I. Introduction
A “dummy account” on social media commonly refers to an account using a false name, false identity, fabricated personal details, or stolen photos. In the Philippine context, a dummy account becomes legally serious when it uses another person’s photographs without consent, especially when the account is used to impersonate, harass, scam, defame, threaten, stalk, sexually exploit, or deceive others.
Using another person’s photos online is not automatically a single offense under one law. Instead, it may trigger several overlapping areas of Philippine law, including privacy, identity misuse, cybercrime, defamation, harassment, intellectual property, violence against women and children, child protection laws, and platform rules. The legal consequences depend heavily on the facts: the age of the person in the photo, the purpose of the account, the captions used, the messages sent, whether private images were involved, whether money was solicited, whether sexual content was implied, and whether the victim suffered reputational, emotional, financial, or safety-related harm.
This article explains the key legal issues surrounding dummy social media accounts using another person’s photos under Philippine law.
II. What Is a Dummy Account?
A dummy account is not defined in a single, universal Philippine statute. In ordinary use, it refers to a social media profile that does not truthfully represent the person operating it. It may involve:
- A fake name.
- A fabricated identity.
- A stolen profile picture.
- Photos copied from another person’s account.
- A profile pretending to be someone else.
- A burner or anonymous account used to avoid accountability.
- An account created for harassment, scams, trolling, catfishing, or stalking.
A dummy account becomes more legally problematic when it uses another person’s photographs because photographs are linked to identity, reputation, privacy, and, in some cases, copyright.
III. Is It Illegal to Use Another Person’s Photos for a Dummy Account?
The answer is: it can be illegal, depending on how the photos are used.
Using someone’s photo without permission may violate rights even if the photo was publicly visible online. Public availability does not mean free legal permission to reuse the photo, especially for impersonation, deception, harassment, commercial gain, sexual exploitation, or defamatory purposes.
The following legal theories may apply:
- Violation of the right to privacy.
- Misuse of identity or likeness.
- Cybercrime-related offenses.
- Online libel or defamation.
- Harassment or unjust vexation.
- Identity theft or computer-related identity misuse.
- Fraud or estafa-related conduct.
- Violence against women and children, where applicable.
- Child protection violations, where minors are involved.
- Copyright infringement, depending on who owns the photo.
- Civil liability for damages.
IV. The Right to Privacy and Control Over One’s Image
Philippine law recognizes privacy as a protected right. The Constitution protects the right to privacy in several contexts, and the Civil Code also recognizes privacy-related civil actions.
A person’s photograph is closely connected to personal identity. Even if no obscene, defamatory, or fraudulent statement is made, the unauthorized use of someone’s photo may still be an invasion of privacy when it causes embarrassment, distress, reputational harm, or unwanted association.
Under the Civil Code, a person may seek damages when another person violates dignity, personality, privacy, or peace of mind. Relevant civil wrongs may include meddling with another’s private life, causing humiliation, or using another’s identity in a way that injures reputation or dignity.
A dummy account using another person’s face can therefore create civil liability, especially when the account gives the public the impression that the victim owns, endorses, or controls that account.
V. Identity Misuse and Impersonation
The most obvious legal issue is impersonation. If the dummy account presents itself as the person in the photos, the account may be considered a form of identity misuse.
The seriousness increases when the account:
- Uses the victim’s full name.
- Uses the victim’s school, workplace, location, or personal details.
- Sends messages pretending to be the victim.
- Solicits money or favors.
- Engages in romantic or sexual deception.
- Posts statements that appear to come from the victim.
- Harasses others while pretending to be the victim.
- Damages the victim’s reputation.
In the Philippines, identity-related misuse may fall under cybercrime laws when committed through computer systems or social media platforms. The Cybercrime Prevention Act may become relevant where there is computer-related identity misuse, online fraud, online libel, threats, or other offenses committed through information and communications technology.
VI. Cybercrime Issues
The Cybercrime Prevention Act of 2012, or Republic Act No. 10175, is one of the main laws involved when misconduct occurs through social media.
