Unauthorized Use of Credit Card After Loss or Theft in the Philippines

I. Introduction

Credit cards are convenient payment tools, but when a card is lost, stolen, skimmed, cloned, or used without authority, the cardholder may face unauthorized charges, disputed billing, damaged credit standing, collection calls, and possible identity theft. In the Philippines, unauthorized credit card use after loss or theft may involve several legal issues: contractual liability between the cardholder and issuing bank, consumer protection, access device fraud, theft, estafa, cybercrime, data privacy, and possible civil or criminal remedies.

The most important practical rule is this: report the loss or theft immediately. Timely reporting can reduce exposure, preserve evidence, trigger card blocking, and support a dispute or fraud investigation. Delay may make the dispute harder, especially if the bank argues that the cardholder failed to exercise reasonable care or failed to promptly notify the issuer.

This article explains the Philippine legal context, what to do after losing a credit card, how to dispute unauthorized transactions, what laws may apply, how to file complaints, what evidence to prepare, and what remedies may be available.


II. What Is Unauthorized Credit Card Use?

Unauthorized credit card use means the card, card number, account, credentials, or related payment information was used without the cardholder’s consent.

It may include:

  1. Physical use of a stolen credit card.
  2. Online purchases using stolen card details.
  3. Contactless transactions after card loss.
  4. Cash advances made without authority.
  5. Use of card details copied by skimming.
  6. Card-not-present fraud using the card number, expiry date, and CVV.
  7. Unauthorized use through a mobile wallet or payment app.
  8. Fraudulent subscription charges.
  9. Use by a family member, employee, helper, friend, or co-worker without permission.
  10. Use of a replacement card intercepted by another person.
  11. Fraudulent transactions after phishing, smishing, or social engineering.
  12. Use of saved card credentials in online accounts after phone or account compromise.
  13. Use of card information obtained through a data breach or merchant compromise.

Unauthorized use can occur even if the physical card was never lost. This article focuses on loss or theft, but many principles also apply to card-not-present and digital payment fraud.


III. Immediate Steps After Losing a Credit Card

Time is critical. A lost or stolen card should be treated as a financial security emergency.

Step 1: Call the Bank Immediately

Contact the credit card issuer’s hotline as soon as you discover the card is missing or was stolen. Request:

  • Immediate card blocking
  • Replacement card
  • Fraud report or incident reference number
  • List of recent transactions
  • Temporary suspension of disputed charges
  • Instructions for filing a dispute
  • Written confirmation that the card was reported lost or stolen

Record:

  • Date and time of call
  • Name or ID of bank representative, if given
  • Reference number
  • Instructions provided
  • Transactions reported as unauthorized

Step 2: Check Recent Transactions

Review:

  • Mobile banking app
  • Online banking
  • SMS alerts
  • Email alerts
  • Statement of account
  • Merchant notifications
  • Digital wallet records
  • Installment purchases
  • Pending authorizations

List all transactions you did not authorize.

Step 3: Submit a Written Dispute

Verbal reporting is important, but written documentation is safer. Send a written dispute to the bank through official channels. Include the transaction details and state clearly that you did not authorize them.

Step 4: File a Police Report if the Card Was Stolen

If the card was stolen, file a police report or blotter entry. This may be required or useful for:

  • Bank fraud investigation
  • Insurance claim
  • Criminal complaint
  • Affidavit of loss or theft
  • Dispute support
  • Identity theft documentation

Step 5: Execute an Affidavit of Loss or Theft

Some banks may require an affidavit. The affidavit should truthfully describe how and when the card was lost or stolen.

Step 6: Secure Related Accounts

If the card was in a stolen wallet, bag, or phone, secure:

  • Online banking passwords
  • Email accounts
  • Mobile wallet apps
  • Shopping accounts with saved cards
  • Food delivery apps
  • Ride-hailing apps
  • Subscription services
  • Mobile number and SIM
  • Government IDs
  • Other debit or credit cards

Step 7: Monitor Future Statements

Unauthorized charges may post days later. Continue monitoring statements and pending transactions.


IV. Difference Between Lost Card, Stolen Card, Compromised Card, and Unauthorized Transaction

Understanding the distinction helps frame the complaint.

A. Lost Card

A card is lost when the cardholder misplaced it and does not know whether another person took it. An affidavit of loss may be appropriate.

B. Stolen Card

A card is stolen when another person unlawfully took it, such as through pickpocketing, robbery, bag-slashing, burglary, or theft by someone with access.

C. Compromised Card

A card is compromised when its details were obtained without authority even if the physical card remains with the cardholder. Examples include skimming, phishing, data breach, fake websites, and malicious payment links.

