Unauthorized Loan Application Using Another Person’s Name

I. Introduction

An unauthorized loan application using another person’s name is a serious legal matter in the Philippines. It may involve identity theft, falsification, fraud, estafa, unauthorized processing of personal information, cybercrime, data privacy violations, harassment by lenders, collection abuse, and damage to the victim’s credit reputation.

The situation commonly happens when a person’s name, phone number, government ID, selfie, address, employment details, bank account, e-wallet account, contact list, or digital credentials are used to apply for a loan without consent. The victim may discover the problem only after receiving collection calls, demand letters, text threats, online lending app harassment, credit record issues, or notices from banks, financing companies, lending companies, or collection agencies.

The most important legal principle is this: a person is generally not liable for a loan they did not apply for, authorize, receive, or benefit from. But the victim must act quickly to dispute the loan, preserve evidence, report identity misuse, and prevent further harm.


II. Common Scenarios

Unauthorized loan applications may occur in many ways:

Scenario Description
Stolen ID loan Someone uses the victim’s government ID to apply for a loan
Online lending app fraud A person uses the victim’s phone, contacts, photos, or ID in a loan app
Family member misuse A relative applies for a loan using the victim’s name
Employer or co-worker misuse Workplace documents are used without permission
SIM or phone takeover Scammer uses a victim’s phone number or OTP access
Fake signature loan Loan documents are signed using forged signatures
E-wallet or bank-linked loan Loan proceeds are sent to another person’s account
Buy-now-pay-later fraud Victim’s identity is used for installment purchases
Credit card or cash loan fraud Victim is listed as borrower without consent
Guarantor fraud Victim is made co-maker, guarantor, or reference without authorization
Data leak misuse Personal data from forms, IDs, or online accounts is used for lending fraud

The legal remedies depend on who applied, what documents were used, how the lender verified the application, where the proceeds went, and whether digital platforms were involved.


III. Key Legal Issues

An unauthorized loan application raises several questions:

  1. Was the victim’s identity used without consent?
  2. Was a signature forged?
  3. Were government IDs or documents falsified?
  4. Was the application submitted online?
  5. Was a selfie, OTP, password, or device used?
  6. Did the victim receive any loan proceeds?
  7. Did the victim benefit from the loan?
  8. Did the lender conduct proper verification?
  9. Is the collector harassing the victim?
  10. Was personal data processed lawfully?
  11. Is the victim’s credit record affected?
  12. Is the wrongdoer known?
  13. Is the lender legitimate or an illegal lending app?
  14. Are there threats, public shaming, or contact list harassment?

These facts determine the proper civil, criminal, administrative, and data privacy remedies.


IV. General Rule: No Consent, No Loan Obligation

A loan is a contract. Consent is essential. If a person did not consent, did not sign, did not authorize a representative, did not receive proceeds, and did not benefit from the loan, there is generally no valid loan obligation against that person.

However, the victim may still suffer practical problems if the lender’s records show the victim as borrower. That is why the victim should dispute the loan in writing and demand correction of records.

A victim should not simply ignore collection notices. Silence may allow the lender or collector to continue reporting, calling, or escalating.


V. Difference Between Borrower, Co-Maker, Guarantor, Reference, and Emergency Contact

Unauthorized loan issues often involve confusion over a person’s role.

Role Legal Effect
Borrower Person primarily liable for loan
Co-borrower Person jointly liable as borrower
Co-maker Person who signs and undertakes liability with borrower
Guarantor Person who answers for debt under guarantee rules
Reference Person named for contact or verification, not automatically liable
Emergency contact Person to contact, not automatically liable
Employer contact Verification contact, not automatically liable

A person listed as a reference or emergency contact does not automatically become liable for the loan. Liability generally requires consent and a valid undertaking.

Online lenders and collectors sometimes pressure references as if they are debtors. This is improper if the reference did not sign or guarantee the loan.


VI. Unauthorized Use as Principal Borrower

If the loan was applied for in the victim’s name, the victim should immediately dispute the debt.

The victim should ask the lender to provide:

  • copy of loan application;
  • copy of signed promissory note or loan agreement;
  • government ID submitted;
  • selfie or liveness verification record;
  • phone number and email used;
  • IP address or device data, where available;
  • bank or e-wallet account where proceeds were released;
  • disbursement receipt;
  • verification call recording, if any;
  • consent records;
  • date and time of application;
  • collector assignment details;
  • data source used.

If the lender cannot prove that the victim applied, consented, or received the proceeds, it should not treat the victim as debtor.


VII. Unauthorized Use as Co-Maker or Guarantor

A person cannot validly be made a co-maker or guarantor without consent. If the signature was forged or digital consent was fabricated, the victim should deny liability and demand removal from the loan.

A co-maker or guarantor undertaking is serious. Lenders must be able to show that the person knowingly and voluntarily accepted that obligation.

If a borrower merely listed someone’s name and phone number, that does not make the listed person liable.


VIII. Unauthorized Use as Character Reference

A lender may contact a reference for verification, but the reference is not the borrower. The lender or collector should not:

  • demand payment from the reference;
  • threaten the reference;
  • shame the reference;
  • repeatedly harass the reference;
  • disclose unnecessary loan details;
  • accuse the reference of hiding the borrower;
  • post the reference’s name online;
  • contact the reference’s employer or relatives abusively.

A reference may complain if personal data was used without consent or if collection practices become abusive.


IX. Possible Crimes

An unauthorized loan application may involve several crimes, depending on facts.

A. Identity Theft

If another person used the victim’s personal identity, personal information, or credentials to obtain a loan, identity theft or related cybercrime concepts may apply, especially if done through digital systems.

B. Estafa

If the wrongdoer deceived the lender or victim and obtained money or credit through fraud, estafa may apply. The lender may be the direct party defrauded, but the named victim may also suffer damage through identity misuse.

C. Falsification

If signatures, IDs, certificates, payslips, employment records, bank statements, or other documents were forged or altered, falsification may apply.

D. Use of Falsified Documents

Even a person who did not personally falsify a document may be liable if they knowingly used it.

E. Computer-Related Fraud

If the application was made through an app, website, email, or other digital system using fraudulent data, cybercrime-related liability may arise.

F. Unauthorized Access

If the wrongdoer accessed the victim’s account, phone, email, e-wallet, bank app, or digital wallet without permission, unauthorized access or related offenses may arise.

G. Grave Coercion, Threats, or Harassment

If the wrongdoer or collector uses threats, intimidation, or coercion, additional offenses may be involved.

H. Data Privacy Violations

Unauthorized processing, disclosure, or misuse of personal information may violate data privacy law.


