Steps for Victims of Cyberbullying and Online Harassment (Philippine Context)
This is practical legal information for the Philippines. It’s not a substitute for advice from a lawyer who can assess your exact facts.
Quick-start: What to do in the first 24–48 hours
Prioritize safety. If there are threats to life, stalking, doxxing (leaking your home address), or extortion, treat it as an emergency and contact 911 and/or the nearest police station immediately. Consider relocating temporarily if credible harm is imminent.
Preserve evidence right away.
- Take full-page screenshots with visible URL, date/time, and profile/handle.
- Record the post URL, username, platform, date/time, and a short description in an incident log (template below).
- Save emails as
.eml
or.msg
files; export chat threads where possible. - Do not delete your own copies or accounts yet.
Lock down accounts. Change passwords, enable multi-factor authentication, review app logins, remove unknown devices, and check recovery emails/phones. Turn on “who can contact me”/“mention me” restrictions.
Report and block on-platform. Use the platform’s report/abuse tools (choose categories like harassment, hate, bullying, non-consensual imagery, impersonation).
Tell a trusted person. Especially for minors—inform a parent/guardian and the school right away. For adults—loop in a friend, HR (if workplace-related), or your organization’s security/legal point person.
Key Philippine Laws You Can Invoke (Plain-English Overview)
- Cybercrime Prevention Act of 2012 (RA 10175). Covers computer-related crimes, cyber libel, illegal access, data interference, computer-related identity theft, and more. Gives law enforcement tools (special cyber warrants) and some extraterritorial reach where the offender, victim, or the computer system is in the Philippines.
- Anti-Bullying Act of 2013 (RA 10627). Requires all K–12 schools to have anti-bullying policies, procedures, and sanctions for cyberbullying (bullying via the internet, texts, or social media).
- Safe Spaces Act (RA 11313). Penalizes gender-based online sexual harassment (e.g., misogynistic abuse, sexual threats, unwanted sexual remarks/photos, sexist slurs, stalking, doxxing with gender-based intent). It imposes duties on schools and workplaces to prevent and address it.
- Data Privacy Act of 2012 (RA 10173). Protects personal information; doxxing, malicious disclosure, and unauthorized processing can lead to complaints with the National Privacy Commission (NPC) and potential penalties.
- Anti-Photo and Video Voyeurism Act (RA 9995). Criminalizes sharing or publishing intimate images or videos without consent.
- Anti-OSAEC and Anti-CSAEM Act (RA 11930) and Anti-Child Pornography Act (RA 9775). Stronger penalties for online sexual abuse or exploitation of children; platforms and ISPs have duties to report and preserve data.
- VAWC (RA 9262). If the abuser is a current/former spouse, partner, or someone you have a dating/sexual relationship or common child with, harassment—including online—can be VAWC. You can seek Protection Orders (including Barangay Protection Orders) that prohibit contact.
- Revised Penal Code (RPC). Depending on facts: libel/defamation (written), slander (spoken), grave threats, grave coercion, unjust vexation, and related offenses may apply.
Note on time limits: Some offenses have short prescriptive periods (deadlines to file). Don’t delay. Speak to counsel or the prosecutor’s office promptly.
Choosing the Right Path(s)
You can pursue several tracks at once: (1) platform remedies, (2) school/workplace processes, (3) administrative complaints, (4) criminal action, (5) civil action, and in serious privacy or security cases, (6) special writs.
1) Platform and ISP/Telco Remedies
- Use the platform’s reporting and appeal channels; submit your evidence file and incident log.
- For impersonation, request verification/takedown and provide ID as required.
- For non-consensual intimate imagery (NCII), use the platform’s dedicated NCII reporting flow.
- For SMS/calls harassment, report the numbers to your telco and consider a number change. You may also complain to the NTC about persistent telecom-based abuse.
- Ask the platform to preserve data because a criminal case may follow (law enforcement can later serve a cybercrime warrant or request).
2) School or University Processes (Minors and Students)
- RA 10627 requires anti-bullying policies. Report to the class adviser/Guidance Office/Principal or the Student Discipline Office (HEIs).
- Schools should investigate, intervene, protect the child from retaliation, and coordinate with law enforcement when a crime may be involved.
- Parents/guardians should be notified, and counseling/support provided.
3) Workplace Processes (Employees)
- Under the Safe Spaces Act, employers must have policies, training, and a committee to receive and act on complaints of gender-based online sexual harassment.
- Report to HR or the designated committee. The employer should investigate, implement sanctions, and ensure non-retaliation.
- If the harasser is a client/vendor, ask for contractual escalation and removal from your account; your employer should protect you.
4) Administrative and Quasi-Judicial Complaints
- National Privacy Commission (NPC) (Data Privacy Act): For doxxing, malicious disclosure, unauthorized processing. Relief can include cease-and-desist directions and coordination with other agencies.
- Civil Service Commission/DOLE: If harassment involves government or private workplaces (policy enforcement and employer accountability).
- DepEd/CHED: Oversight on school compliance for bullying/harassment protocols.
- Women and Children Protection programs (DSWD/PNP) for minors and survivors.