A dummy account using another person’s photos may potentially involve cybercrime when the account is used for:
- Online identity misuse.
- Online libel.
- Computer-related fraud.
- Cyber harassment or threats.
- Unauthorized access or account hacking.
- Distribution of harmful, defamatory, or private content.
- Other crimes committed through a computer system.
The law generally treats certain traditional crimes more seriously when committed through information and communications technology. Thus, if an act is already punishable under the Revised Penal Code or special laws, its commission online may result in cybercrime implications.
A. Computer-Related Identity Misuse
A dummy account that uses another person’s identifying information may be treated as a form of identity-related misuse if the account appropriates the victim’s identity in a deceptive or harmful manner. The more the account appears to pass itself off as the victim, the stronger the legal concern.
Using only a photo may already be troubling, but the case becomes stronger if combined with the victim’s name, address, contact details, school, workplace, family information, or other identifying data.
B. Online Libel
If the dummy account posts defamatory statements, captions, comments, or messages that injure a person’s reputation, online libel may be involved.
Online libel may arise when the account:
- Posts false statements about the victim.
- Attributes shameful, immoral, criminal, or dishonorable conduct to the victim.
- Uses the victim’s photo beside insulting or damaging captions.
- Makes it appear that the victim said or did something offensive.
- Publishes accusations that expose the victim to public hatred, contempt, or ridicule.
The use of a photo can intensify reputational harm because it visually identifies the victim.
C. Cyber Harassment and Threats
If the dummy account is used to threaten, intimidate, repeatedly message, shame, stalk, or publicly humiliate the victim, criminal and civil remedies may arise. The specific offense depends on the language used, the conduct involved, and the relationship between the parties.
Threats, coercive messages, extortion attempts, blackmail, doxxing, and repeated unwanted contact may trigger different provisions of criminal law.
VII. Defamation, Libel, and Damage to Reputation
A dummy account can be defamatory even when it does not directly say, “I am this person.” If the account uses the victim’s photo in a context that damages reputation, the victim may have a basis to complain.
Examples include:
- A fake account using a person’s photo to post sexual content.
- A fake dating profile suggesting the person is offering sexual services.
- A dummy account using someone’s face to insult others.
- A fake profile accusing the person of crimes.
- A meme page using someone’s photo with degrading captions.
- A fake account pretending that the person holds offensive political, religious, or social views.
- A profile using the victim’s image to scam people.
Libel generally requires publication, identification, defamatory imputation, and malice. In social media cases, publication is usually present because posts are visible or communicated to third parties. Identification may be shown by the use of the person’s photograph, name, or recognizable details.
VIII. Unjust Vexation, Alarms and Scandals, Grave Threats, and Other Penal Code Offenses
Not every harmful dummy account fits neatly into cyber libel or fraud. In some situations, provisions of the Revised Penal Code may be considered depending on the facts.
Possible offenses may include:
- Unjust vexation, where the conduct annoys, irritates, disturbs, or causes distress without lawful justification.
- Grave threats, where the dummy account threatens harm.
- Grave coercions, where the victim is forced to do or not do something.
- Alarms and scandals, depending on public disturbance or scandalous conduct.
- Slander by deed, where acts rather than words dishonor or shame a person.
- Estafa, where the account is used to deceive people and obtain money or property.
When these acts are committed through social media, cybercrime provisions may also be considered.
IX. Fraud and Scams Using Another Person’s Photos
A common use of dummy accounts is scamming. The account may use an attractive or trusted-looking person’s photo to gain confidence from victims.
Common examples include:
- Romance scams.
- Investment scams.
- Fake seller accounts.
- Fake donation drives.
- Fake emergency solicitations.
- Loan or job recruitment scams.
- Catfishing schemes.
- Marketplace fraud.