X. Identity Theft in Loan Applications

Identity theft in lending may involve:

  • using another person’s name;
  • using another person’s ID;
  • taking a photo of someone’s ID without consent;
  • submitting another person’s selfie or edited photo;
  • using another person’s phone number;
  • intercepting OTPs;
  • using another person’s email;
  • using another person’s address and employment details;
  • using a fake authorization;
  • creating an account using another person’s personal data.

Victims should treat this as both a financial and identity-security problem.


XI. Falsification Issues

Falsification may occur when the loan application includes:

  • forged signature;
  • fake promissory note;
  • altered ID;
  • fake certificate of employment;
  • fake payslip;
  • fake utility bill;
  • fake bank statement;
  • forged authorization letter;
  • false notarial document;
  • manipulated selfie or image;
  • fake consent form.

If a victim sees a document bearing a forged signature, the victim should preserve a copy and consider filing a complaint.


XII. Estafa Against the Lender or Financing Company

Where a fraudster uses another person’s identity to obtain loan proceeds, the lender may be the party directly defrauded because it released money based on false information.

However, the named victim also has a legal interest because their identity, reputation, credit standing, and privacy were harmed. The victim may report the matter and ask the lender to file or join complaints against the wrongdoer.

If the lender continues collecting from the victim despite clear evidence of identity theft, the victim may have remedies against the lender or collector.


XIII. Data Privacy Issues

Loan applications involve personal information and sometimes sensitive personal information, such as government ID numbers, financial information, biometrics, contact lists, employment data, and location data.

Data privacy issues may include:

  1. use of personal data without consent;
  2. excessive collection of contact lists;
  3. disclosure of debt to third persons;
  4. harassment of contacts;
  5. publication of the victim’s name or photo;
  6. failure to secure personal data;
  7. refusal to correct false records;
  8. processing data despite dispute;
  9. using personal data obtained from another purpose;
  10. inadequate verification by lender.

The victim may file a complaint with the proper privacy authority when personal data is misused or unlawfully disclosed.


XIV. Online Lending Apps and Contact List Harassment

Some online lending apps access or misuse phone contact lists. They may send messages to relatives, friends, employers, and co-workers accusing the victim of nonpayment.

In unauthorized loan cases, this is especially harmful because the victim did not borrow the money.

Improper collection practices may include:

  • public shaming;
  • threats of arrest;
  • threats to post the victim’s photo;
  • calling contacts repeatedly;
  • telling employers that the victim is a fraudster;
  • sending edited photos;
  • using abusive language;
  • disclosing debt details to third persons;
  • pretending to be police or lawyers;
  • using fake subpoenas or fake warrants.

Victims should screenshot all messages and report the conduct.


XV. What the Victim Should Do Immediately

A victim should act quickly.

Step 1: Do Not Admit the Debt

Do not say, “I will pay just to stop this.” Payment may be interpreted as acknowledgment. State clearly that the loan is disputed and unauthorized.

Step 2: Demand Documents

Ask the lender for copies of all loan documents and verification records.

Step 3: Send Written Dispute

Send an email or letter denying the loan and demanding correction.

Step 4: Preserve Evidence

Save messages, calls, emails, app notifications, demand letters, screenshots, and collection threats.

Step 5: File Reports

Report to police, cybercrime authorities, lender, credit database if applicable, and privacy regulator if personal data was misused.

Step 6: Secure Accounts

Change passwords, secure SIM, email, bank, e-wallet, and social media accounts.

Step 7: Notify Contacts if Needed

If collectors are harassing contacts, send a brief warning that the loan is fraudulent and unauthorized.


XVI. Written Dispute to the Lender

The victim should send a written dispute stating:

  • they did not apply for the loan;
  • they did not sign any loan agreement;
  • they did not authorize anyone;
  • they did not receive proceeds;
  • they deny liability;
  • they demand copies of documents;
  • they demand suspension of collection;
  • they demand correction or deletion of false records;
  • they demand that collectors stop contacting third persons;
  • they reserve legal remedies.

A written dispute creates a paper trail.


XVII. Sample Dispute Letter to Lender

Subject: Formal Dispute of Unauthorized Loan Application

Dear Sir/Madam:

I am formally disputing the loan account allegedly under my name. I did not apply for this loan, did not sign any loan agreement, did not authorize any person to apply on my behalf, and did not receive or benefit from any loan proceeds.

Please provide copies of all documents and records allegedly supporting this loan, including the application form, loan agreement, promissory note, government ID submitted, selfie or verification record, mobile number and email used, bank or e-wallet account where proceeds were released, date and time of application, and all consent records.

Pending investigation, please suspend all collection activity against me, stop contacting my relatives, friends, employer, or other third persons, and refrain from reporting or continuing to report this disputed account as my valid obligation.

I demand correction of your records and written confirmation that I am not liable for this unauthorized loan. I reserve all civil, criminal, administrative, data privacy, and other remedies under Philippine law.

Sincerely, [Name] [Contact details]


XVIII. Police Blotter

A police blotter is useful to document that the victim reported the unauthorized loan. It may be required by lenders, credit bureaus, banks, or investigators.

The blotter should state:

  • victim’s full name;
  • date of discovery;
  • lender or app name;
  • amount claimed;
  • account number, if any;
  • phone numbers or collectors involved;
  • statement that victim did not apply;
  • evidence of harassment or threats;
  • suspected person, if known;
  • request for investigation.

A blotter is not yet a criminal case. The victim may still need to file a complaint-affidavit.


XIX. Complaint-Affidavit

A victim may file a complaint-affidavit if there is enough basis to identify the wrongdoer or request investigation.

The affidavit should narrate:

  1. identity of complainant;
  2. how the unauthorized loan was discovered;
  3. lender or platform involved;
  4. amount of alleged loan;
  5. why the loan is unauthorized;
  6. personal data used;
  7. documents or signatures forged, if known;
  8. phone number, email, or account used;
  9. proceeds account, if known;
  10. collection harassment suffered;
  11. suspected person, if any;
  12. evidence attached;
  13. request for prosecution or investigation.

XX. Sample Complaint-Affidavit Narrative

A complaint may state:

On [date], I received collection messages from [lender/app] claiming that I owed ₱____ under a loan account. I was surprised because I never applied for any loan with said entity, never signed any loan agreement, never authorized anyone to apply for me, and never received any loan proceeds. When I asked for details, I discovered that my name, phone number, and government ID were used in the application. The proceeds were allegedly released to [account/e-wallet], which is not mine. I am filing this complaint because my identity and personal information were used without my consent.

If the wrongdoer is known:

I suspect [name] because [facts], and because said person had access to my ID and personal information on [date/reason].


XXI. If the Wrongdoer Is a Family Member

Unauthorized loan applications are sometimes committed by relatives. A parent, sibling, spouse, cousin, child, or in-law may use the victim’s ID or phone.