5) Criminal Action
Typical offenses raised in online abuse cases:
- Cyber libel (online defamation)
- Grave threats (threats to harm/kill)
- Grave coercion (forcing you to do something through violence/intimidation)
- Unjust vexation (annoying acts without justification; fact-specific)
- Identity theft/computer-related forgery/fraud (account takeovers, fake profiles that cause damage)
- NCII / Voyeurism offenses (non-consensual intimate images)
- VAWC (if intimate partner/former partner)
- Child protection crimes (if the victim is a minor)
Where to file:
- PNP Anti-Cybercrime Group (ACG) or the NBI Cybercrime Division for investigation.
- Prosecutor’s Office (City/Provincial/National) for Complaint-Affidavit filing (with evidence). The prosecutor conducts preliminary investigation and may file an Information in court if probable cause exists.
What to bring:
- Complaint-Affidavit (narrative of facts), witness affidavits, and evidence (screenshots with URLs/timestamps, exported chats, email headers, device seizure reports if any).
- Incident log and an index of evidence.
- Government-issued ID, and for minors, parent/guardian plus birth certificate copy.
Law enforcement tools:
- Investigators may apply for cybercrime warrants (e.g., to disclose, intercept, or search/seize/examine computer data). These are court-issued and time-bound.
Venue & jurisdiction tips:
- Special venue rules apply (e.g., for libel-type offenses). Consult a lawyer to choose the correct venue to avoid dismissal.
- Cybercrime law allows limited extraterritorial jurisdiction where Philippine interests, citizens, or systems are involved—useful if the harasser is abroad.
6) Civil Action and Injunctive Relief
- You may sue for damages based on the Civil Code (e.g., Articles 19, 20, 21 on human relations; 26 on privacy/dignity; 32/33 for certain torts; 2219 for moral damages).
- In clear cases (e.g., NCII, stalking with real risk, doxxing), ask your counsel about temporary restraining orders (TROs) or preliminary injunctions to stop ongoing harm.
- Writ of Habeas Data (Supreme Court rule): If your privacy in life, liberty, or security is violated by data collection/processing, you can petition for deletion, blocking, or updating of personal data and for orders to cease harmful processing.
- Writ of Amparo: If there are threats to life, liberty, or security, seek protective relief (production orders, protection orders, etc.). This is extraordinary relief, used for serious cases.
Evidence: How to Make It Court-Ready
Screenshots the right way
- Capture the entire screen including URL bar, date/time, and profile link.
- For long threads, capture in sequence, with overlapping frames.
- Export native files when possible (e.g., PDF export of chats;
.eml
emails; platform data downloads).
Authentication & chain of custody
- Keep originals; save to read-only media (USB/drive).
- Maintain a chain-of-custody log (who handled the file, when, and why).
- Avoid editing images. If you must annotate, keep an unaltered original and a separate annotated copy.
Metadata & headers
- Save email headers; note IPs if visible.
- Keep platform notification emails you receive (they help with timestamps).
Avoid illegal recordings
- Do not secretly record private calls or voice chats without consent; wiretapping laws are strict.
- Text messages, emails, and DMs sent to you can be saved and used; they are not “wiretapping.”
Witnesses
- Ask witnesses who saw posts to execute Sworn Statements (with links and dates they observed).
Special Scenarios & Tailored Steps
A) Minors (Under 18)
- Tell a parent/guardian and the school immediately.
- Use the school’s anti-bullying process; request safety measures (classroom separation, supervision, counseling).
- If the content is sexual or exploitative, involve PNP/NBI immediately under RA 11930/RA 9775.
- Avoid engaging with the harasser; adults should lead all communications.
B) Non-Consensual Intimate Images (NCII)
- Report on-platform using the NCII form; request hash-matching takedowns.
- File a criminal complaint (RA 9995 and/or cybercrime law).
- Consider a TRO/injunction and, if an intimate partner was involved, a Protection Order under RA 9262.
C) Doxxing (Publishing Your Personal Data)
- Collect the posts and where the data came from.
- File a complaint with the NPC (Data Privacy Act).
- Consider criminal/civil cases depending on context (threats, coercion, defamation).
- Update your digital footprint (remove public listings; change exposed credentials).
D) Impersonation / Account Takeover
- Recover your account, enable MFA, and notify contacts of the impostor.
- Report the fake account for takedown and ask for preservation of backend logs.
- Criminal complaint for identity theft/computer-related offenses may be appropriate.
E) Intimate Partner / Former Partner
- Consider VAWC (RA 9262) and seek Protection Orders (Barangay, Temporary, Permanent).
- Combine with cybercrime and voyeurism/NCII charges as applicable.
F) Cross-Border Harassment
- Preserve evidence; file with PNP/NBI. Your case may rely on MLAT or platform cooperation.
- The cybercrime law allows some extraterritorial reach; prosecutors can advise on feasibility.
School & Workplace Checklists
For schools (RA 10627):
- Written complaint to adviser/Guidance/Principal.
- Ask for: (1) investigation, (2) protection from retaliation, (3) counseling, (4) disciplinary action, (5) law-enforcement referral if necessary.
