SIM card replacement in the Philippines is no longer a simple customer-service transaction. Because mobile numbers are now linked to banking, e-wallets, government services, social media accounts, delivery apps, online marketplaces, and identity verification systems, replacing a SIM card can raise serious legal and security concerns.
A lost, stolen, damaged, expired, or upgraded SIM may require replacement. But the same process can also be abused through “SIM swap” fraud, identity theft, unauthorized access to online accounts, and financial scams. Philippine law now treats SIM ownership, registration, verification, and misuse with greater seriousness, especially after the passage of the SIM Registration Act.
This article explains the requirements, legal issues, risks, remedies, and practical considerations surrounding SIM card replacement in the Philippine context.
I. What Is SIM Card Replacement?
SIM card replacement refers to the process of obtaining a new SIM card while retaining the same mobile number. This may be requested when the original SIM is:
Lost.
Stolen.
Damaged.
Defective.
Expired or deactivated, subject to telco policy.
Incompatible with a new phone.
Converted from physical SIM to eSIM.
Converted from eSIM to physical SIM.
Upgraded from old SIM technology to LTE or 5G SIM.
Blocked due to PIN or PUK issues, depending on telco policy.
Replaced due to suspected fraud or unauthorized use.
The goal of SIM replacement is usually to allow the legitimate subscriber to keep using the same mobile number through a new SIM profile or physical card.
II. Why SIM Replacement Is Legally Sensitive
A mobile number is often treated as a digital identity key. Many services rely on it for:
One-time passwords.
Bank verification.
E-wallet access.
Password recovery.
Two-factor authentication.
Government account registration.
Messaging apps.
Social media recovery.
Delivery and ride-hailing accounts.
Employment verification.
Loan applications.
Online marketplace transactions.
Because of this, whoever controls the SIM may be able to control accounts linked to the mobile number. This is why SIM replacement can become legally sensitive.
The main concern is SIM swap fraud, where a criminal obtains a replacement SIM under another person’s number and uses it to intercept OTPs, reset passwords, access bank or e-wallet accounts, or impersonate the victim.
III. Legal Framework
1. SIM Registration Act
The principal law is the Subscriber Identity Module Registration Act, Republic Act No. 11934.
The law requires SIM users to register their SIMs with their public telecommunications entity or telco. The registration requirement applies to both prepaid and postpaid users.
The law aims to help prevent scams, fraud, identity theft, and crimes committed through anonymous SIM use.
For SIM replacement, this means a telco must generally ensure that the person requesting replacement is the registered owner or authorized user of the SIM.
2. Implementing Rules and Telco Policies
The implementing rules of the SIM Registration Act and individual telco policies govern registration procedures, validation, changes in information, deactivation, and related customer processes.
In practice, telcos may require subscribers to present proof of identity and proof that they are entitled to replace the SIM.
Because telcos operate under regulatory oversight, they must balance customer convenience with fraud prevention.
3. Data Privacy Act
The Data Privacy Act of 2012, Republic Act No. 10173, is relevant because SIM replacement requires processing of personal information, identification documents, biometrics in some cases, account information, and subscriber records.
Telcos must process personal data lawfully, fairly, securely, and only for legitimate purposes.
The Data Privacy Act also becomes relevant when:
A person uses another person’s ID to replace a SIM.
An insider leaks subscriber information.
A scammer uses stolen personal data to impersonate a subscriber.
A telco negligently discloses or mishandles personal information.
A victim’s mobile number is used to access accounts or commit fraud.
4. Cybercrime Prevention Act
The Cybercrime Prevention Act of 2012, Republic Act No. 10175, may apply when SIM replacement is used to commit online fraud, unauthorized account access, identity theft, phishing, computer-related fraud, or other cybercrimes.
For example, if a fraudster obtains a replacement SIM and uses OTPs to access an e-wallet or bank account, the act may involve cybercrime offenses.
5. Revised Penal Code
The Revised Penal Code may apply through crimes such as:
Estafa.
Falsification of documents.
Use of falsified documents.
Identity-related fraud.
Theft, depending on facts.
Other fraud-related offenses.
If the SIM replacement is obtained through false representations or fake documents, criminal liability may arise.
6. Access Devices Regulation Act
The Access Devices Regulation Act, Republic Act No. 8484, may apply where the SIM replacement is used to gain access to accounts, cards, passwords, PINs, access codes, electronic credentials, or financial facilities.