Family relationship does not automatically remove liability. The victim may still dispute the loan and file complaints if necessary.

However, if settlement is considered, it should be documented. The wrongdoer should sign an acknowledgment that:

  • they applied without authority;
  • they received the proceeds;
  • they will pay the lender or reimburse the victim;
  • they will cooperate in clearing the victim’s name;
  • they will not repeat the act.

The victim should avoid paying the loan without a written reimbursement and admission agreement.


XXII. If the Wrongdoer Is a Spouse

If a spouse used the other spouse’s name without authority, the analysis depends on facts.

A spouse is not automatically authorized to borrow in the other spouse’s name. Forging a spouse’s signature or using their ID without consent may still be unlawful.

However, complications may arise if:

  • proceeds were used for family expenses;
  • both spouses benefited;
  • the loan was for household needs;
  • marital property rules apply;
  • the victim previously gave access to documents or accounts.

Even in marriage, consent and authority matter. A spouse cannot freely impersonate the other.


XXIII. If the Wrongdoer Is an Employee or Employer

An employer may possess employee IDs, payslips, and personal information. Misuse of such data for a loan is serious.

Possible issues include:

  • data privacy violation;
  • falsification of employment documents;
  • unauthorized loan application;
  • payroll deduction fraud;
  • abuse of authority;
  • labor-related claims if retaliation occurs.

An employee-victim should preserve HR documents, communications, and evidence of misuse.


XXIV. If the Wrongdoer Is Unknown

If the victim does not know who applied, file reports against unknown persons and provide all available details:

  • lender name;
  • account number;
  • phone number used;
  • email used;
  • documents submitted;
  • proceeds account;
  • collection messages;
  • date of application;
  • device or IP data if lender provides it.

Authorities may need subpoenas or official requests to trace the wrongdoer.


XXV. If the Loan Proceeds Went to the Victim’s Account

If the money was deposited to the victim’s bank or e-wallet but the victim did not apply, the case becomes more complex.

Possible explanations:

  • someone accessed the victim’s account;
  • account was used as mule account;
  • victim’s phone was compromised;
  • victim unknowingly received and transferred funds;
  • victim was induced to “cash out” for someone;
  • fraudster used the victim’s account with consent for another purpose.

The victim should not spend the funds. Report immediately and ask the lender or bank for instructions. Keeping or using funds may complicate the victim’s defense.


XXVI. If the Victim Received Proceeds but Did Not Understand the Transaction

Some fraudsters trick victims into submitting IDs, selfies, or OTPs by saying it is for employment, verification, aid, SIM registration, scholarship, or raffle.

If the victim unknowingly participated in the application, the lender may argue consent. The victim should show:

  • what the fraudster represented;
  • why the victim submitted documents;
  • that the victim did not know it was a loan;
  • who received or controlled the proceeds;
  • whether the victim transferred proceeds to the fraudster;
  • messages proving deception.

This may still be fraud, but the facts must be explained clearly.


XXVII. OTP and Digital Consent Issues

Online loans often rely on OTPs, e-signatures, selfies, or app confirmations. A lender may claim that OTP entry proves consent.

But OTP use may be unauthorized if:

  • phone was stolen;
  • SIM was swapped;
  • victim was tricked into giving OTP;
  • fraudster accessed messages;
  • fraudster controlled the phone;
  • device was compromised;
  • OTP was obtained through phishing.

Victims should preserve messages showing how the OTP was obtained or misused.


XXVIII. Forged Electronic Signature

Digital loan applications may use e-signatures, tick boxes, or digital acceptance. A victim may dispute these if they did not operate the device or account.

Relevant evidence includes:

  • device logs;
  • IP address;
  • phone number used;
  • email used;
  • timestamp;
  • location;
  • selfie verification;
  • liveness check;
  • bank account used;
  • application metadata;
  • lender’s verification process.

The lender should be required to substantiate the alleged digital consent.


XXIX. Credit Record and Blacklisting Concerns

Unauthorized loans may damage credit reputation. The victim may be reported as delinquent to credit databases or internal lender records.

The victim should demand:

  • suspension of negative reporting;
  • correction of false records;
  • written certification that the account is disputed;
  • removal of invalid delinquency record;
  • notice to any credit information system or partner to correct the entry;
  • confirmation that the victim is not liable.

If the lender refuses despite evidence, administrative or civil remedies may be considered.


XXX. Collection Harassment

Even when the loan is unauthorized, collectors may aggressively demand payment.

Improper conduct may include:

  • repeated calls at unreasonable times;
  • threats of imprisonment;
  • threats of barangay or police arrest without basis;
  • threats to contact employer;
  • insults, curses, and humiliation;
  • contacting relatives, friends, and co-workers;
  • posting on social media;
  • sending fake warrants or subpoenas;
  • pretending to be law enforcement;
  • disclosing alleged debt to third persons;
  • sending edited photos or defamatory messages.

Document everything. These acts may create separate complaints.


XXXI. “You Will Be Arrested If You Don’t Pay” Threats

A person cannot be imprisoned for debt alone. If the victim did not borrow the money, threats of arrest are even more improper.

However, if fraud or falsification occurred, authorities may investigate the person who committed the fraud. The victim should not be intimidated by collectors claiming immediate arrest.

Collectors cannot issue warrants. Only courts can issue warrants in proper cases.


XXXII. Contacting the Victim’s Employer

Collectors sometimes contact employers to shame the alleged borrower. This may be improper, especially if the debt is disputed and unauthorized.

The victim may send the employer a short written notice:

I am disputing an unauthorized loan application made using my name without consent. I am not liable for the loan and have reported the matter. Please do not entertain collection harassment or disclose my employment information without lawful basis.

The victim may also complain against the collector or lender for improper disclosure and harassment.


XXXIII. Social Media Shaming

Some collectors or fraudsters post the victim’s name, photo, ID, or accusations online. This may involve:

  • data privacy violations;
  • cyberlibel;
  • unjust vexation;
  • harassment;
  • collection abuse;
  • violation of lending or financing regulations.

The victim should screenshot the post, copy the URL, identify the poster, and report to the platform and authorities.


XXXIV. Demand to Stop Processing Personal Data

The victim may demand that the lender stop processing the disputed account as a valid obligation. The demand may include:

  • stop collection calls;
  • stop third-party disclosure;
  • stop negative reporting;
  • correct personal information;
  • delete unlawfully obtained data where appropriate;
  • preserve evidence for investigation;
  • provide source of personal data.

The lender may need to retain some records for legal defense and investigation, but it should not continue abusive or inaccurate processing.