D. Unauthorized Transaction

An unauthorized transaction is a charge, cash advance, transfer, online purchase, subscription, or payment made without the cardholder’s consent.

The bank’s investigation may examine whether the transaction was card-present, online, contactless, chip-and-PIN, OTP-authenticated, app-approved, or recurring.


V. Legal Framework in the Philippines

Unauthorized credit card use may involve several laws and principles.

A. Contract Between Cardholder and Issuer

Credit card use is governed by the cardholder agreement, terms and conditions, disclosure statement, and bank rules. These documents usually require the cardholder to:

  • Safeguard the card
  • Keep PINs and credentials confidential
  • Notify the bank immediately upon loss, theft, or compromise
  • Review statements
  • Report unauthorized transactions within a specified period
  • Cooperate in investigation

The bank, in turn, must follow applicable banking, consumer protection, and fair treatment rules.

B. Access Device Regulation

Credit cards are access devices. Unauthorized use, possession, trafficking, production, or fraudulent use of access devices may constitute criminal conduct under Philippine law.

Possible acts include:

  • Using a credit card without authority
  • Possessing or using counterfeit access devices
  • Obtaining goods or services by unauthorized card use
  • Using stolen card information
  • Producing or trafficking unauthorized access devices
  • Possessing device-making or skimming equipment
  • Using access device information to defraud

C. Revised Penal Code

Depending on the facts, unauthorized credit card use may also involve:

  • Theft
  • Estafa or swindling
  • Falsification
  • Use of falsified documents
  • Malicious mischief or related property offenses
  • Other fraud-related crimes

D. Cybercrime Law

If the unauthorized use occurred online, through a hacked account, phishing link, digital wallet, mobile banking app, or electronic system, cybercrime-related offenses may be relevant.

Possible cyber-related issues include:

  • Computer-related fraud
  • Identity theft
  • Unauthorized access
  • Misuse of credentials
  • Online fraud
  • Phishing or smishing
  • Account takeover

E. Data Privacy Law

If the cardholder’s personal information, card details, address, phone number, email, ID, or account information was unlawfully collected, shared, disclosed, or misused, data privacy issues may arise.

F. Consumer Protection and Banking Regulation

Banks and financial institutions are expected to handle consumer complaints, fraud reports, dispute procedures, billing concerns, and unauthorized transaction claims according to applicable banking and consumer protection standards.

G. Civil Liability

A victim may seek civil recovery or damages against the offender. In a criminal case, civil liability may be included unless separately waived, reserved, or otherwise treated under procedural rules.


VI. Cardholder Liability After Loss or Theft

A common question is whether the cardholder must pay for unauthorized charges made after loss or theft.

The answer depends on:

  1. When the loss or theft was reported.
  2. Whether the transactions occurred before or after reporting.
  3. Whether the cardholder was negligent.
  4. Whether the transaction required PIN, OTP, signature, biometric approval, or app confirmation.
  5. Whether the bank followed proper authentication and monitoring procedures.
  6. Whether the cardholder shared credentials or OTPs.
  7. Whether the transaction was suspicious, unusual, or outside ordinary behavior.
  8. What the cardholder agreement provides.
  9. What banking and consumer protection rules require.
  10. The evidence available.

A. Transactions After Reporting

Once the bank is notified and the card is blocked, the cardholder has a strong argument that subsequent transactions should not be charged to the cardholder.

B. Transactions Before Reporting

Transactions before reporting may be disputed, but the bank may investigate whether the cardholder exercised reasonable care and whether the transaction appears authorized.

C. Negligence Issues

Banks may deny disputes if they claim the cardholder:

  • Delayed reporting
  • Shared the card
  • Disclosed the PIN
  • Shared OTPs
  • Stored PIN with the card
  • Allowed another person to use the card
  • Failed to secure online banking credentials
  • Ignored transaction alerts
  • Participated in the transaction
  • Was careless with the card

The cardholder may respond with evidence showing theft, prompt reporting, lack of consent, impossibility of the transaction, suspicious merchant activity, or bank security failure.


VII. Common Unauthorized Credit Card Scenarios

A. Wallet or Bag Was Stolen

The thief uses the physical card before the cardholder discovers the theft.

Evidence:

  • Police report
  • CCTV request
  • Affidavit of theft
  • Timeline of discovery
  • Unauthorized transaction alerts
  • Location evidence showing cardholder was elsewhere
  • Receipts or merchant details

B. Card Was Lost and Used by Finder

A person finds the card and uses it for purchases. This may still be unlawful. The cardholder should file an affidavit of loss and dispute the transactions.