If the account uses another person’s photo to deceive third parties and obtain money, the operator may face criminal liability for fraud or estafa, and possibly computer-related fraud. The person whose photo was stolen may also be harmed because people may believe the victim participated in the scam.
In this situation, there may be two categories of victims:
- The person whose photo or identity was used.
- The people deceived into sending money or information.
X. Data Privacy Issues
The Data Privacy Act of 2012, or Republic Act No. 10173, protects personal information. A photograph of an identifiable person may be personal information because it can identify an individual.
However, not every private individual posting someone’s photo automatically falls under the same kind of data privacy liability as a company, organization, or personal information controller. The application of the Data Privacy Act depends on the circumstances, including whether the information was processed in a structured or systematic way, whether there was personal, household, journalistic, artistic, or other context, and whether exemptions apply.
Still, unauthorized collection, use, storage, disclosure, or sharing of someone’s image may raise privacy concerns. The National Privacy Commission may become relevant in cases involving misuse of personal data, especially where there is unauthorized processing, disclosure, or failure to protect personal information.
For a dummy account, data privacy issues are stronger when the account uses not only photos but also:
- Full name.
- Phone number.
- Address.
- School or workplace.
- Family details.
- Private messages.
- Government IDs.
- Sensitive personal information.
- Location data.
- Medical, financial, or sexual information.
XI. Copyright Issues: Who Owns the Photo?
There is a separate legal question: who owns the copyright in the photograph?
The person shown in the photo is not always the copyright owner. Usually, the photographer owns the copyright, unless there is an agreement, employment relationship, commissioned-work rule, or other legal basis that changes ownership.
This distinction is important:
- The person in the photo may complain about privacy, identity misuse, defamation, harassment, or reputational harm.
- The photographer or copyright owner may complain about unauthorized copying, reproduction, distribution, or display of the photo.
- In some cases, the victim may be both the subject and the photographer, such as when the stolen photo is a selfie.
Using a copyrighted photo without permission may amount to copyright infringement, especially when copied from someone’s social media account and reused as a profile picture, post, advertisement, or promotional material. Even if the dummy account does not pretend to be the victim, copying the photo may still violate copyright.
However, the most urgent concern in dummy account cases is often not copyright but identity misuse, harassment, defamation, or privacy invasion.
XII. Use of Photos from Public Social Media Accounts
A frequent misconception is that once a photo is posted publicly, anyone can use it.
That is incorrect.
A public social media post may allow people to view the photo, but it does not automatically authorize them to copy it, create a fake account with it, use it commercially, imply endorsement, harass the person, or impersonate the person.
Public availability affects expectations of privacy, but it does not eliminate all rights. The use, context, purpose, and resulting harm remain legally important.
For example:
- Viewing a public profile picture is different from copying it into a fake account.
- Sharing a public post with proper platform tools is different from saving and reposting the image as one’s own identity.
- Using a public photo in commentary may be different from using it for deception.
- Using a public photo for a scam or sexualized profile is far more serious.
XIII. Dummy Accounts Involving Women: Possible VAWC and Gender-Based Online Abuse Issues
If the victim is a woman and the dummy account is used by a current or former intimate partner, spouse, boyfriend, live-in partner, dating partner, or person with whom she has or had a sexual or romantic relationship, Republic Act No. 9262, the Anti-Violence Against Women and Their Children Act, may be relevant.
VAWC may cover psychological violence, harassment, threats, humiliation, controlling behavior, and acts causing emotional suffering, depending on the facts and relationship.
Online abuse involving a woman’s photos may also implicate gender-based sexual harassment laws when the account sexualizes, humiliates, threatens, or targets the victim because of sex or gender.
Examples include:
- Creating a fake account portraying the woman as sexually available.
- Posting her photo with obscene captions.
- Threatening to release private images.
- Using her image to shame or control her.
- Contacting her friends, family, or workplace through fake accounts.
- Creating repeated dummy accounts after being blocked.
If intimate images are involved, the case may become even more serious.