XXXV. Complaint to Privacy Authorities

A complaint may be appropriate if:

  • the lender used personal data without valid basis;
  • the app accessed contacts unnecessarily;
  • contacts were harassed;
  • the victim’s data was disclosed publicly;
  • the lender refuses to correct false data;
  • personal data was sold or shared;
  • the victim’s ID was mishandled;
  • collectors misuse personal information;
  • sensitive data is exposed.

Evidence should include screenshots, call logs, messages, privacy notices, app permissions, and written dispute.


XXXVI. Complaint to Financial or Lending Regulators

If the lender is a lending company, financing company, online lending app, bank, or financial institution, regulatory complaints may be available.

Issues may include:

  • abusive collection;
  • unauthorized loan processing;
  • failure to verify borrower identity;
  • unfair debt collection;
  • excessive interest or charges;
  • unlicensed lending;
  • false threats;
  • non-disclosure of loan terms;
  • improper data handling.

The victim should identify the lender’s registered business name, app name, address, and contact details.


XXXVII. Complaint Against Illegal Lending Apps

Some online lending apps operate without proper authority or use abusive methods. Victims should preserve:

  • app name;
  • developer name;
  • screenshots from app store;
  • website;
  • loan screenshots;
  • collection messages;
  • phone numbers used;
  • payment accounts;
  • privacy permissions;
  • terms and conditions;
  • names of collectors;
  • threats or public shaming.

Illegal or abusive lenders may be subject to regulatory action.


XXXVIII. Civil Remedies

The victim may have civil remedies against the wrongdoer and, in appropriate cases, against the lender or collector.

Possible civil claims include:

  • declaration of non-liability;
  • damages for identity theft or fraud;
  • moral damages for harassment and humiliation;
  • actual damages for costs incurred;
  • attorney’s fees where allowed;
  • injunction or restraining relief in serious cases;
  • correction of records;
  • reimbursement if victim paid under pressure.

Civil action may be appropriate if collection continues despite clear dispute.


XXXIX. Criminal Complaint Against the Wrongdoer

If the wrongdoer is known, a criminal complaint may be filed for appropriate offenses such as identity theft, estafa, falsification, or cybercrime-related offenses.

Evidence may include:

  • proof wrongdoer had access to victim’s ID;
  • lender documents showing submitted data;
  • loan proceeds account;
  • messages admitting use;
  • forged signature;
  • CCTV or transaction records;
  • bank/e-wallet records;
  • device or phone evidence;
  • witness statements;
  • prior similar acts.

XL. Criminal Complaint Against Collectors

Collectors may face liability if they commit independent offenses, such as:

  • grave threats;
  • unjust vexation;
  • cyberlibel;
  • coercion;
  • harassment;
  • unlawful disclosure;
  • pretending to be police or court officers;
  • use of fake legal documents;
  • malicious public shaming.

Collection of a legitimate debt must still be lawful. Collection of an unauthorized debt through threats is worse.


XLI. If the Lender Insists the Victim Is Liable

If the lender continues to insist, the victim should ask for proof. A lender’s mere database entry is not enough. The lender should prove:

  • valid application;
  • identity verification;
  • consent;
  • executed loan agreement;
  • disbursement to victim or authorized account;
  • borrower’s acceptance;
  • compliance with laws;
  • no forgery or identity theft.

If the documents show forged signatures, wrong phone number, wrong email, or proceeds sent elsewhere, the victim’s defense strengthens.


XLII. If the Victim’s ID Was Lost or Stolen

If the loan occurred after loss of ID, the victim should provide:

  • affidavit of loss;
  • police report, if any;
  • date ID was lost;
  • replacement ID record;
  • evidence that the victim could not have applied;
  • proof of location at the time;
  • proof the phone or email used was not the victim’s.

Report lost IDs promptly because they may be used for fraud.


XLIII. If the Victim Gave ID for Another Purpose

Many victims provide ID for employment, renting, school, remittance, travel, delivery, SIM registration, or online verification. The ID is later used for a loan.

The victim should identify who received the ID and for what purpose. Unauthorized reuse may involve data privacy violations and fraud.

Evidence includes:

  • original purpose of submission;
  • message requesting ID;
  • recipient of ID;
  • date sent;
  • platform used;
  • proof no loan consent was given.

XLIV. If the Victim’s Phone Was Borrowed

If someone borrowed the victim’s phone and applied for a loan, the victim should explain:

  • who borrowed it;
  • when;
  • for what stated purpose;
  • whether OTPs were received;
  • whether apps were installed;
  • whether messages were deleted;
  • whether proceeds went to the wrongdoer;
  • whether the phone was returned.

This may become a complaint against the person who used the phone.


XLV. If the Victim Was Tricked Into Face Verification

Some online lenders require selfies or face verification. Fraudsters may ask the victim to take selfies while claiming it is for a job, grant, SIM, account verification, or raffle.

The victim should preserve messages showing the false reason. The key argument is that the victim did not knowingly consent to a loan.


XLVI. If the Victim Is Elderly or Vulnerable

Fraud using the name of an elderly, disabled, or vulnerable person may involve exploitation. Family members should help preserve documents and file reports.

If the wrongdoer is a caregiver or relative, the case may involve abuse of trust.


XLVII. If the Victim Is a Minor

A minor generally cannot be bound by ordinary loan contracts in the same way as an adult. If a minor’s name or ID was used, the matter is highly suspicious and should be reported.

Possible issues include:

  • identity theft;
  • misuse of school ID;
  • unauthorized processing of child data;
  • exploitation;
  • fraud by adult wrongdoer.

Parents or guardians should act promptly.


XLVIII. If the Victim Is Abroad

A person abroad may still dispute an unauthorized Philippine loan. They may:

  • email the lender;
  • execute an affidavit abroad;
  • issue a special power of attorney to a Philippine representative;
  • file reports through cybercrime channels;
  • contact the Philippine embassy or consulate for document acknowledgment;
  • preserve proof of location abroad when the loan was made.

Proof that the victim was abroad at the time may help show they did not personally apply, especially for in-person loans.


XLIX. If the Loan Was Applied In Person

If the lender claims the victim personally appeared, request:

  • CCTV footage;
  • branch records;
  • identity verification documents;
  • signature specimens;
  • teller or loan officer name;
  • application timestamp;
  • visitor logs;
  • disbursement record.

If the victim was elsewhere, provide proof such as travel records, work attendance, passport stamps, or location evidence.


L. If the Loan Was Applied Online

If the loan was online, request:

  • phone number used;
  • email address used;
  • IP logs, if available;
  • device ID;
  • selfie or liveness record;
  • uploaded ID;
  • e-signature record;
  • bank or e-wallet disbursement account;
  • OTP logs;
  • consent timestamp;
  • app permissions.