C. Card Was Used Online After Theft

The thief uses card details for online purchases, subscriptions, or digital goods. The bank may examine OTP, 3D Secure verification, IP information, delivery address, and merchant records.

D. Contactless Tap Transactions

Some transactions may be made by tapping the card without signature or PIN, especially for smaller amounts. Prompt reporting is important.

E. Cash Advance Fraud

Cash advances usually require additional authentication such as PIN. If a cash advance occurred, the investigation may focus on how the PIN was obtained.

F. Unauthorized Use by Household Member

If a family member, partner, helper, employee, or friend used the card without permission, it may still be unauthorized. However, disputes may become more complicated if the bank sees prior authorized use, shared access, or apparent permission.

G. Unauthorized Use Through Stolen Phone

If the credit card was saved in a mobile wallet, shopping app, delivery app, or ride-hailing app on a stolen phone, unauthorized transactions may occur through those apps.

The cardholder should report both:

  • The stolen phone or compromised account
  • The unauthorized card transactions

H. Phishing After Card Theft

A thief may contact the cardholder pretending to be the bank and ask for OTPs or passwords. Never give OTPs, CVV, PIN, or passwords to callers or message senders.


VIII. Reporting to the Bank

The bank is the first and most important reporting point.

A. What to Tell the Bank

State clearly:

  1. The card was lost or stolen.
  2. The cardholder did not authorize certain transactions.
  3. The card should be immediately blocked.
  4. The cardholder requests investigation and reversal or chargeback of unauthorized transactions.
  5. The cardholder requests written confirmation or reference number.

B. Information to Provide

Prepare:

  • Cardholder name
  • Last four digits of card
  • Date and time card was discovered missing
  • Date and time loss was reported
  • List of disputed transactions
  • Merchant names
  • Amounts
  • Transaction dates
  • Police report, if available
  • Affidavit, if required
  • Valid ID
  • Contact details

C. Written Dispute

Send a written dispute by email, bank portal, branch filing, or official form. Keep proof of submission.

D. Request for Provisional Treatment

Ask whether the bank can temporarily suspend billing, interest, penalties, or collection action on disputed charges while investigation is pending.

E. Follow Up Regularly

Keep all reference numbers. Ask for status updates in writing.


IX. Sample Written Dispute Letter to Bank

Subject: Dispute of Unauthorized Credit Card Transactions After Loss/Theft

To: [Bank Name]

I am writing to formally report the loss/theft of my credit card and to dispute unauthorized transactions charged to my account.

Cardholder Name: [Name] Credit Card Ending: [Last 4 Digits] Date/Time Loss or Theft Discovered: [Date/Time] Date/Time Reported to Bank: [Date/Time] Bank Reference Number: [Reference Number]

I did not authorize the following transactions:

Date Merchant Amount Reference No., if available
[Date] [Merchant] PHP [Amount] [Ref]
[Date] [Merchant] PHP [Amount] [Ref]

I request that the above transactions be investigated and reversed or charged back as unauthorized. I also request that no interest, penalties, finance charges, or adverse credit reporting be imposed in relation to these disputed amounts while the investigation is pending.

Attached are copies of my valid ID, police report or blotter, affidavit of loss/theft, screenshots of transaction alerts, and other supporting documents.

Please confirm receipt of this dispute and provide the investigation reference number and expected next steps.

Sincerely, [Name] [Date] [Contact Details]


X. Affidavit of Loss or Theft

An affidavit may be required by the bank, police, or other authorities.

A. Affidavit of Loss

Use this when the card was misplaced or lost.

B. Affidavit of Theft

Use this when the card was stolen.

C. Contents

The affidavit should include:

  1. Full name and address of cardholder
  2. Credit card issuer and last four digits
  3. Date, time, and place of loss or theft
  4. Circumstances of the incident
  5. Statement that cardholder did not authorize disputed transactions
  6. Date and time reported to bank
  7. Police report details, if any
  8. Request for blocking, replacement, and investigation
  9. Statement that the affidavit is truthful

D. Avoid Overstating Facts

If the cardholder is unsure whether the card was lost or stolen, the affidavit should say so. False statements in an affidavit may create legal exposure.


XI. Sample Affidavit of Theft of Credit Card

Republic of the Philippines City/Municipality of ________

Affidavit of Theft

I, [Full Name], of legal age, Filipino, residing at [Address], after being duly sworn, state:

  1. I am the holder of a credit card issued by [Bank Name], with card number ending in [last four digits].

  2. On or about [date] at around [time], while I was at [place], my [wallet/bag/cardholder] containing the above credit card was stolen.