- Request written updates and a copy of the resolution.
For workplaces (RA 11313):
- File with HR/Committee; include evidence.
- Ask for interim measures (separation, no-contact directives, schedule changes).
- Request a written finding and sanctions; escalate to DOLE/CSC if policies are not enforced.
Costs, Legal Aid, and Support
- Public Attorney’s Office (PAO): Free criminal/civil representation for qualified indigent persons.
- IBP Legal Aid Clinics: Many local IBP chapters offer free/low-cost consultations.
- Counseling & mental health: Seek support from DOH-accredited services or your LGU’s social welfare office, especially for minors and trauma cases.
Practical Do’s and Don’ts
Do:
- Keep calm, methodical records.
- Act quickly—both for takedowns and for legal deadlines.
- Tell someone and, for minors, involve adults immediately.
Don’t:
- Retaliate or doxx back (you could face liability).
- Negotiate alone with extortionists; involve law enforcement.
- Secretly record private calls.
- Delete your copies of evidence (even if platforms remove posts).
Templates (Copy, then fill in your details)
1) Incident Log (for your records)
INCIDENT LOG – CYBERBULLYING / ONLINE HARASSMENT
Victim: [Name, age if minor, contact]
Date created: [YYYY-MM-DD]
#1
Date/time observed: [YYYY-MM-DD HH:MM]
Platform/Channel: [e.g., Facebook / Instagram DM / SMS]
URL/Handle/Number: [paste link or number]
What happened (one sentence): [e.g., posted my home address + threats]
Screenshots saved: [Y/N] Filenames: [e.g., 2025-09-15-IG-1.png]
Witnesses: [names/contact]
Reported to platform: [Y/N, date]
Other actions: [blocked, changed settings]
#2
...
2) Platform Report (takedown)
Subject: Report of Cyberbullying/Harassment – [Your Handle] – Request for Removal and Data Preservation
To [Platform Safety/Support Team],
I am reporting [cyberbullying/harassment/NCII/impersonation] by user [@handle or URL] against me, [full name/username].
Representative examples:
- [URL 1], posted on [date/time]
- [URL 2], posted on [date/time]
The content violates your community standards on [bullying/harassment/sexual exploitation/impersonation].
Please remove it and **preserve relevant logs and metadata** for potential legal proceedings.
Attached: screenshots (with timestamps/URLs) and a brief incident log.
Thank you,
[Name], [email], [link to your profile]
3) Complaint-Affidavit (skeleton for the Prosecutor’s Office)
(Have a lawyer review before filing.)
REPUBLIC OF THE PHILIPPINES )
CITY/PROVINCE OF _________ ) S.S.
COMPLAINT–AFFIDAVIT
I, [Name], [age], [civil status], [address], after having been duly sworn, depose and state:
1. I am the victim of [cyber libel/grave threats/NCII/doxxing/etc.] committed by [Respondent’s name/unknown handle] using [platform/number], as follows.
2. On [date/time], [narrate facts in chronological order; cite specific URLs, posts, messages, threats].
3. The acts caused me [fear, emotional distress, reputational harm, etc.]. I attach the following evidence:
- Annex “A”: Incident Log
- Annex “B”: Screenshots with URLs and timestamps
- Annex “C”: Email/chat exports / email headers
- Annex “D”: [Medical/psychological or other supporting documents, if any]
4. I respectfully request that charges be filed for violation of [cite laws believed applicable], and that appropriate processes be undertaken.
I declare under oath that the foregoing is true and correct.
[Signature]
[Name]
SUBSCRIBED AND SWORN to before me this [date] at [city/province].
[Prosecutor/Notary]
FAQ
Is “cyberbullying” a standalone crime for adults? Not as a single label. Conduct is typically charged under cyber libel, threats, coercion, voyeurism/NCII, data privacy violations, VAWC, or Safe Spaces Act offenses.
Can I file if the harasser is overseas? Often yes, especially if you are a Filipino victim or the content/computer systems affected are here. Feasibility depends on facts and cooperation mechanisms—file with PNP/NBI and consult the prosecutor.
Should I confront the harasser? Usually no. It can escalate risk and harm your case. Let formal processes work.
How long do I have to file? It varies by offense—and can be short. Consult promptly to avoid missing deadlines.
Can I get the court to order content removal? Courts can issue injunctive relief in appropriate cases (especially NCII and threats), and writs (Habeas Data/Amparo) exist for privacy/security. Your lawyer can assess the fit.
A practical roadmap (one page)
- Secure & document → lock accounts; start an incident log; capture evidence properly.
- Report/takedown → platform reports; ask for data preservation.
- Choose paths → school/work (if applicable); NPC (privacy); PNP/NBI + Prosecutor (criminal); civil suit and/or writs for urgent relief.
- Protection → BPO/Protection Orders (if intimate partner); safety planning; mental health support.
- Follow through → keep copies, attend hearings, avoid public commentary that could complicate the case.
If you want, I can adapt this into a printable checklist, or tailor the templates to your specific situation (student, employee, NCII, threats, doxxing, or partner-related).