This law can be relevant in unauthorized bank, credit card, debit card, ATM, e-wallet, or electronic account transactions.
7. Consumer Protection and Telecommunications Regulation
The National Telecommunications Commission has regulatory authority over telecommunications entities. A subscriber may raise concerns with the NTC if a telco mishandles SIM replacement, fails to act on a valid complaint, improperly deactivates a number, or allows unauthorized replacement due to weak verification processes.
For financial losses involving banks, e-wallets, or payment institutions, the Bangko Sentral ng Pilipinas may also be relevant.
IV. Common Reasons for SIM Replacement
1. Lost SIM
A subscriber may request replacement when the SIM or phone is lost. The subscriber should immediately report the loss to the telco to prevent misuse.
Legal concern: If the lost SIM remains active, another person may use it to receive OTPs, access accounts, impersonate the subscriber, or commit scams.
2. Stolen Phone or SIM
If the phone or SIM is stolen, the subscriber should urgently request SIM blocking and replacement.
Legal concern: Theft may lead to account takeover, unauthorized financial transactions, identity theft, or fraudulent communications.
3. Damaged SIM
A physically damaged SIM may be replaced after verification.
Legal concern: Minimal, unless the request is fraudulent or the SIM is linked to sensitive accounts.
4. SIM Upgrade
Older SIMs may need upgrading to support LTE, 5G, or newer services.
Legal concern: Telcos still need to confirm that the request comes from the legitimate subscriber.
5. eSIM Conversion
A subscriber may convert a physical SIM to eSIM or vice versa, depending on telco availability and policy.
Legal concern: eSIM transfers can be abused if account credentials or telco verification processes are compromised.
6. Deactivated SIM
A SIM may be deactivated due to non-registration, prolonged inactivity, non-use, violation of telco terms, or regulatory reasons.
Legal concern: Once deactivated, retention or recovery of the same number depends heavily on telco policy and legal requirements.
7. Defective or Malfunctioning SIM
A SIM may be replaced if it fails to connect to the network despite a working device.
Legal concern: The telco may require proof of ownership and account verification before replacement.
V. Basic Requirements for SIM Replacement
Actual requirements vary by telco and customer type, but Philippine telcos commonly require proof of identity and proof of ownership or entitlement.
1. For Individual Prepaid Subscribers
A prepaid subscriber may generally be asked to provide:
Valid government-issued ID.
Registered mobile number.
Personal information matching the SIM registration record.
The old SIM card, if available.
Affidavit of loss, if the SIM was lost or stolen.
Proof of ownership or recent usage, if required.
Recent load transactions, call history, text history, or account details, depending on telco verification.
Payment for replacement fee, if any.
Additional verification through OTP, selfie, biometric, security questions, or account records.
Because prepaid SIMs are often less document-heavy than postpaid accounts, telcos may rely on a combination of registration data, ID verification, account usage history, and internal security checks.
2. For Individual Postpaid Subscribers
A postpaid subscriber may generally be asked to provide:
Valid government-issued ID.
Account number.
Mobile number.
Proof of billing or account ownership.
Personal appearance, depending on telco policy.
Authorization documents if requested by a representative.
Payment of outstanding balance, if required.
Replacement fee, if any.
Postpaid accounts usually have existing contracts, billing records, and account profiles, which can make verification easier.
3. For Corporate or Business Accounts
For a corporate SIM or business account, requirements may include:
Company authorization letter.
Secretary’s Certificate or board authorization, depending on company policy and telco requirement.
Valid ID of authorized representative.
Company ID of representative.
Business registration documents.
Account number.
List of authorized signatories.
Proof that the number is part of the company account.
Replacement request form.
Legal concern: Unauthorized employees, former employees, agents, or third parties may attempt to replace company SIMs. Businesses should maintain clear internal controls over mobile numbers used for banking, OTPs, logistics, sales, and customer support.
4. For Representatives Acting on Behalf of the Subscriber
If the registered subscriber cannot personally appear, the telco may require:
Authorization letter or Special Power of Attorney.
Valid ID of the subscriber.
Valid ID of the representative.
Proof of relationship or authority.
Additional verification.
Some telcos may refuse replacement through representatives for high-risk cases, especially if the SIM is linked to fraud reports or sensitive accounts.