  3. I did not authorize any person to use my credit card.

  4. After discovering the theft, I immediately reported the matter to [Bank Name] on [date/time], and the bank provided reference number [number], if available.

  5. I also reported the incident to [police station] on [date], under blotter/report number [number], if available.

  6. I later discovered unauthorized transactions charged to my account, including [briefly list transactions or refer to attached list].

  7. I am executing this affidavit to attest to the truth of the foregoing facts and to support my request for card blocking, replacement, investigation, reversal of unauthorized charges, police investigation, and other lawful purposes.

[Signature] [Name]

Subscribed and sworn before me this ___ day of ______ at ______.


XII. Sample Affidavit of Loss of Credit Card

Republic of the Philippines City/Municipality of ________

Affidavit of Loss

I, [Full Name], of legal age, Filipino, residing at [Address], after being duly sworn, state:

  1. I am the holder of a credit card issued by [Bank Name], with card number ending in [last four digits].

  2. On or about [date] at around [time], I discovered that the said credit card was missing.

  3. I made diligent efforts to locate the card but could not find it.

  4. The card has not been sold, transferred, or voluntarily given to another person.

  5. Upon discovering the loss, I reported the matter to [Bank Name] on [date/time], and requested immediate blocking of the card.

  6. I did not authorize any transactions made after the card was lost.

  7. I am executing this affidavit to support my request for card blocking, replacement, investigation, reversal of unauthorized charges, and other lawful purposes.

[Signature] [Name]

Subscribed and sworn before me this ___ day of ______ at ______.


XIII. Filing a Police Report

A police report is useful when the card was stolen or used fraudulently.

A. Where to File

File with the police station where:

  • The theft occurred;
  • The unauthorized transaction occurred;
  • The cardholder discovered the theft; or
  • The cardholder resides, depending on practical circumstances and police guidance.

For cyber or online fraud, referral to a cybercrime unit may be appropriate.

B. What to Bring

Bring:

  • Valid ID
  • Credit card details, preferably last four digits only in general documents
  • Bank report reference number
  • Unauthorized transaction list
  • SMS or email alerts
  • Statement of account
  • Affidavit of loss or theft
  • CCTV details, if any
  • Names of suspects, if known
  • Merchant details
  • Proof that cardholder was elsewhere, if relevant

C. Police Blotter vs. Criminal Complaint

A blotter entry records the report. A formal criminal complaint may require a complaint-affidavit and supporting evidence.

If the suspect is known, a criminal complaint may be pursued. If unknown, the report may still help with bank investigation and future law enforcement action.


XIV. Filing With Cybercrime Authorities

If unauthorized use occurred online, through phishing, mobile app compromise, or digital account takeover, report to cybercrime authorities.

A. When Cybercrime Reporting Is Appropriate

Cybercrime reporting may be appropriate if:

  • The card was used for online purchases.
  • The cardholder’s online account was hacked.
  • OTPs were intercepted or fraudulently obtained.
  • A phishing link captured card details.
  • The card was added to a digital wallet without authority.
  • The offender used fake websites, fake bank pages, or fake merchant pages.
  • The offender used identity theft.
  • Unauthorized transactions involved digital platforms.

B. Evidence for Cybercrime Complaint

Prepare:

  • Screenshots of phishing messages
  • URLs
  • Email headers, if available
  • Sender numbers
  • Transaction alerts
  • Bank statements
  • Account login alerts
  • Device compromise details
  • Merchant names
  • Delivery address, if known
  • Account takeover evidence
  • Complaint-affidavit

XV. Filing a Complaint With Regulators or Consumer Assistance Channels

If the bank fails to act, delays excessively, refuses to provide a clear explanation, continues billing disputed charges, or sends the account to collection despite a pending dispute, the cardholder may consider escalating through appropriate financial consumer assistance channels.

A. First Exhaust the Bank’s Complaint Process

Usually, the cardholder should first file with the bank’s official customer assistance or complaints unit and secure a reference number.

B. Escalate if Needed

Escalation may be appropriate if:

  • The bank does not respond.
  • The bank denies the dispute without explanation.
  • The bank ignores evidence.
  • Collection continues despite a pending dispute.
  • The bank imposes charges on clearly unauthorized transactions after timely report.
  • The bank refuses to provide documents or dispute status.
  • The cardholder is treated unfairly.

C. Documents for Escalation

Prepare:

  • Complaint letter
  • Bank reference numbers
  • Timeline
  • Disputed transaction list
  • Proof of timely report
  • Police report
  • Affidavit
  • Bank replies
  • Statements of account
  • Screenshots
  • Evidence of follow-ups

XVI. Merchant-Related Issues

Unauthorized card transactions may involve merchants. The cardholder generally disputes with the issuing bank, but merchant information may help.

