. Seek compensation: civil damages or regulatory complaints where justified.
  7. Prevent recurrence: account security, monitoring, written notices, record preservation.

The victim should keep a chronological file with dates, agencies contacted, people spoken to, reference numbers, copies of submissions, and certified records.


XXVII. Sample Affidavit Outline

An affidavit for identity theft and wrongful criminal accusation may contain:

  1. Name, age, citizenship, civil status, address;
  2. Statement that the affiant is executing the affidavit to report identity theft and deny involvement in a criminal case;
  3. Description of how the affiant learned of the wrongful case;
  4. Details of the criminal complaint or case number, if known;
  5. Denial of participation in the alleged offense;
  6. Explanation of how the affiant’s identity was misused;
  7. Evidence showing true identity;
  8. Evidence showing whereabouts or non-participation;
  9. Description of fake accounts, documents, numbers, or transactions;
  10. List of attached evidence;
  11. Request for investigation, correction of records, and prosecution of the impostor;
  12. Statement that the affidavit is executed freely and truthfully;
  13. Jurat before a notary public or authorized officer.

The affidavit should be precise and factual. It should avoid exaggerations, unsupported accusations, and emotional conclusions.


XXVIII. Common Mistakes to Avoid

Victims should avoid:

  1. Ignoring subpoenas or court notices;
  2. Assuming the case will disappear once they explain verbally;
  3. Failing to file a counter-affidavit on time;
  4. Posting emotional accusations online;
  5. Deleting fake account evidence before preserving it;
  6. Sending threats to the suspected impostor;
  7. Paying fraudulent debts without written reservation or investigation;
  8. Relying only on screenshots without supporting certifications;
  9. Missing appeal or review periods;
  10. Traveling while a warrant remains unresolved;
  11. Failing to obtain certified copies of dismissal or correction orders;
  12. Assuming an NBI hit will automatically clear itself.

Identity theft cases require written records. Oral explanations are rarely enough.


XXIX. The Burden of Proof in Criminal Cases

In a criminal case, the prosecution must prove guilt beyond reasonable doubt. This includes proving that the accused is the person who committed the crime.

Where identity is disputed, courts must carefully examine whether the prosecution’s identification evidence is reliable. A conviction cannot rest on speculation, weak assumptions, or mere use of the accused’s name by an impostor.

However, the practical reality is that the person wrongfully named must actively present evidence early. Silence or inaction can allow the case to proceed further than it should.


XXX. When the Identity Thief Is Unknown

Many identity theft cases begin with an unknown perpetrator. The complaint may initially be against “John Doe,” “Jane Doe,” or unidentified persons.

The victim may still file a complaint and request investigation. Law enforcement may seek information from platforms, telcos, banks, remittance centers, e-wallets, internet service providers, or other entities through proper legal processes.

The victim should provide all known identifiers, including:

  1. Phone numbers;
  2. Email addresses;
  3. Usernames;
  4. Account numbers;
  5. Transaction reference numbers;
  6. IP addresses, if available;
  7. Wallet addresses, if relevant;
  8. Names used by the impostor;
  9. Photos used;
  10. Documents submitted;
  11. Recipient accounts.

XXXI. Remedies Against Online Defamation Connected to Identity Theft

If the impostor used the victim’s identity to post defamatory content, the victim may need to address both the criminal complaint and the public reputational harm.

Possible actions include:

  1. Preserve screenshots and URLs;
  2. Report fake account to the platform;
  3. Issue a public clarification, carefully drafted;
  4. File a cybercrime complaint;
  5. Request takedown;
  6. Notify affected persons;
  7. Submit evidence to prosecutors or courts showing the account was fake;
  8. Consider civil damages for reputational injury.

A public clarification should be cautious. It should not accuse specific persons without evidence, as that may create new legal risks.


XXXII. Interaction With Warrants and Alias Names

A frequent problem is that an impostor gives the victim’s name as an alias. Criminal records may then reflect the victim’s name as an alias of the offender.

The victim should ask for:

  1. Correction of the accused’s name;
  2. Removal or annotation of the victim’s name as alias, where proper;
  3. Court order clarifying mistaken identity;
  4. Police and NBI annotation;
  5. Certified copies of the correction.

A mere letter may not be enough. Courts and agencies often require formal motions, affidavits, and official orders.


XXXIII. Coordination With the Private Complainant

In some cases, the private complainant is also a victim of fraud and may have mistakenly identified the innocent person. Counsel may communicate with the complainant to present proof of identity theft.

If the complainant is convinced, they may submit an affidavit of desistance, clarification, or supplemental affidavit. However, criminal cases are not automatically dismissed merely because the complainant desists, especially for public crimes. The prosecutor or court must still act.

Still, a complainant’s corrected statement can be important evidence.


XXXIV. The Role of Lawyers

A lawyer can assist by:

  1. Reviewing the complaint, subpoena, information, warrant, and evidence;
  2. Preparing counter-affidavits and motions;
  3. Appearing before prosecutors and courts;
  4. Coordinating with law enforcement;
  5. Seeking recall of warrants;
  6. Filing petitions or appeals;
  7. Drafting demand letters;
  8. Filing criminal, civil, administrative, and regulatory complaints;
  9. Protecting the victim from self-incrimination or procedural mistakes;
  10. Ensuring evidence is properly presented.

In identity theft cases, early legal intervention can prevent arrest, arraignment, trial, or permanent record damage.


XXXV. Conclusion

Identity theft in the Philippines is not merely a privacy problem. It can become a criminal defense emergency when an innocent person is named in a criminal complaint, subjected to investigation, issued a warrant, arrested, detained, or burdened with a criminal record because another person used their identity.

The remedies are both defensive and offensive. The victim must defend against the wrongful case through affidavits, motions, reinvestigation, trial defense, or extraordinary remedies where necessary. At the same time, the victim may pursue criminal complaints, data privacy complaints, regulatory remedies, civil damages, correction of records, and administrative accountability.

The most important principles are speed, documentation, and formal correction. A victim should not rely on verbal explanations alone. The record must clearly show that the accused or suspect was misidentified, that the identity was stolen or misused, and that official databases, court records, police files, financial records, and digital platforms must be corrected accordingly.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.