5. For Minors
SIM registration for minors is generally under the name of a parent or guardian. Replacement may therefore require:
Valid ID of parent or guardian.
Proof of guardianship or relationship.
SIM registration details.
Old SIM, if available.
Affidavit of loss, if lost.
The minor may not be treated as the legal subscriber if the SIM was registered under the parent or guardian.
6. For Foreign Nationals
Foreign nationals may be required to present documents such as:
Passport.
Proof of address in the Philippines.
Return ticket or travel details, where applicable.
Alien Certificate of Registration or other immigration documents, depending on residency status.
Work permit, school registration, or similar proof, if applicable.
SIM registration rules for tourists and foreign nationals may differ based on length and purpose of stay.
VI. Valid IDs Commonly Accepted
Telcos commonly accept government-issued IDs, such as:
Philippine Identification Card or PhilID.
Passport.
Driver’s license.
Unified Multi-Purpose ID.
Social Security System ID.
Government Service Insurance System ID.
Professional Regulation Commission ID.
Voter’s ID or voter certification, depending on acceptance.
Postal ID, depending on validity and telco policy.
Senior citizen ID.
OFW ID.
Overseas Workers Welfare Administration ID.
Persons with Disability ID.
National Bureau of Investigation clearance.
Police clearance.
Firearms license, where accepted.
Integrated Bar of the Philippines ID.
Company ID may be accepted in some contexts but is usually weaker than government ID unless supported by other proof.
The exact list may vary. Some IDs may be accepted only if they are valid, unexpired, readable, and verifiable.
VII. Affidavit of Loss
An affidavit of loss may be required if the SIM was lost or stolen.
It usually states:
Name and personal circumstances of the subscriber.
Mobile number involved.
Facts of loss.
Approximate date, time, and place of loss.
Statement that diligent search was made but the SIM could not be found.
Statement that the affidavit is executed for SIM replacement.
The affidavit should be notarized.
In theft cases, a police blotter or police report may also be useful, especially if financial accounts were compromised.
VIII. Verification Issues
1. Matching Registration Data
The telco will usually compare the requester’s information with the SIM registration record. Any mismatch may delay or prevent replacement.
Common mismatch issues include:
Different spelling of name.
Old address.
Wrong birthdate.
Use of nickname.
SIM registered under another person.
SIM registered under parent, spouse, employer, or company.
Incomplete or incorrect registration information.
Expired ID.
Foreign document mismatch.
Number not registered.
2. SIM Registered Under Another Person
A frequent problem is that the user of the SIM is not the registered owner. This can happen when:
A parent registered the SIM for a child.
An employer provided the number.
A relative bought and registered the SIM.
A reseller registered the SIM.
The SIM was informally transferred.
The user never updated registration details.
Legal concern: The telco may treat the registered person, not the actual user, as the proper party for replacement.
If the SIM is registered to someone else, replacement may require the registered owner’s participation, transfer procedures, or legal documentation.
3. Informal Transfer of SIM
If a SIM was transferred without proper registration update, the new user may have difficulty proving entitlement.
This is legally risky because the registered owner may remain associated with the SIM’s use, including potential misuse.
Both transferor and transferee should update the registration record according to telco procedures.
4. Fraud Flags
A telco may impose enhanced verification or deny replacement when there are red flags such as:
Recent password reset attempts.
Multiple replacement requests.
Conflicting IDs.
Fraud complaint on the number.
Unusual account activity.
Recent financial disputes.
Mismatch in biometric or selfie verification.
Representative request for a sensitive number.
High-value corporate account.
Law enforcement request or hold.
IX. SIM Replacement and SIM Swap Fraud
1. What Is SIM Swap Fraud?
SIM swap fraud occurs when a fraudster persuades or tricks a telco into issuing a replacement SIM for a victim’s mobile number. Once activated, the victim’s original SIM loses service, and the scammer receives calls and messages intended for the victim.
The scammer may then:
Receive OTPs.
Reset passwords.
Access banks and e-wallets.
Take over email or social media accounts.
Approve financial transactions.
Impersonate the victim.
Apply for loans.
Commit scams using the victim’s number.
2. Warning Signs of SIM Swap
Warning signs include:
Sudden loss of mobile signal.
“No service” despite being in a coverage area.
Inability to send texts or make calls.