A. Card-Present Merchant Transactions

If the thief physically used the card at a store, issues may include:

  • Whether signature was checked
  • Whether ID was required
  • Whether contactless limits applied
  • Whether suspicious multiple transactions occurred
  • Whether CCTV exists
  • Whether receipt identifies the user
  • Whether merchant followed card acceptance rules

B. Online Merchant Transactions

For online purchases, evidence may include:

  • Delivery address
  • IP address
  • Account used
  • Email used
  • Phone number used
  • Shipping name
  • Order confirmation
  • Device fingerprint
  • 3D Secure authentication
  • OTP logs

The bank may need to coordinate through card network or merchant acquiring channels.

C. Request Preservation of CCTV or Records

If the transaction occurred in a physical store, request prompt preservation of CCTV. CCTV is often overwritten quickly.


XVII. Unauthorized Transactions and Billing Statement Deadlines

Cardholder agreements usually require cardholders to report billing errors or unauthorized transactions within a specified period after statement date or transaction posting.

To avoid waiver arguments:

  1. Review statements immediately.
  2. Report suspicious transactions as soon as discovered.
  3. Submit written dispute before the stated deadline.
  4. Keep proof of submission.
  5. Continue paying undisputed amounts if appropriate.
  6. Ask the bank how disputed charges will be treated during investigation.

Even if the deadline has passed, a cardholder may still report fraud, but delay may weaken the claim.


XVIII. Paying the Credit Card Bill While Dispute Is Pending

Cardholders often ask whether they should pay disputed charges.

The safest approach depends on the bank’s policy and the cardholder’s circumstances. Consider:

  1. Pay undisputed amounts to avoid penalties.
  2. Ask the bank in writing whether disputed amounts are temporarily suspended.
  3. Ask whether finance charges will accrue.
  4. Ask whether nonpayment of disputed charges affects credit standing.
  5. Do not ignore the entire bill if only some transactions are disputed.
  6. Keep all payment records.

If the bank insists on payment while investigating, the cardholder may pay under protest and state in writing that payment is not an admission of liability. Legal advice may be useful for large amounts.


XIX. Unauthorized Credit Card Use by a Known Person

Sometimes the offender is known to the cardholder.

Examples:

  • Relative used the card without consent.
  • Former partner kept card details.
  • Employee used employer-issued card.
  • Helper stole card from wallet.
  • Friend borrowed card once and later used it again.
  • Child used saved card for online purchases.
  • Co-worker took card details.

A. Bank Dispute May Be Harder

Banks may closely examine whether the cardholder previously allowed access or shared credentials.

B. Criminal Complaint May Still Be Possible

Unauthorized use by a known person may still be theft, estafa, access device fraud, or another offense depending on facts.

C. Evidence

Evidence may include:

  • Messages admitting use
  • CCTV
  • Receipts
  • Delivery address
  • Prior permission limits
  • Proof permission was revoked
  • Witnesses
  • Bank transaction records

D. Settlement

If the offender is a relative or employee, settlement may be considered, but it should be in writing and should not compromise the cardholder’s rights against the bank unless intended.


XX. Unauthorized Use of Supplementary Cards

A supplementary cardholder is usually authorized to use the supplementary card, but disputes may arise when:

  1. The supplementary card is used beyond agreed limits.
  2. The principal cardholder revokes permission.
  3. The supplementary card is lost or stolen.
  4. The supplementary cardholder denies certain transactions.
  5. The supplementary cardholder shares the card with others.

The principal cardholder may remain contractually liable for supplementary card transactions under the card agreement, but unauthorized transactions caused by theft or fraud should still be reported immediately.

If a supplementary card is lost, both the principal and supplementary cardholder should notify the bank.


XXI. Unauthorized Cash Advance

Cash advances are treated seriously because they may require a PIN or other authentication.

If a cash advance is unauthorized, the cardholder should explain:

  • The card was stolen or lost.
  • The PIN was not disclosed.
  • The PIN was not stored with the card.
  • The cardholder was elsewhere.
  • The transaction was inconsistent with prior use.
  • The ATM location is relevant.
  • CCTV may identify the user.

Request the bank to preserve ATM footage and transaction logs if available.


XXII. Unauthorized Online Subscriptions or Recurring Charges

A stolen card may be used for subscriptions, gaming, streaming, cloud services, dating apps, online ads, or digital goods.