XIV. Intimate Images, Voyeurism, and Sexualized Fake Accounts
A dummy account using ordinary photos is already legally concerning. A dummy account using intimate, sexual, nude, or private images is much more serious.
Possible laws include:
- The Anti-Photo and Video Voyeurism Act.
- Cybercrime provisions.
- VAWC, if the relationship and acts fit.
- Safe Spaces Act provisions, depending on the conduct.
- Child protection laws, if the person depicted is a minor.
- Civil damages for privacy invasion and emotional distress.
Even threatening to post or spread intimate images may have legal consequences. A dummy account used to blackmail or shame someone through sexual images may involve extortion, coercion, threats, or gender-based online abuse.
XV. When the Person in the Photo Is a Minor
If the person whose photos are used is a child, the legal risks become much heavier.
A minor’s photo used in a dummy account may involve child protection concerns, especially when the account:
- Sexualizes the child.
- Uses the child’s image for grooming.
- Pretends to be the child to communicate with others.
- Solicits sexual conversations.
- Invites strangers to contact the child.
- Posts school, address, or location details.
- Uses the child’s image in exploitative content.
- Shares private or humiliating images.
Laws protecting children may apply, including child abuse laws, anti-child pornography or online sexual abuse and exploitation laws, cybercrime laws, and special protection statutes. The involvement of a minor can also justify urgent reporting to law enforcement, the platform, the school, parents or guardians, and child protection authorities.
XVI. Doxxing and Safety Risks
A dummy account may go beyond using photos and begin posting personal information. This is often called doxxing.
Doxxing may include publishing:
- Home address.
- Phone number.
- Email address.
- School or workplace.
- Daily routine.
- Family members’ names.
- Vehicle information.
- Private messages.
- Medical or financial details.
- Location tags or real-time location.
Doxxing can expose the victim to stalking, harassment, identity theft, scams, physical danger, and reputational harm. Depending on the facts, doxxing may support claims for privacy violation, harassment, threats, coercion, cybercrime, or civil damages.
XVII. Catfishing and Emotional Harm
Catfishing occurs when a person uses a fake identity, often with another person’s photos, to create emotional or romantic relationships online. In Philippine law, catfishing itself is not always labeled as one specific crime, but the surrounding acts may be actionable.
Catfishing may become legally punishable when it involves:
- Soliciting money.
- Sexual exploitation.
- Blackmail.
- Threats.
- Use of minors’ photos.
- Defamation.
- Identity misuse.
- Emotional manipulation causing measurable harm.
- Use of private information.
- Repeated harassment.
The person whose photo was used may suffer reputational damage, while the person deceived by the catfish may suffer emotional or financial injury.
XVIII. Civil Liability and Damages
Even when criminal prosecution is uncertain, the victim may have a civil claim for damages.
Civil liability may include:
- Moral damages for mental anguish, embarrassment, social humiliation, wounded feelings, anxiety, or reputational injury.
- Exemplary damages if the conduct was wanton, fraudulent, oppressive, or malicious.
- Actual damages if the victim suffered measurable financial loss.
- Attorney’s fees, where allowed.
- Injunctive relief to stop continued use or publication.
A civil case may be considered when the victim wants compensation, removal of content, recognition of harm, or accountability beyond platform reporting.
XIX. Evidence: What the Victim Should Preserve
Evidence is crucial. Dummy accounts can be deleted quickly, usernames can be changed, and posts can disappear.
The victim should preserve:
- Screenshots of the profile page.
- Screenshots of the username, display name, profile URL, and account ID if visible.
- Screenshots of all stolen photos used.
- Screenshots of posts, captions, comments, stories, reels, videos, and messages.
- Dates and times of discovery.
- Links to the account and specific posts.
- Names of people who saw or interacted with the account.
- Messages from people who were deceived by the account.
- Proof that the photos belong to the victim or were taken from the victim’s account.
- Any threats, demands, solicitations, or defamatory statements.
- Evidence of emotional, reputational, or financial damage.