Unexpected notification that the SIM was replaced.
Bank or e-wallet OTPs not received.
Password reset emails or alerts.
Unauthorized transactions.
Friends receiving strange messages from the number.
Messaging apps logged out unexpectedly.
3. Immediate Action if SIM Swap Is Suspected
A suspected victim should immediately:
Contact the telco through hotline, store, or official app.
Request suspension or blocking of the number.
Ask whether a SIM replacement was processed.
Request account protection or fraud tagging.
Contact banks and e-wallets.
Freeze or lock financial accounts.
Change passwords, starting with email accounts.
Remove the number as recovery method where possible.
File a police or cybercrime report.
Preserve screenshots and notifications.
Request incident reference numbers from telco and financial institutions.
Time is critical. SIM swap fraud can cause major losses within minutes.
X. Legal Liability for Unauthorized SIM Replacement
1. Liability of the Fraudster
A person who fraudulently replaces another person’s SIM may be liable for several offenses, depending on facts:
Identity theft.
Computer-related fraud.
Estafa.
Falsification of documents.
Use of falsified documents.
Illegal access.
Unauthorized access-device activity.
Data privacy violations.
Other cybercrime-related offenses.
If the fraudulent replacement is used to steal money, additional charges may arise.
2. Liability of an Accomplice or Money Mule
A person who helps the fraudster may also face liability. This may include:
A person who provides fake IDs.
A person who lends an account to receive stolen funds.
A person who withdraws or transfers proceeds.
A person who pretends to be the subscriber.
An insider who assists the replacement.
A recruiter who collects personal data.
A person who sells registered SIMs.
3. Possible Liability of Telco Personnel
If telco personnel knowingly assist fraud, accept false documents, bypass verification, disclose subscriber data, or process unauthorized replacement, they may face:
Employment sanctions.
Civil liability.
Criminal liability.
Data privacy liability.
Administrative consequences.
If the telco employee was merely negligent, the issue may involve internal discipline, regulatory complaint, civil liability, or consumer protection concerns, depending on damage and proof.
4. Possible Liability of the Telco
A telco may face legal or regulatory issues if it failed to apply reasonable verification standards, negligently allowed unauthorized SIM replacement, mishandled personal data, or failed to respond appropriately to a fraud complaint.
Possible avenues include:
Complaint with the telco.
Escalation to the National Telecommunications Commission.
Data privacy complaint.
Civil action for damages, if legally supportable.
Complaint to other relevant agencies if financial loss is involved.
However, liability is fact-specific. The victim must generally show breach of duty, negligence, causation, and damage.
XI. Data Privacy Concerns
SIM replacement involves sensitive personal information. Legal concerns include:
Collection of excessive data.
Poor verification procedures.
Unauthorized access to subscriber records.
Disclosure of ID copies.
Improper retention of documents.
Insider misuse.
Failure to secure customer data.
Use of personal data for fraudulent replacement.
Victims may file a complaint with the National Privacy Commission if personal data was mishandled or misused.
Telcos should follow data protection principles, including:
Transparency.
Legitimate purpose.
Proportionality.
Security.
Accuracy.
Retention limits.
Accountability.
For subscribers, it is important to submit personal data only through official telco channels and avoid sending IDs through unofficial social media accounts or unknown agents.
XII. SIM Registration and Replacement
1. Replacement of Registered SIM
If the SIM is registered, replacement should generally be processed only after the telco verifies the registered subscriber’s identity.
2. Replacement of Unregistered SIM
If the SIM was not registered within the required period or was deactivated for non-registration, replacement may be unavailable or subject to special rules. The user may lose the number.
3. Updating Registration Information
A subscriber should update SIM registration information when there is a change in:
Name.
Address.
Nationality or residency status.
Ownership or authorized user.
Corporate authorization.
Other required details.
Failure to update information may cause problems during replacement or investigation.
4. Death of Registered Subscriber
If the registered subscriber has died, replacement or transfer may require:
Death certificate.
Proof of relationship.
Settlement or estate documents, depending on context.
Authorization from heirs or administrator.
Telco-specific requirements.
Numbers linked to business, banking, or estate matters should be handled carefully.
XIII. Corporate SIM Replacement Concerns
Businesses face unique legal risks with SIM replacement because mobile numbers are often used for:
Bank OTPs.
Corporate e-wallets.
Customer service hotlines.