Steps:

  1. Report to bank.
  2. Ask bank to block card and tokenized card credentials.
  3. Contact merchant if identifiable.
  4. Cancel unauthorized subscription.
  5. Request chargeback or refund.
  6. Preserve emails and order confirmations.
  7. Monitor replacement card for recurring charge migration.

Some merchants use tokenized or recurring billing systems. Ask the bank whether replacement card credentials may automatically update with certain merchants and request prevention if needed.


XXIII. Stolen Phone With Saved Credit Card

If the credit card was used through a stolen phone:

  1. Report phone theft to police.
  2. Block the SIM.
  3. Remote lock or wipe the phone.
  4. Remove the device from trusted devices.
  5. Change email, banking, and wallet passwords.
  6. Disable mobile wallet cards.
  7. Report unauthorized card transactions.
  8. Request replacement card.
  9. Warn contacts if impersonation is possible.
  10. Monitor e-wallet and bank accounts.

The cardholder should document that the phone was stolen and that the transactions were not authorized.


XXIV. Phishing, OTP, and Social Engineering

Unauthorized card use often follows phishing or social engineering.

A. Common Tactics

Fraudsters may claim to be from:

  • Bank fraud department
  • Credit card issuer
  • Delivery company
  • E-wallet provider
  • Government agency
  • Online merchant
  • Card network
  • Rewards program

They may ask for:

  • OTP
  • CVV
  • Card number
  • Expiry date
  • PIN
  • Online banking password
  • Security questions
  • Remote access to phone
  • Screen sharing

B. Legal and Practical Issues

If the cardholder disclosed OTP or credentials, the bank may argue that the transaction was authenticated. The cardholder may still raise fraud, deception, unfair practices, or system issues depending on facts, but the dispute becomes harder.

C. What to Do

Immediately:

  • Report to bank
  • Block card
  • Change passwords
  • Revoke devices
  • File cybercrime report
  • Preserve phishing messages
  • Do not delete emails or texts
  • Report sender numbers and URLs

XXV. Evidence Checklist for Unauthorized Credit Card Use

Prepare the following:

A. Cardholder Documents

  • Valid ID
  • Credit card statement
  • Card details, usually last four digits only in general submissions
  • Cardholder agreement, if available
  • Bank reference numbers

B. Incident Documents

  • Police report
  • Affidavit of loss or theft
  • Timeline
  • Location of cardholder at relevant times
  • Proof of theft or loss
  • CCTV request or incident report

C. Transaction Evidence

  • SMS alerts
  • Email alerts
  • Mobile app screenshots
  • Statement of account
  • Merchant name
  • Amount
  • Date and time
  • Reference number
  • Currency
  • Whether transaction was online, contactless, ATM, or merchant purchase

D. Communication Evidence

  • Bank calls and emails
  • Complaint forms
  • Acknowledgment receipts
  • Bank replies
  • Merchant replies
  • Platform reports

E. Cyber Evidence

  • Phishing messages
  • Suspicious links
  • Fake websites
  • Screenshots
  • Email headers
  • Phone numbers used
  • Account takeover alerts

XXVI. Sample Transaction Dispute Table

No. Date/Time Merchant Amount Type Why Unauthorized
1 5 May, 8:15 PM ABC Store PHP 12,500 Card-present Card was stolen earlier that day
2 5 May, 8:30 PM XYZ Online PHP 8,999 Online Cardholder did not make purchase
3 5 May, 9:10 PM ATM Cash Advance PHP 20,000 Cash advance Cardholder did not authorize and was elsewhere

Attach this to the bank dispute, police report, and complaint-affidavit.


XXVII. Complaint-Affidavit for Criminal Case

If pursuing a criminal complaint, prepare a complaint-affidavit.

A. Contents

The affidavit should include:

  1. Identity of complainant.
  2. Description of card and account.
  3. Circumstances of loss or theft.
  4. Unauthorized transactions.
  5. Date and time reported to bank.
  6. Evidence showing lack of authorization.
  7. Identity of suspect, if known.
  8. Damage suffered.
  9. Request for investigation and prosecution.

B. Respondents

Possible respondents include:

  • Person who stole the card
  • Person who used the card
  • Person who received goods
  • Delivery recipient
  • Account holder used in online transaction
  • Accomplices
  • Unknown persons using the card or card details

XXVIII. Sample Complaint-Affidavit

Republic of the Philippines City/Municipality of ________

Complaint-Affidavit

I, [Full Name], of legal age, Filipino, residing at [Address], after being duly sworn, state:

  1. I am the holder of a credit card issued by [Bank Name], with card number ending in [last four digits].

  2. On [date] at around [time], my credit card was [lost/stolen] at [place], under the following circumstances: [narrate facts].