- Reports made to the platform.
- Responses from the platform.
- Police blotter or complaint documents, if any.
Screenshots should ideally include the full screen, visible URL, date, time, and account identifiers. Screen recording may also help show navigation from the profile to posts or messages.
For stronger evidentiary value, the victim may consider having key screenshots notarized, preserved through affidavits, or documented with assistance from counsel or investigators.
XX. Reporting the Dummy Account to the Platform
Social media platforms usually prohibit impersonation, identity misuse, harassment, scams, and unauthorized use of images. Victims may report the account directly through platform tools.
Common grounds for reporting include:
- Pretending to be me.
- Pretending to be someone I know.
- Using my photos without permission.
- Harassment or bullying.
- Scam or fraud.
- Sexual exploitation.
- Sharing private images.
- Child safety issue.
- Hate or abusive content.
- Fake account.
Platform reporting can lead to takedown, account suspension, content removal, or restrictions. However, platform removal is not the same as legal accountability. If the conduct is serious, evidence should be preserved before filing the report because the account may disappear.
XXI. Reporting to Authorities in the Philippines
A victim may consider reporting to appropriate authorities depending on the seriousness of the case.
Possible offices include:
- The Philippine National Police Anti-Cybercrime Group.
- The National Bureau of Investigation Cybercrime Division.
- The barangay or local police for blotter purposes, depending on the incident.
- The prosecutor’s office for criminal complaint evaluation.
- The National Privacy Commission for data privacy-related concerns.
- The Department of Justice or cybercrime-related channels, depending on the case.
- School, workplace, or child protection authorities when the victim is a student, employee, or minor.
For urgent threats, extortion, stalking, child exploitation, or intimate-image abuse, the matter should be treated as urgent.
XXII. The Role of a Police Blotter
A police blotter does not automatically mean a criminal case has been filed. It is usually a record of an incident. It may help establish that the victim promptly reported the matter, but further action is usually needed for investigation or prosecution.
A blotter may be useful when:
- The victim wants an official record.
- The dummy account is harassing the victim.
- Threats were made.
- The victim fears escalation.
- The victim needs documentation for school, work, or platform reporting.
- The victim intends to file a formal complaint later.
For cyber-related cases, specialized cybercrime units are often more appropriate because they are better equipped to handle digital evidence.
XXIII. Can the Victim Find Out Who Created the Dummy Account?
Identifying the person behind a dummy account can be difficult. The account may use fake emails, VPNs, prepaid SIMs, public Wi-Fi, or stolen devices. Still, investigators may be able to pursue leads through:
- Account recovery data.
- Login records.
- IP logs.
- Email addresses or phone numbers linked to the account.
- Payment trails, if ads or boosts were purchased.
- Messages sent by the account.
- Reused usernames.
- Linguistic patterns.
- Connections to known persons.
- Metadata from uploaded images, where available.
- Witnesses who interacted with the account.
- Platform cooperation through lawful requests.
Private individuals should avoid illegal hacking, unauthorized access, or retaliatory doxxing. Attempting to hack the dummy account may expose the victim to legal risk.
XXIV. Demand Letters and Cease-and-Desist Notices
If the suspect is known or reasonably suspected, a lawyer may send a demand letter or cease-and-desist notice.
Such a letter may demand that the person:
- Delete the dummy account.
- Remove all photos.
- Stop impersonating the victim.
- Stop contacting the victim.
- Preserve evidence.
- Issue a correction or apology.
- Pay damages, where appropriate.
- Undertake not to repeat the conduct.
A demand letter can sometimes resolve the matter quickly. However, in cases involving threats, sexual exploitation, minors, extortion, or serious fraud, immediate reporting to authorities may be more appropriate than informal negotiation.
XXV. Possible Defenses Raised by the Accused
A person accused of creating or operating a dummy account may raise defenses such as:
- The account was parody or satire.
- The photo was publicly available.
- There was no intent to impersonate.
- There was no damage.