Sales accounts.
Delivery accounts.
Social media recovery.
Two-factor authentication.
Internal communications.
Government portals.
If a corporate SIM is replaced without authorization, the company may suffer financial loss, data breach, customer fraud, or operational disruption.
Recommended Corporate Controls
Companies should:
Maintain an inventory of corporate SIMs.
List authorized users and custodians.
Keep records of SIM registration.
Use official corporate accounts with telcos.
Require board or management approval for replacement.
Disable employee access upon resignation.
Avoid using a single mobile number for critical financial approvals.
Use hardware security keys or app-based authentication for sensitive accounts.
Monitor SIM replacement requests.
Keep backup recovery methods.
Ensure that numbers used for banking are under corporate control.
Document custody of SIMs.
For departing employees, companies should recover corporate SIMs immediately and update account access credentials.
XIV. SIM Replacement for Numbers Linked to Banks and E-Wallets
SIM replacement is especially risky when the number is linked to financial accounts.
Legal and Practical Issues
A mobile number may be used for:
OTP delivery.
Account recovery.
Transaction confirmation.
Fraud alerts.
Customer verification.
Loan applications.
E-wallet login.
If a SIM is replaced, the person holding the replacement SIM may receive security messages.
What Subscribers Should Do Before or After Replacement
Notify banks or e-wallets if the SIM was lost or stolen.
Temporarily lock accounts if fraud is suspected.
Change passwords and PINs.
Review transaction history.
Update registered mobile number if needed.
Remove compromised devices.
Report unauthorized transactions immediately.
Request written case or dispute numbers.
File a police report if money was lost.
Financial Institution Liability
A bank or e-wallet may be questioned if it allowed unauthorized transactions despite fraud indicators or failed to follow applicable security and consumer protection standards. However, if the customer voluntarily shared OTPs, passwords, or credentials, recovery may be more difficult.
Each case depends on whether the transaction was unauthorized, whether the customer was negligent, whether the institution’s controls were adequate, and whether the loss was promptly reported.
XV. SIM Replacement and OTP Security
OTP-based authentication is common but imperfect. SIM replacement can defeat SMS-based security because the OTP follows the mobile number.
Legal concern arises when an institution relies only on SMS OTP for high-risk transactions without stronger verification.
Subscribers should consider:
Using authenticator apps when available.
Using email and app-based alerts.
Avoiding SMS as the only recovery method.
Setting transaction limits.
Enabling device-based security.
Using strong, unique passwords.
Avoiding sharing OTPs under any circumstance.
Banks and platforms increasingly encourage stronger authentication because SMS can be vulnerable to SIM swap, phishing, and social engineering.
XVI. Replacement of eSIM
An eSIM is an embedded SIM profile installed on a compatible device. eSIM replacement may occur when changing phones, deleting an eSIM profile, losing a device, or converting between physical SIM and eSIM.
Legal concerns include:
Unauthorized eSIM transfer.
QR code interception.
Compromised telco account.
Device theft.
Weak identity verification.
Fraudulent remote activation.
Subscribers should treat eSIM QR codes and activation details as sensitive. Anyone who can activate the eSIM may gain control of the number.
XVII. Selling, Lending, or Transferring SIMs
The SIM Registration Act and related rules discourage anonymous or irresponsible transfer of SIMs. A registered SIM should not be casually sold, lent, or transferred without proper update or compliance.
Legal risks include:
The registered owner may be linked to scams committed using the SIM.
The actual user may be unable to replace the SIM.
The SIM may be deactivated for irregularities.
The number may be used for fraud, harassment, threats, or identity theft.
Law enforcement may trace suspicious activity to the registered owner.
If a person no longer uses a SIM, it is safer to deactivate, properly transfer, or update registration according to telco procedures rather than simply giving it away.
XVIII. Use of Fake IDs or False Information
Using fake IDs, false documents, or false personal information for SIM replacement may expose a person to criminal liability.
Possible consequences include:
Denial of replacement.
Deactivation of SIM.
Criminal complaint.
Falsification charges.
Cybercrime charges if used for online fraud.
Data privacy violations.
Civil liability for resulting damage.
A person should never attempt to replace a SIM registered to another person by pretending to be that person.
XIX. Lost Phone: SIM Replacement vs. Device Security
Replacing the SIM does not automatically secure the lost phone. A stolen or lost device may still contain:
Email accounts.