  3. I did not authorize any person to use my credit card.

  4. Upon discovering the loss/theft, I reported the matter to [Bank Name] on [date/time], and the bank provided reference number [number].

  5. I also reported the incident to [police station], as shown by the attached police report.

  6. I later discovered the following unauthorized transactions:

    • [Date], [Merchant], PHP [amount]
    • [Date], [Merchant], PHP [amount]
    • [Date], [Merchant], PHP [amount]
  7. I did not make, approve, consent to, or benefit from the above transactions.

  8. At the time of the transactions, I was [state location or facts showing impossibility, if applicable].

  9. Attached are copies of the transaction alerts, statement of account, police report, affidavit of loss/theft, and other supporting documents.

  10. I am executing this affidavit to request investigation and prosecution of the person or persons responsible for unauthorized use of my credit card, access device fraud, theft, estafa, cybercrime-related offenses, and such other offenses as may be supported by the evidence.

[Signature] [Name]

Subscribed and sworn before me this ___ day of ______ at ______.


XXIX. Unauthorized Transactions and Credit Score or Collection

A disputed unauthorized transaction can lead to collection problems if not handled properly.

A. Ask for Written Dispute Tagging

Request the bank to tag the transactions as disputed.

B. Continue Paying Undisputed Amounts

If possible, pay undisputed portions to avoid broader delinquency issues.

C. Object to Collection of Disputed Amounts

If collectors contact you about disputed fraud charges, respond in writing and provide the dispute reference number.

D. Watch for Adverse Reporting

If the bank reports delinquency based on disputed unauthorized charges, the cardholder may challenge the reporting through proper bank and regulatory channels.

E. Keep All Communications

Preserve all collection letters, emails, SMS, call logs, and bank replies.


XXX. If the Bank Denies the Dispute

A bank may deny a dispute for reasons such as alleged valid authentication, delayed reporting, merchant confirmation, cardholder negligence, OTP use, PIN use, or insufficient evidence.

A. Request Written Explanation

Ask for a written explanation of denial, including the basis for concluding that the transaction was authorized.

B. Request Supporting Information

Ask for relevant information such as:

  • Transaction authentication method
  • Merchant response
  • Date and time
  • Location
  • Delivery details, if online purchase
  • Whether OTP was used
  • Whether PIN was used
  • Whether chip, swipe, tap, or manual entry was used
  • Reason dispute was rejected

The bank may not provide all internal information, but asking helps clarify the issue.

C. Submit Reconsideration

Provide additional evidence:

  • Police report
  • Proof of whereabouts
  • CCTV information
  • Proof of stolen wallet
  • Proof of blocked card report
  • Merchant irregularities
  • Proof of phishing
  • Proof of account compromise

D. Escalate

If unresolved, escalate through the bank’s complaint escalation process and appropriate consumer assistance channels.

E. Consider Legal Action

For significant amounts, consult counsel regarding civil action, criminal complaint, or regulatory complaint.


XXXI. Preventive Measures

Cardholders can reduce risk by taking practical precautions.

A. Keep the Card Secure

  • Do not leave the card unattended.
  • Do not hand the card to strangers unnecessarily.
  • Keep wallet or bag secure in public places.
  • Avoid exposing the card number and CVV.

B. Enable Alerts

Activate SMS, email, and app alerts for all transactions.

C. Use Card Controls

If available, set:

  • Transaction limits
  • Online transaction toggle
  • International transaction toggle
  • Cash advance controls
  • Contactless limits
  • Merchant category restrictions

D. Protect PIN and OTP

  • Never write PIN on or near the card.
  • Never share OTP.
  • Never share CVV.
  • Never share online banking passwords.
  • Do not allow screen sharing with unknown callers.

E. Review Statements

Check statements regularly. Report suspicious charges immediately.

F. Use Virtual Cards When Available

Virtual cards or limited-use online cards can reduce exposure.

G. Secure Phones and Email

Because many credit card alerts and OTPs go through phone or email, secure both with strong passwords and two-factor authentication.

H. Avoid Saving Cards on Unknown Websites

Use trusted merchants only. Remove saved cards from websites you no longer use.

I. Report Lost IDs Too

If a wallet with IDs was stolen, there may be identity theft risk. Report and monitor for fraudulent applications.


XXXII. Special Issues When the Cardholder Is Abroad

A Philippine-issued credit card may be lost or stolen while the cardholder is abroad, or unauthorized transactions may occur abroad.

A. Report to the Bank Immediately

Use the international hotline, mobile app, email, or official online banking channel.

B. File Local Police Report Abroad

If the card was stolen abroad, obtain a local police report if possible.