- The accused did not create the account.
- The account was hacked.
- The photo was used for commentary or criticism.
- The victim consented.
- The accused believed the image was free to use.
- The post was not defamatory.
- The account did not identify the victim.
These defenses are fact-sensitive. “The photo was public” is not a complete defense to impersonation, harassment, defamation, fraud, or privacy invasion. “It was only a joke” may also fail if the act caused real harm or involved threats, sexualization, minors, scams, or reputational damage.
XXVI. Parody, Satire, and Fan Accounts
Not all accounts using another person’s image are automatically unlawful. Some may be fan pages, commentary pages, parody pages, or news-related accounts. However, these accounts should avoid misleading the public into thinking they are the person depicted.
Risk increases when the account:
- Does not clearly state that it is a parody or fan account.
- Uses the person’s real name and photo as if official.
- Sends private messages pretending to be the person.
- Solicits money.
- Posts defamatory content.
- Harasses the person.
- Uses private or intimate images.
- Uses the image commercially without permission.
- Targets a private individual rather than a public figure.
- Causes confusion or reputational harm.
Public figures have less privacy in matters of legitimate public concern, but they do not lose all rights against impersonation, defamation, fraud, or malicious misuse of their image.
XXVII. Use of Artificial Intelligence and Edited Photos
Modern dummy accounts may use edited photos, deepfakes, AI-generated images, or face swaps. This may worsen the legal implications.
A fake account may:
- Alter a person’s photo to make it sexual.
- Create fake nude images.
- Place the person’s face on another body.
- Generate false screenshots.
- Use AI voice or video to impersonate the victim.
- Create fake evidence of statements or conduct.
Even if the image is “fake,” it can still harm reputation, privacy, dignity, and safety. If the edited image is sexual, defamatory, threatening, or used for extortion, legal remedies may be available.
XXVIII. Workplace and School Consequences
Dummy accounts can affect schools and workplaces. If a student or employee creates an account using another person’s photo, the conduct may violate institutional rules even before or aside from criminal liability.
Possible consequences include:
- School disciplinary action.
- Workplace investigation.
- Termination or suspension, depending on rules and due process.
- Administrative sanctions.
- Cyberbullying intervention.
- Child protection procedures in schools.
- Anti-sexual harassment procedures.
- Data privacy reporting obligations for organizations.
Schools and employers must still observe due process and avoid public shaming of either complainant or accused.
XXIX. Remedies Available to the Victim
The victim’s remedies may include both immediate and legal steps.
A. Immediate Non-Court Remedies
- Preserve evidence.
- Report the account to the platform.
- Ask trusted friends to report the account.
- Warn close contacts not to interact with the account.
- Adjust privacy settings.
- Avoid engaging with the dummy account if it may escalate.
- Secure personal accounts with stronger passwords and two-factor authentication.
- Check whether other accounts or photos were copied.
- Document emotional, reputational, or financial harm.
B. Legal Remedies
- Police or cybercrime complaint.
- NBI cybercrime report.
- Criminal complaint before prosecutors.
- Civil action for damages.
- Data privacy complaint, where applicable.
- Demand letter or cease-and-desist letter.
- Protection-related remedies if threats, stalking, VAWC, or child safety issues are involved.
- School or workplace complaint if the perpetrator is connected to those institutions.
XXX. Practical Legal Assessment: Key Questions
To determine the likely legal consequences, these questions matter:
- Was the photo used without consent?
- Was the victim identifiable?
- Did the account use the victim’s name or other personal details?
- Did the account pretend to be the victim?
- Did the account message people?
- Did the account solicit money or favors?
- Did it post defamatory statements?
- Did it sexualize the victim?
- Was the victim a minor?
- Were intimate images involved?
- Were threats or blackmail made?
- Was the account used repeatedly after being reported?
- Was there emotional, reputational, financial, or safety-related harm?
- Can the operator be identified?
- Is there preserved evidence?
- Did the platform remove the content?