Banking apps.
E-wallet apps.
Saved passwords.
Photos of IDs.
Private messages.
Authentication apps.
Social media accounts.
Corporate data.
A victim should also:
Remotely lock or erase the device if possible.
Change passwords.
Remove the device from account sessions.
Notify banks and e-wallets.
Disable biometric login where compromised.
Report the theft or loss.
Monitor accounts for suspicious activity.
SIM replacement restores the number, but account security requires broader action.
XX. What to Do When a Telco Refuses SIM Replacement
A telco may refuse replacement if:
The requester cannot prove identity.
The SIM is not registered to the requester.
The number is inactive or deactivated.
There is a fraud flag.
Documents are incomplete.
The SIM belongs to a corporate account.
There is a dispute over ownership.
The request is made by an unauthorized representative.
The telco’s retention period or policy no longer allows recovery.
Possible Actions
Ask for the specific reason for denial.
Request escalation to a supervisor or fraud team.
Submit additional proof of ownership.
Present the registered owner, if different.
Provide affidavit of loss and police report.
Update registration records if allowed.
File a written complaint with the telco.
Request a formal case or reference number.
Escalate to the NTC if the telco’s action appears improper.
Seek legal advice if the number is critical or linked to major losses.
XXI. What to Do If Someone Replaced Your SIM Without Permission
A victim should act immediately.
Step 1: Contact the Telco
Ask the telco to:
Confirm whether a replacement occurred.
Suspend the number.
Block further replacement.
Reverse or restore control if possible.
Preserve records of the replacement transaction.
Identify branch, date, time, and method of replacement, subject to legal process.
Tag the account as fraud-compromised.
Provide a complaint reference number.
Step 2: Contact Financial Institutions
Immediately notify:
Banks.
E-wallets.
Credit card issuers.
Loan apps.
Payment platforms.
Crypto exchanges.
Online marketplaces.
Request temporary freezes, password resets, fraud monitoring, and dispute processing.
Step 3: Secure Digital Accounts
Change passwords for:
Email.
Banking.
E-wallets.
Social media.
Messaging apps.
Cloud storage.
Work accounts.
Government portals.
Use an email account that the attacker does not control. Revoke active sessions and remove unknown devices.
Step 4: Preserve Evidence
Save:
No-service screenshots.
Telco notifications.
Bank alerts.
Unauthorized transaction records.
Password reset emails.
SMS or email alerts.
Case numbers.
Chat logs with telco or banks.
Screenshots from affected accounts.
Step 5: File Reports
Depending on the facts, file with:
PNP Anti-Cybercrime Group.
NBI Cybercrime Division.
Local police.
NTC.
NPC, if personal data was misused.
BSP, if financial institutions are involved.
Prosecutor’s Office for criminal complaint.
XXII. Remedies for Victims of SIM Swap Fraud
Possible remedies include:
Restoration of mobile number.
Blocking of fraudulent SIM.
Fraud investigation by telco.
Freezing or recovery of funds, if possible.
Bank or e-wallet dispute.
Criminal complaint.
Civil action for damages.
Data privacy complaint.
NTC complaint.
BSP complaint.
Complaint against involved insiders or money mules.
Recovery depends on speed, evidence, account tracing, and whether the stolen funds remain available.
XXIII. Evidence Needed in SIM Replacement Disputes
A victim should gather:
Government ID.
Proof that the number belongs to or is used by the victim.
SIM bed or original SIM card, if available.
Telco account records.
SIM registration confirmation.
Affidavit of loss, if applicable.
Police report or blotter.
Screenshots showing loss of signal.
Notifications of SIM change or account takeover.
Bank or e-wallet transaction records.
Emails showing password resets.
Telco complaint reference numbers.
Names of telco representatives spoken to.
Dates and times of reports.
Proof of financial losses.
Proof of linked accounts.
Affidavits from witnesses, if any.
For corporate SIMs, include corporate authorization documents, internal custody records, and proof of assigned user.
XXIV. Affidavit for SIM Replacement or SIM Swap Complaint
A victim may need an affidavit for telco, police, prosecutor, bank, or regulatory complaints.
A useful affidavit may state:
Personal details of the subscriber.
The mobile number involved.
How the subscriber acquired and used the SIM.
Whether the SIM was registered.