The victim should not accept liability merely because the lender says the application was “digitally approved.”


LI. If the Loan Was Disbursed to Another Person

This strongly supports the victim’s dispute. The victim should ask why the lender released proceeds to an account not owned by the alleged borrower.

The proceeds account holder may be a suspect, mule, or lead. Authorities may investigate.


LII. If the Loan Was Disbursed to Cash Pickup

If proceeds were claimed through remittance or cash pickup, request records of:

  • recipient;
  • ID used;
  • branch;
  • date and time;
  • CCTV if available;
  • reference number;
  • signature;
  • contact number.

Act quickly because CCTV may be overwritten.


LIII. If the Loan Was Used for Purchase

Buy-now-pay-later or installment fraud may involve goods purchased under the victim’s name. Request:

  • merchant name;
  • item purchased;
  • delivery address;
  • recipient name;
  • courier proof;
  • order number;
  • device used;
  • account used.

The delivery address may identify the wrongdoer.


LIV. If the Victim’s Name Is Used Repeatedly

Repeated unauthorized loans suggest identity theft. The victim should consider:

  • obtaining police report;
  • alerting banks and e-wallets;
  • changing IDs where possible;
  • securing SIM and email;
  • placing fraud alerts where available;
  • monitoring credit reports;
  • reporting to privacy and financial regulators;
  • documenting all incidents in one file.

LV. Dealing With Debt Collectors

When collectors call:

  1. ask for their name and company;
  2. ask for written authority to collect;
  3. state the loan is disputed and unauthorized;
  4. do not provide additional personal data unnecessarily;
  5. do not confirm sensitive information;
  6. request all communication in writing;
  7. record call details in a log;
  8. screenshot abusive texts;
  9. block abusive numbers after preserving evidence;
  10. report threats.

Do not argue endlessly with collectors.


LVI. Call Log Template

Keep a log:

Date/Time Number Name Claimed Company What They Said Threats? Action Taken

This helps prove harassment.


LVII. Evidence Checklist

The victim should collect:

  • collection texts;
  • call logs;
  • demand letters;
  • loan account number;
  • lender name and app name;
  • screenshots of app or messages;
  • proof victim did not apply;
  • proof of location at time of application;
  • ID loss report, if applicable;
  • disputed signature comparison;
  • lender’s loan documents;
  • bank/e-wallet disbursement details;
  • police blotter;
  • affidavits;
  • messages showing who had access to ID;
  • privacy complaint documents;
  • employer harassment evidence;
  • social media posts by collectors.

LVIII. Demand for Investigation by Lender

The lender should investigate, not simply collect.

The victim may demand that the lender:

  • suspend collection;
  • identify verification failures;
  • preserve records;
  • investigate account opening;
  • identify proceeds recipient;
  • correct records;
  • provide written result;
  • stop third-party disclosure;
  • recall collectors;
  • coordinate with authorities.

LIX. If the Lender Refuses to Provide Documents

The lender may cite privacy or internal policy. However, if it claims the victim is the borrower, it should provide enough documents to allow the victim to dispute the obligation.

If the lender refuses and continues collecting, the victim may escalate to regulators, file a formal complaint, or seek legal assistance.


LX. If the Victim Pays Under Pressure

If the victim pays to stop harassment, it may complicate the dispute. But payment under protest may still be explained.

If payment is unavoidable, state in writing:

This payment is made under protest and without admission of liability, solely to mitigate harassment and damage while I continue to dispute the unauthorized loan.

Still, avoid paying if possible without legal advice.


LXI. Reimbursement From the Wrongdoer

If the victim pays or suffers loss, the victim may demand reimbursement from the person who used their identity.

A written acknowledgment should state:

  • wrongdoer applied without authority;
  • wrongdoer received or benefited from proceeds;
  • victim did not authorize it;
  • wrongdoer will pay the lender or reimburse victim;
  • wrongdoer will execute documents to clear victim’s name;
  • default consequences.

LXII. Sample Acknowledgment by Wrongdoer

I, [name], acknowledge that I used the name and personal information of [victim] to apply for a loan with [lender] without authority. I received or benefited from the proceeds in the amount of ₱____. [Victim] did not authorize the loan and should not be held liable. I undertake to pay the lender directly or reimburse [victim] and cooperate in clearing [victim]’s name.

This can be powerful evidence, but should be voluntarily signed.


LXIII. Notarized Affidavit of Denial

A victim may execute an affidavit stating:

  • they did not apply;
  • they did not sign;
  • they did not authorize;
  • they did not receive proceeds;
  • they dispute the debt;
  • identity was misused.

This may be submitted to the lender, police, or regulators.


LXIV. Sample Affidavit of Denial

Affidavit of Denial of Unauthorized Loan

I, [name], of legal age, residing at [address], state under oath:

  1. I recently learned that a loan account was allegedly opened under my name with [lender/app] in the amount of ₱____.
  2. I did not apply for said loan.
  3. I did not sign any loan agreement, promissory note, application form, or authorization.
  4. I did not authorize any person to apply for a loan on my behalf.
  5. I did not receive or benefit from any proceeds of said loan.
  6. Any use of my name, ID, phone number, address, signature, selfie, or personal information for said loan was without my consent.
  7. I am executing this affidavit to deny liability, request investigation, and support appropriate legal action.

[Signature]


LXV. Correction of Credit Records

If the unauthorized loan appears in credit records, the victim should request correction.

The request should include:

  • written dispute;
  • police blotter;
  • affidavit of denial;
  • lender correspondence;
  • proof of identity theft;
  • request for removal or correction;
  • request for written confirmation.

The victim should follow up until correction is confirmed.


LXVI. If Court Collection Case Is Filed Against the Victim

If the lender files a collection case, the victim must respond. Do not ignore court papers.

Possible defenses:

  • no consent;
  • forged signature;
  • identity theft;
  • no receipt of proceeds;
  • no authority;
  • fraud by third person;
  • lender negligence;
  • invalid contract;
  • wrong party;
  • harassment and damages counterclaim where proper.

The victim may need to present evidence and possibly request handwriting, digital, or account verification.


LXVII. If Barangay Summons Is Received

If the lender or collector files at barangay, attend if required or send proper representative if allowed. State clearly that the loan is disputed and unauthorized.

Bring:

  • affidavit of denial;
  • police blotter;
  • dispute letter;
  • proof of non-receipt;
  • evidence of identity theft;
  • screenshots of harassment.

Do not sign a settlement agreeing to pay unless fully advised.


LXVIII. If Small Claims Is Filed

Small claims cases move quickly. If sued, the victim should file a response and attach evidence. The victim should deny the loan and explain identity theft.

Do not ignore summons. Failure to appear or respond may result in adverse judgment.