- Was the conduct connected to a relationship, workplace, school, or prior dispute?
The stronger the evidence of impersonation, malice, harm, fraud, harassment, or sexual exploitation, the stronger the possible legal case.
XXXI. Common Scenarios and Likely Legal Issues
Scenario 1: A fake account uses someone’s selfie as its profile picture but does not post anything.
Possible issues: privacy, identity misuse, platform impersonation policy, copyright if the photo was copied. Criminal liability may be harder to establish unless there is proof of impersonation, harm, malicious purpose, or other unlawful acts.
Scenario 2: A fake account uses the victim’s name and photo and messages friends asking for money.
Possible issues: fraud, estafa, computer-related fraud, identity misuse, cybercrime, civil damages, platform violation.
Scenario 3: A dummy dating profile uses a woman’s photo and says she is available for sexual services.
Possible issues: defamation, sexual harassment, gender-based online abuse, privacy violation, possible VAWC depending on the relationship, civil damages.
Scenario 4: A fake account uses a student’s photo to bully classmates.
Possible issues: cyberbullying, school discipline, unjust vexation, defamation, harassment, civil liability, possible child protection concerns if minors are involved.
Scenario 5: A dummy account posts edited nude images of the victim.
Possible issues: privacy violation, sexual harassment, voyeurism-related concerns, cybercrime, defamation, civil damages, possible VAWC, and child exploitation laws if the victim is a minor.
Scenario 6: A parody page uses a public official’s photo with clear satire.
Possible issues: less likely to be unlawful if it is clearly parody and does not defame, threaten, scam, or mislead. But false statements of fact, impersonation, or malicious reputational attacks may still create liability.
Scenario 7: A person uses another person’s photos for catfishing but does not ask for money.
Possible issues: identity misuse, privacy violation, emotional harm, platform violation. Criminal liability depends on accompanying acts such as fraud, harassment, threats, sexual exploitation, or defamation.
XXXII. Liability of the Person Who Merely Shares or Promotes the Dummy Account
A person who did not create the dummy account may still create legal problems by helping spread it.
Liability may arise if someone:
- Shares defamatory posts.
- Encourages harassment.
- Reposts private or sexual images.
- Helps conceal the operator.
- Uses the account’s content to shame the victim.
- Participates in a scam.
- Knowingly benefits from the impersonation.
In online libel and privacy cases, republication can matter. A person should not assume that “I only shared it” is always a complete defense.
XXXIII. Responsibility of Social Media Platforms
Platforms generally have community standards prohibiting impersonation, scams, harassment, non-consensual intimate images, child exploitation, and other harmful conduct. They may remove accounts or content when reported.
However, platform liability is a complex matter. Platforms are not automatically liable for every fake account created by users. Their obligations may depend on their terms of service, applicable laws, notice, action taken after reports, data privacy obligations, and lawful requests from authorities.
For victims, the practical role of the platform is usually takedown, account suspension, preservation of records where possible, and cooperation with legal processes.
XXXIV. Importance of Intent
Intent is often important but not always decisive. A person may claim that the account was made as a joke, experiment, fan page, or anonymous profile. But intent may be inferred from conduct.
Bad intent may be shown by:
- Concealing identity.
- Using the victim’s name.
- Messaging people as the victim.
- Posting harmful captions.
- Continuing after being asked to stop.
- Deleting evidence after complaint.
- Creating multiple replacement accounts.
- Demanding money or favors.
- Threatening exposure.
- Targeting the victim’s family, workplace, or school.
Even if the creator claims there was no bad intent, civil liability may still arise if the conduct unlawfully caused damage.
XXXV. Jurisdiction and Venue Issues
Social media cases often involve people in different cities or countries. Philippine authorities may still act when the victim is in the Philippines, the offender is in the Philippines, the harm occurs in the Philippines, or Philippine law otherwise applies.
Jurisdiction can become complicated when:
- The platform is foreign.
- The suspect is overseas.