Date and circumstances of loss, theft, damage, or unauthorized replacement.
Discovery of no signal or suspicious activity.
Financial accounts linked to the number.
Unauthorized transactions or account takeovers.
Steps taken to report the incident.
Evidence attached.
Request for investigation, restoration, and legal action.
If financial losses occurred, the affidavit should include dates, amounts, transaction references, account names, and screenshots.
XXV. Complaints Against Telcos
A subscriber may complain if the telco:
Allowed unauthorized SIM replacement.
Failed to verify identity properly.
Failed to act promptly on a fraud report.
Improperly denied legitimate replacement.
Lost or mishandled documents.
Disclosed personal data.
Failed to provide reasonable customer assistance.
Wrongfully deactivated a number.
Failed to restore service without valid reason.
Possible venues include the telco’s internal complaint system, the NTC, the NPC for privacy issues, and courts for damages when legally justified.
Before escalating, the subscriber should request a written case number and preserve all communications.
XXVI. Complaints Against Banks or E-Wallets After SIM Swap
If a SIM swap led to financial loss, the subscriber may also need to complain against banks or e-wallets.
Issues may include:
Unauthorized transactions.
Failure to detect suspicious activity.
Failure to freeze account after timely report.
Weak authentication.
Improper denial of dispute.
Delayed investigation.
Failure to provide transaction details.
Possible remedies include internal dispute, BSP consumer assistance, criminal complaint against perpetrators, and civil action if warranted.
The outcome depends on the facts, including whether the customer shared OTPs, whether the institution followed security procedures, how quickly the loss was reported, and whether the transactions were truly unauthorized.
XXVII. SIM Replacement and Employment
Mobile numbers are often used in employment and business.
Legal issues arise when:
An employee uses a personal SIM for company accounts.
A company SIM is registered under an employee’s personal name.
A resigned employee keeps a company number.
A company number is linked to bank OTPs or customer accounts.
An employee replaces a company SIM without authority.
A former employee receives OTPs or customer messages.
Employers should avoid using personal SIMs for critical business access. If unavoidable, written agreements should clarify ownership, custody, return obligations, and account access after employment ends.
Employees should not retain, replace, or use company SIMs after separation unless authorized.
XXVIII. SIM Replacement and Estate or Family Disputes
Disputes may arise after death, separation, or family conflict.
Examples:
A deceased person’s SIM receives bank OTPs.
A spouse wants access to the other spouse’s number.
A parent wants to replace a child’s SIM.
Siblings dispute control of a family business number.
An heir wants access to accounts linked to the deceased’s number.
Legal concerns include privacy, estate law, banking secrecy, data protection, and unauthorized access.
A telco may require legal documents before allowing replacement or transfer. Accessing a deceased or another person’s accounts without authority can create legal risk.
XXIX. SIM Replacement and Number Recycling
Telcos may recycle inactive numbers after a period, subject to policy and regulation. This creates privacy and security risks because a new user of a recycled number may receive messages intended for the previous owner.
Subscribers should:
Update mobile numbers with banks and platforms before abandoning a SIM.
Remove old numbers from recovery settings.
Deactivate accounts linked to old numbers.
Avoid letting important SIMs expire.
Monitor critical numbers.
If a number has already been recycled, recovery may be difficult or impossible.
XXX. Practical Checklist for Legitimate SIM Replacement
Before going to the telco, prepare:
Valid government ID.
Old SIM card, if available.
SIM bed or packaging, if available.
Affidavit of loss, if lost or stolen.
Police report, if stolen or connected to fraud.
Proof of ownership or usage.
Postpaid account number or billing statement.
Authorization letter or SPA, if acting through a representative.
Corporate authorization, if business account.
Payment for replacement fee.
Backup access to email and financial accounts.
After replacement:
Test calls, texts, and mobile data.
Check banking and e-wallet alerts.
Change passwords if the SIM was lost or stolen.
Review account recovery settings.
Enable stronger authentication.
Report suspicious transactions immediately.
XXXI. Practical Checklist for Suspected Fraudulent SIM Replacement
If you suddenly lose signal and suspect SIM swap:
Contact telco immediately.
Ask to suspend the number.
Ask if a replacement was processed.
Request fraud investigation.
Contact banks and e-wallets.
Lock or freeze financial accounts.
Change email passwords.