LXIX. If Criminal Complaint Is Filed Against the Victim

Sometimes the lender may file a criminal complaint against the named borrower. The victim should submit a counter-affidavit explaining that the loan was unauthorized and identity was misused.

Attach:

  • affidavit of denial;
  • proof of non-receipt;
  • proof of location;
  • police report for identity theft;
  • signature comparison;
  • messages showing misuse;
  • demand to lender for investigation.

The victim may also file a complaint against the actual wrongdoer.


LXX. Defense: Forged Signature

A forged signature means no genuine consent. The victim may submit:

  • specimen signatures;
  • IDs with signature;
  • bank signature cards if available;
  • notarized affidavit;
  • expert handwriting opinion if necessary;
  • proof of absence during signing.

If the document was notarized, the notary records should be examined. Fake notarization or improper acknowledgment may create further issues.


LXXI. Defense: No Receipt of Proceeds

If proceeds were not released to the victim, this is crucial. Ask for proof of disbursement.

If released to another account, identify the account holder.

If released to an account in the victim’s name but controlled by another, explain how the account was accessed or misused.


LXXII. Defense: Lack of Authority

Even if a relative or agent applied, the victim is not liable unless that person had authority. Authority should not be presumed lightly.

If there was no special power of attorney, written authorization, or valid consent, deny the debt.


LXXIII. Defense: Lender Negligence

A lender may be negligent if it approved a loan despite:

  • mismatched ID and applicant;
  • proceeds account not matching borrower;
  • no live verification;
  • suspicious documents;
  • wrong phone number;
  • fake employment details;
  • obviously edited documents;
  • repeated fraud complaints;
  • failure to verify identity;
  • ignoring dispute.

Negligence may support defenses and counterclaims.


LXXIV. Duties of Lenders

Lenders should:

  1. verify borrower identity;
  2. secure valid consent;
  3. disclose loan terms;
  4. protect personal data;
  5. avoid excessive data collection;
  6. prevent unauthorized loans;
  7. investigate disputes;
  8. stop abusive collection;
  9. correct false records;
  10. comply with regulatory rules.

A lender that fails to verify identity may bear consequences.


LXXV. Duties of Borrowers and Consumers

Consumers should protect personal data by:

  • not sending IDs casually;
  • watermarking ID copies with purpose and date;
  • not sharing OTPs;
  • securing phone and SIM;
  • using strong passwords;
  • enabling two-factor authentication;
  • monitoring credit and loan records;
  • avoiding suspicious apps;
  • not allowing others to borrow phone for “verification”;
  • reporting lost IDs.

Prevention is easier than clearing identity theft.


LXXVI. Watermarking IDs

When sending ID copies, consider placing a clear watermark:

“For [specific purpose] only — [date]”

This may discourage reuse. Do not cover essential details if the legitimate recipient needs them, but make misuse harder.


LXXVII. Protecting Against SIM and OTP Fraud

To reduce risk:

  • never share OTPs;
  • lock SIM with PIN;
  • report lost SIM immediately;
  • secure phone with biometrics or passcode;
  • avoid installing unknown apps;
  • watch for SIM-swap signs;
  • update email recovery settings;
  • monitor bank and e-wallet alerts.

Loan apps often rely on phone control.


LXXVIII. If the Victim’s Contacts Were Accessed

If an app accessed contacts without proper consent or uses them for harassment, the victim should:

  • revoke app permissions;
  • uninstall suspicious app;
  • screenshot permissions and messages;
  • notify contacts briefly;
  • report to privacy authority and regulator;
  • demand the lender stop contacting third parties.

LXXIX. If the Victim’s Government ID Was Used

Government IDs are frequently misused. The victim should:

  • report identity theft;
  • notify the issuing agency if appropriate;
  • keep affidavit of loss if lost;
  • monitor transactions;
  • avoid sending unwatermarked copies in the future;
  • ask lender for copy of ID submitted;
  • check whether the copy was edited.

LXXX. If the Victim’s Bank or E-Wallet Was Opened Fraudulently

If someone opened a bank or e-wallet account in the victim’s name, report to the institution immediately. Ask for:

  • account freeze or investigation;
  • account opening records;
  • device and phone details;
  • transaction history;
  • fraud report number;
  • closure or correction;
  • written confirmation.

This may involve identity theft beyond the loan.


LXXXI. If Payroll Deduction Is Threatened

If the alleged loan is tied to salary deduction, the victim should notify the employer in writing that the loan is disputed and unauthorized. The employer should not deduct wages without lawful basis and proper authorization.

Any wage deduction must comply with labor rules and consent requirements.


LXXXII. If the Lender Is the Employer

If the employer claims the employee took a company loan but the employee denies it, the employee should demand proof of application, signed agreement, receipt of proceeds, and authority for deductions.

Unauthorized payroll deductions may create labor claims.


LXXXIII. If the Loan Is From a Cooperative

If a cooperative loan was made using a member’s name without consent, the victim should report to the cooperative board, audit committee, and relevant authorities. Internal cooperative records, signatures, and disbursement records should be checked.


LXXXIV. If the Loan Is From a Bank

Bank loans usually require stricter verification. If a bank loan was opened without consent, immediately file a formal fraud dispute and request investigation.

Ask for:

  • application documents;
  • signature cards;
  • disbursement account;
  • branch or online channel used;
  • loan officer details;
  • verification recordings;
  • CCTV if branch-based;
  • credit report correction.

LXXXV. If the Loan Is From a Lending Company

For lending companies, especially online lenders, request documentation and report abusive practices. Check whether the lending company is registered and authorized.

Unregistered or abusive lenders may face regulatory consequences.


LXXXVI. If the Loan Is From an Informal Lender

If a private person claims the victim borrowed money but there is no genuine signature or receipt, the victim should deny the debt and demand proof.

If the private lender harasses or threatens, file appropriate reports.


LXXXVII. If the Loan Involves a Promissory Note

If a promissory note bears the victim’s forged signature, the victim should dispute it. If the signature is genuine but the victim claims they were tricked, the facts must be explained.

A notarized promissory note may be stronger evidence, but it can still be challenged for forgery, fraud, lack of consent, or improper notarization.


LXXXVIII. If the Loan Involves a Chattel Mortgage or Collateral

If the victim’s name was used for a vehicle, appliance, phone, or gadget loan, identify the item and who received it. The delivery record may expose the wrongdoer.

If the victim’s property was used as collateral without consent, legal remedies may include cancellation, damages, and criminal complaints.


LXXXIX. If the Victim Is Listed as Borrower but Someone Else Uses the Item

This commonly happens in installment purchases. The victim’s identity is used to buy a phone, motorcycle, appliance, or gadget.