- The account used foreign servers.
- The victim and suspect live in different provinces.
- The account used anonymous tools.
- Evidence is stored by a foreign company.
These complications do not necessarily prevent action, but they can affect speed, evidence gathering, and enforcement.
XXXVI. Prescription Periods and Delay
Legal claims may be affected by prescription periods. The applicable period depends on the specific offense or civil action. Delay can also weaken evidence because accounts may be deleted, witnesses may forget details, and platform records may become harder to obtain.
For this reason, victims should preserve evidence immediately and seek legal guidance early, especially in serious cases involving threats, scams, minors, intimate images, or reputational harm.
XXXVII. What Not to Do
A victim should avoid actions that may worsen the situation or create legal exposure.
Avoid:
- Hacking the dummy account.
- Publicly accusing a suspect without evidence.
- Threatening violence.
- Posting the suspect’s private information.
- Retaliating with another fake account.
- Spreading the harmful content further.
- Deleting messages before saving evidence.
- Paying blackmailers without documenting the demand.
- Engaging emotionally with the dummy account.
- Assuming platform takedown is enough when serious crimes are involved.
The safer route is evidence preservation, reporting, and formal legal action where appropriate.
XXXVIII. Preventive Measures
People can reduce the risk of photo misuse, though not eliminate it completely.
Helpful precautions include:
- Limit public visibility of personal photos.
- Avoid posting high-resolution images publicly.
- Use privacy settings for albums and profile photos.
- Watermark professional photos where appropriate.
- Avoid posting sensitive location patterns.
- Search one’s name and images periodically.
- Use reverse image search tools.
- Enable two-factor authentication.
- Warn contacts about fake accounts.
- Report impersonation quickly.
- Keep personal and professional accounts separate.
- Be cautious with public friend lists and tagged photos.
For parents and guardians, extra caution is needed before posting children’s photos publicly.
XXXIX. Legal and Ethical Distinction: Anonymous Account vs. Impersonation Account
Not every anonymous account is illegal. A person may use a pseudonym for privacy, commentary, whistleblowing, or personal safety. The legal problem arises when anonymity becomes deception, abuse, or appropriation of another person’s identity.
A lawful anonymous account generally does not:
- Use another private person’s photo as its own identity.
- Pretend to be someone else.
- Defame or harass.
- Scam people.
- Publish private information.
- Use intimate images.
- Target minors.
- Mislead the public into harmful reliance.
The right to speak anonymously does not include the right to steal another person’s identity.
XL. Legal Consequences for the Creator of the Dummy Account
Depending on the facts, the creator or operator of the dummy account may face:
- Platform suspension or permanent ban.
- School or workplace discipline.
- Civil demand for damages.
- Criminal complaint.
- Cybercrime investigation.
- Search or disclosure requests through lawful process.
- Protective orders or restraining measures, where applicable.
- Liability for fraud if money was involved.
- Liability for defamation if reputation was harmed.
- More serious consequences if minors or intimate images were involved.
The fact that the account was created online does not make it harmless or consequence-free.
XLI. Conclusion
In the Philippine context, using another person’s photos for a social media dummy account can raise serious legal issues. The act may violate privacy, dignity, identity rights, copyright, cybercrime laws, defamation laws, anti-harassment protections, fraud laws, child protection statutes, and laws protecting women and victims of sexualized online abuse.
The key legal question is not merely whether the photo was copied. The more important questions are: Was the person identifiable? Was there consent? Was there impersonation? Was there harm? Was the account used to deceive, defame, harass, threaten, scam, sexualize, or exploit? Was the victim a minor? Were private or intimate images involved?
A dummy account using another person’s photos should never be dismissed as a harmless prank. In many cases, it can damage reputation, endanger safety, cause emotional distress, facilitate fraud, or expose the victim to public humiliation. Philippine law provides several possible remedies, but the strength of any case depends on prompt evidence preservation, clear documentation, and the specific facts surrounding the account’s creation and use.