Remove unknown devices.
Preserve alerts and screenshots.
File police or cybercrime report.
File complaints with NTC, NPC, or BSP if appropriate.
Execute affidavit of unauthorized SIM replacement.
Monitor accounts for further suspicious activity.
XXXII. Best Practices for Subscribers
Use strong, unique passwords.
Never share OTPs.
Avoid making SMS OTP the only recovery method.
Use authenticator apps where possible.
Keep SIM registration information updated.
Do not lend or sell registered SIMs casually.
Report lost SIMs immediately.
Do not send IDs through unofficial channels.
Keep proof of SIM ownership.
Maintain backup recovery options.
Use transaction alerts.
Set lower transaction limits where appropriate.
Avoid linking all critical accounts to one number.
Keep important SIMs active.
For high-risk accounts, use stronger authentication than SMS OTP.
XXXIII. Best Practices for Businesses
Maintain a SIM registry.
Identify the registered owner of every company number.
Use corporate accounts rather than employee-owned numbers.
Limit who can request replacements.
Require written approvals.
Use maker-checker controls for financial accounts.
Avoid using SMS OTP alone for high-value transactions.
Recover SIMs from departing employees.
Update passwords and recovery numbers during offboarding.
Keep telco account managers informed of authorized signatories.
Train staff against SIM swap and phishing.
Audit numbers linked to banking, payroll, logistics, and customer accounts.
Document every SIM replacement request.
XXXIV. Common Legal Questions
1. Can I replace a SIM registered under someone else’s name?
Usually, this is difficult unless the registered owner participates or the telco allows a lawful transfer or authorization process. The registered subscriber’s identity is central under the SIM registration framework.
2. Is an affidavit of loss always required?
Not always. It depends on the telco, the reason for replacement, and the risk level of the request. It is commonly required or helpful for lost or stolen SIMs.
3. Can a representative replace my SIM for me?
Possibly, but the telco may require authorization documents and IDs. For high-risk cases, personal appearance may be required.
4. Can I recover a deactivated SIM?
It depends on the reason for deactivation, how much time has passed, telco policy, and whether the number has been reassigned or recycled.
5. What if the telco gave my number to a fraudster?
You should immediately file a complaint with the telco, request restoration and preservation of records, notify banks and e-wallets, and consider complaints with the NTC, NPC, law enforcement, and courts depending on the damage.
6. Is SIM swap a crime?
Fraudulent SIM replacement itself may involve several crimes, especially if it uses false identity, fake documents, unauthorized access, account takeover, or financial theft.
7. Can I sue the telco?
A lawsuit may be possible if there is proof of negligence, breach of duty, causation, and damage. Regulatory and administrative complaints may also be available.
8. Can the bank refuse to refund SIM swap losses?
The bank or e-wallet may investigate and decide based on its rules, applicable regulations, and the facts. Refunds are more difficult if the customer disclosed OTPs or credentials, but not impossible in every case. Prompt reporting and evidence are important.
9. Can I post the suspected fraudster’s ID online?
This is risky. Publicly posting personal information or accusations may expose the victim to privacy or cyber libel complaints, especially if the identity is mistaken. Reporting to authorities is safer.
10. What if my old number is now used by someone else?
If the number was recycled, recovery may be difficult. Immediately update all accounts that still use the old number to prevent privacy and security problems.
XXXV. Key Takeaways
SIM card replacement in the Philippines involves more than replacing a small piece of plastic. Because a mobile number can function as a gateway to financial accounts, personal data, and digital identity, replacement requests must be handled carefully.
The key legal concerns are identity verification, SIM registration, data privacy, fraud prevention, unauthorized account access, and liability for SIM swap scams.
For legitimate subscribers, the usual requirements include valid ID, proof of registration or ownership, the old SIM if available, affidavit of loss if lost or stolen, and additional verification depending on the telco.
For victims of unauthorized SIM replacement, urgent action is necessary: contact the telco, suspend the number, notify banks and e-wallets, secure accounts, preserve evidence, and file appropriate complaints.
For businesses, SIM governance should be treated as part of cybersecurity and legal risk management. Corporate numbers used for OTPs, banking, customer communications, or account recovery should be registered, controlled, monitored, and replaced only through authorized procedures.
The safest approach is to treat a SIM card as a legal and digital identity asset—not merely as a telecommunications accessory.