Evidence to obtain:

  • merchant receipt;
  • item serial number;
  • delivery address;
  • recipient signature;
  • CCTV;
  • phone IMEI, if applicable;
  • activation records;
  • name of person using the item.

XC. If the Victim Voluntarily Lent Their Name

Sometimes a person allows another to use their name to obtain a loan, expecting the other person to pay. This is different from identity theft.

If the victim knowingly signed as borrower or co-maker, they may be liable to the lender even if another person received the money. The victim’s remedy may be reimbursement from the real beneficiary.

The key question is whether the victim knowingly consented.


XCI. “Pangalan Mo Lang, Ako Magbabayad” Arrangements

If a person agrees to let another use their name for a loan, the lender may still enforce against the named borrower. The private agreement that the other person will pay may not defeat the lender’s rights if the lender relied on the named borrower’s signature.

This article concerns unauthorized use. Voluntary name-lending is legally different and risky.


XCII. If the Victim Signed Blank Forms

Signing blank forms is dangerous. If the victim signed blank loan documents and another filled them out, the victim may have defenses if the completion was unauthorized, but the case becomes more complicated.

Never sign blank loan forms, blank promissory notes, or blank authorization documents.


XCIII. If the Victim Submitted Requirements But Changed Their Mind

If the victim started a loan application but did not complete or accept it, determine whether consent was finalized. Ask the lender for proof of approval, acceptance, release of proceeds, and signed agreement.

If proceeds were released without final consent, dispute the loan.


XCIV. If the Victim Was Misled by a Loan Agent

Loan agents may misrepresent terms or process applications without proper consent. The victim may complain against the agent and lender.

Evidence includes:

  • agent messages;
  • promised terms;
  • forms signed;
  • fees paid;
  • proceeds disbursement;
  • unauthorized additions;
  • false statements by agent.

XCV. If the Victim’s Signature Was Scanned From Another Document

A signature may be copied from an ID or previous form. If suspected, compare document quality, alignment, and signature placement. Request original documents.

A copied signature may support falsification allegations.


XCVI. If the Victim’s Photo Was Edited

Loan apps may use edited selfies or stolen photos. Preserve the image and request verification records. If the selfie is not the victim or was manipulated, this supports identity theft.


XCVII. If Collectors Use Fake Legal Documents

Some collectors send fake subpoenas, fake warrants, fake court orders, or fake police notices. Preserve them. This may be unlawful and should be reported.

Verify any legal document with the issuing court or office. Do not panic.


XCVIII. If Collectors Threaten Barangay Complaint

A barangay complaint for collection may be possible for genuine disputes, but it does not prove liability. Attend if properly summoned and deny the unauthorized loan.

Do not sign a payment agreement if the loan is fraudulent.


XCIX. If Collectors Threaten Cybercrime or Estafa Case Against Victim

If the victim did not apply and did not receive proceeds, the victim should prepare a counter-narrative and evidence. The real fraudster may be the person who used the victim’s name.

Collectors may use legal threats to force payment. Demand written proof and report harassment.


C. Filing a Complaint With Cybercrime Authorities

If the unauthorized loan was made online, through an app, or using digital credentials, cybercrime reporting may be appropriate.

Bring:

  • screenshots;
  • app details;
  • loan account number;
  • phone numbers;
  • emails;
  • account details;
  • lender communications;
  • forged documents;
  • proof of non-consent;
  • identity theft evidence;
  • collector threats;
  • device or SIM compromise details.

CI. Filing a Complaint With the Prosecutor

A direct complaint may be filed with the prosecutor’s office where proper. The complaint should identify the offense and attach sworn statements and evidence.

If the suspect is unknown, police or cybercrime investigation may be needed first.


CII. Filing a Complaint With the Lender’s Compliance Office

Legitimate lenders usually have a customer service or compliance department. Address the dispute to official channels, not just collectors.

Ask for a case reference number.


CIII. Filing a Complaint With App Stores and Platforms

If the loan was through an app, report abusive or fraudulent conduct to:

  • app store;
  • social media platform;
  • payment platform;
  • website host;
  • email provider.

Attach screenshots of harassment and unauthorized use.


CIV. If the Victim Wants Immediate Peace

Some victims want harassment to stop immediately. The practical approach:

  1. send written dispute;
  2. demand collector cease contact;
  3. block abusive numbers after preserving evidence;
  4. notify contacts;
  5. report to regulator and privacy authority;
  6. file police blotter;
  7. send cease-and-desist letter through counsel for serious cases.

Do not pay merely to stop harassment unless strategically advised.


CV. Cease-and-Desist Letter

A lawyer’s cease-and-desist letter may demand that the lender or collector:

  • stop collection;
  • stop third-party contact;
  • stop threats;
  • remove false posts;
  • preserve records;
  • investigate identity theft;
  • correct records;
  • communicate only through counsel.

This may be useful for persistent harassment.


CVI. If the Victim Is Sued After Dispute

If the victim is sued, the earlier dispute letter, police blotter, affidavit of denial, and evidence of non-receipt will help. The victim may also consider counterclaims if the lender acted abusively or negligently.


CVII. If the Wrongdoer Admits

If the wrongdoer admits, secure the admission in writing. Preferably, have it notarized or made in a sworn affidavit.

The admission should specify:

  • loan account;
  • lender;
  • amount;
  • date;
  • data used;
  • proceeds received;
  • lack of victim consent;
  • undertaking to pay and clear records.

Submit this to the lender and authorities.


CVIII. If the Wrongdoer Promises to Pay

A promise to pay by the wrongdoer may help, but it does not automatically clear the victim’s name. The lender’s records must still be corrected.

The victim should require the wrongdoer to communicate with the lender and admit responsibility.


CIX. If the Wrongdoer Is Willing to Settle With Lender

Settlement should be documented as payment by the actual responsible person, not as admission by the victim.

The victim should ask lender for written clearance confirming the victim is not liable and that records will be corrected.


CX. Clearance Letter From Lender

The victim should request a clearance or certification stating:

  • the disputed loan was found unauthorized;
  • victim is not liable;
  • collection against victim is terminated;
  • no adverse credit reporting will be made or will be corrected;
  • third-party collectors have been recalled;
  • personal data will not be used for collection.

This is important for future credit and employment concerns.


CXI. If Lender Only Says “Account Is Closed” But Not “Unauthorized”

Ask for clearer wording. “Closed” may mean paid, written off, or settled. The victim needs confirmation that they are not liable and that the account was unauthorized or disputed.


CXII. If the Victim’s Name Remains in Collection Databases

Follow up in writing. Ask the lender to remove the victim’s name from collector lists and confirm deletion or correction.

If collectors continue calling, use the lender’s confirmation to demand cessation.


CXIII. If There Are Multiple Lenders

Identity theft may involve several loans. Create a master list:

Lender/App Amount Date Discovered Account No. Dispute Sent Status Evidence

Send disputes to each lender.


CXIV. If the Victim’s Data Was Sold

If many unknown lenders contact the victim, data may have been sold or leaked. Report to privacy authorities and secure accounts.

Consider replacing compromised phone number or email if harassment is uncontrollable, but preserve evidence first.


CXV. If the Victim Is Being Threatened by the Actual Wrongdoer

If the wrongdoer threatens the victim to prevent reporting, additional complaints may apply. Preserve threats and prioritize safety.


CXVI. If the Victim’s ID Is Used for Future Fraud

After identity theft, monitor for future misuse. Keep copies of police reports and affidavits for future disputes.


CXVII. Practical Checklist for Victims

  1. Write down the date you discovered the loan.
  2. Save all collection messages and call logs.
  3. Do not admit liability.
  4. Send formal dispute to lender.
  5. Demand loan documents and disbursement details.
  6. File police blotter.
  7. Execute affidavit of denial.
  8. Report identity theft if applicable.
  9. Report collector harassment.
  10. Secure phone, email, bank, e-wallet, and IDs.
  11. Notify employer or contacts if they are harassed.
  12. Request credit record correction.
  13. Follow up until written clearance is issued.
  14. Consult counsel if sued, harassed, or damaged.

CXVIII. Practical Checklist for Lenders

A lender receiving an unauthorized loan dispute should:

  1. suspend collection against the disputing person;
  2. verify identity documents;
  3. review consent records;
  4. check disbursement account;
  5. preserve logs and records;
  6. stop third-party disclosure;
  7. investigate possible fraud;
  8. recall abusive collectors;
  9. report suspected fraud where appropriate;
  10. correct records if unauthorized;
  11. provide written findings;
  12. strengthen verification procedures.

Ignoring identity theft complaints creates legal risk.


CXIX. Practical Checklist for Someone Accused of Unauthorized Use

A person accused should:

  1. preserve evidence;
  2. avoid contacting or threatening the victim;
  3. do not destroy documents;
  4. do not pressure victim to pay;
  5. obtain legal advice;
  6. if responsible, settle properly and clear victim’s name;
  7. if falsely accused, gather proof of non-involvement.

CXX. Preventive Measures

To prevent unauthorized loan applications:

  • watermark ID copies;
  • do not share OTPs;
  • do not let others use phone for unknown verification;
  • avoid suspicious lending apps;
  • do not install apps outside official stores;
  • revoke unnecessary app permissions;
  • keep IDs secure;
  • report lost IDs quickly;
  • use strong phone lock;
  • secure email and SIM;
  • monitor bank and e-wallet activity;
  • do not sign blank forms;
  • review credit reports where available;
  • be cautious with job posts asking for IDs and selfies.

CXXI. Frequently Asked Questions

1. Am I liable for a loan I did not apply for?

Generally, no. A person is not liable for a loan they did not authorize, sign, receive, or benefit from. But you should formally dispute it.

2. What if my ID was used?

Report identity theft, dispute the loan, demand documents, and ask for correction of records.

3. What if the lender says my name is in their system?

A database entry is not enough. Ask for proof of application, consent, signature, and disbursement.

4. What if I was listed only as a reference?

A reference is not automatically liable. Collectors should not demand payment from you.

5. What if my relative used my name?

You may still dispute the loan and file a complaint. Family relationship does not authorize identity misuse.

6. Can collectors threaten arrest?

Collectors cannot order arrest. Nonpayment of debt alone is not a basis for imprisonment. Fraud may be investigated, but the real wrongdoer is the person who used the identity.

7. Should I pay to stop harassment?

Usually, do not pay unless advised. Payment may be treated as acknowledgment. Send a written dispute and report harassment.

8. Can I file a police blotter?

Yes. A blotter helps document identity misuse and collection harassment.

9. Can I sue the wrongdoer?

Yes, if you can identify them and prove unauthorized use, fraud, falsification, or damages.

10. Can I complain against the lender?

Yes, especially if it refuses to investigate, continues collecting despite dispute, mishandles personal data, or uses abusive collectors.

11. What if the signature is forged?

Deny the document, request copies, preserve specimen signatures, and consider a falsification complaint.

12. What if the loan proceeds went to another account?

That strongly supports your dispute. Ask for the disbursement record and report the account holder.

13. What if the loan app contacted all my contacts?

Preserve screenshots and report privacy and collection abuse.

14. What if I gave my OTP because someone tricked me?

Explain the deception and preserve messages. You may still be a victim of fraud.

15. What if a case is filed against me?

Do not ignore it. File the proper answer or counter-affidavit and attach evidence of non-consent and identity theft.


CXXII. Key Takeaways

  1. A loan requires consent; unauthorized use of another person’s name does not create valid liability against the victim.
  2. The victim should dispute the loan in writing immediately.
  3. A person listed only as reference or emergency contact is not automatically liable.
  4. Unauthorized use may involve identity theft, estafa, falsification, cybercrime, and data privacy violations.
  5. The lender should prove consent, identity verification, and disbursement.
  6. If proceeds went to another account, that account holder is a key lead.
  7. Forged signatures and fake documents should be reported.
  8. Collection harassment creates separate legal issues.
  9. Online lending apps may face privacy and regulatory complaints for abusive practices.
  10. Victims should not admit or pay disputed loans without advice.
  11. Police blotter, affidavit of denial, and written dispute are important early documents.
  12. Correction of credit records should be demanded.
  13. Secure IDs, SIM, phone, email, bank, and e-wallet accounts after discovery.
  14. If sued, respond promptly.
  15. Prevention depends on protecting IDs, OTPs, phones, and personal data.

CXXIII. Conclusion

An unauthorized loan application using another person’s name is not a simple debt problem. It is a legal and identity-security problem. In the Philippines, it may involve lack of consent, forged signatures, identity theft, cyber fraud, falsification, data privacy violations, and abusive collection practices.

The victim’s legal position is generally strong if they did not apply, did not sign, did not authorize anyone, did not receive the proceeds, and did not benefit from the loan. But the victim must act decisively. The proper response is to dispute the loan in writing, demand documents, file a police blotter or complaint, preserve collection evidence, report data misuse, secure accounts, and require correction of records.

Lenders and collection agencies must also act responsibly. They should investigate identity theft claims, suspend collection against disputed persons, stop abusive third-party contact, and correct false records. A lending system that approves loans without proper identity verification shifts harm to innocent people.

The safest rule is simple: do not pay, admit, or settle an unauthorized loan without first demanding proof and documenting your denial. A person whose name was misused should treat the matter as identity theft, not ordinary nonpayment.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.