C. Prepare Foreign Documents

Foreign police reports or affidavits may need translation, notarization, apostille, or consular authentication if used in Philippine proceedings.

D. Use Written Communication

Because international calls may be hard, confirm disputes by email or secure bank message.

E. Monitor Currency Conversion Charges

Unauthorized foreign transactions may include conversion fees and cross-border charges. Dispute the entire unauthorized amount, including related fees.

F. Replacement Card

Ask whether the bank can deliver a replacement card abroad or provide emergency card services, depending on the bank’s policy.


XXXIII. Special Issues for Foreigners in the Philippines

A foreign national whose credit card is stolen or used in the Philippines should:

  1. Report to the issuing bank abroad.
  2. File a police report in the Philippines.
  3. Preserve receipts and transaction alerts.
  4. Notify the embassy if passports or IDs were also stolen.
  5. Obtain copies of police documents for the foreign bank.
  6. Report online fraud to cybercrime authorities if relevant.
  7. Monitor travel, hotel, and merchant charges.

XXXIV. Special Issues for Corporate Credit Cards

Unauthorized use of a corporate card may involve both the employee and the company.

A. Immediate Steps

The employee should immediately notify:

  • Bank
  • Employer
  • Finance department
  • Compliance or legal department
  • Security or IT department

B. Documents

Prepare:

  • Corporate card statement
  • Incident report
  • Police report
  • Affidavit
  • Company authorization
  • Employee explanation
  • Merchant details
  • Expense policy

C. Internal Liability

The employer may investigate whether the employee complied with company card policy. Unauthorized use by others should be documented promptly.


XXXV. Special Issues for Deceased Cardholders

If unauthorized transactions occur after a cardholder’s death or after the card was lost before death, heirs or estate representatives should notify the bank immediately.

Documents may include:

  • Death certificate
  • Proof of relationship or authority
  • Card statement
  • Disputed transaction list
  • Police report, if theft is involved
  • Estate documents, if available

Transactions after death are highly suspicious and should be reviewed carefully.


XXXVI. Unauthorized Use and Identity Theft

If the stolen card was accompanied by IDs, phone, passport, company ID, or personal documents, the victim should consider identity theft risks.

Possible risks:

  • New accounts opened in victim’s name
  • Loan applications
  • SIM replacement attempts
  • E-wallet account takeover
  • Online shopping fraud
  • Fake social media accounts
  • Phishing targeting relatives
  • Use of IDs for scams

Protective steps:

  1. Report stolen IDs.
  2. Monitor bank accounts.
  3. Change passwords.
  4. Notify banks and financial institutions.
  5. Be alert for calls asking for OTPs.
  6. Consider police or cybercrime report.
  7. Preserve suspicious messages.

XXXVII. Data Privacy Issues

Unauthorized use may involve unlawful processing of personal data. Data privacy concerns arise when:

  1. Card details were leaked or stolen.
  2. Personal information was used to impersonate the cardholder.
  3. Merchant or platform mishandled cardholder data.
  4. Bank or service provider disclosed information improperly.
  5. A data breach led to card compromise.
  6. Fraudster used personal data to bypass verification.

A data privacy complaint may be considered if there is evidence of unauthorized collection, use, disclosure, or security failure involving personal data.


XXXVIII. Common Red Flags After Card Loss or Theft

Watch for:

  1. Small test charges.
  2. Multiple rapid transactions.
  3. Online gaming purchases.
  4. Food delivery charges.
  5. Ride-hailing charges.
  6. Digital wallet top-ups.
  7. Foreign currency transactions.
  8. ATM cash advances.
  9. Unfamiliar subscriptions.
  10. Merchant names you do not recognize.
  11. OTPs you did not request.
  12. Account login alerts.
  13. Calls pretending to assist with fraud.
  14. Emails saying your card was added to a wallet.
  15. Delivery confirmations to unknown addresses.

Report all suspicious activity promptly.


XXXIX. Common Mistakes to Avoid

  1. Waiting before calling the bank.
  2. Reporting only by phone and not documenting in writing.
  3. Ignoring small unauthorized charges.
  4. Paying the whole disputed bill without protest.
  5. Failing to file a police report after theft.
  6. Throwing away transaction alerts.
  7. Deleting phishing messages.
  8. Sharing OTPs with callers pretending to be bank employees.
  9. Failing to monitor replacement card statements.
  10. Assuming card blocking also blocks online tokens or subscriptions.
  11. Not securing stolen phone or email account.
  12. Posting full card details in complaints or social media.
  13. Filing a false theft report when the card was merely lost.
  14. Letting dispute deadlines pass.
  15. Not following up on bank reference numbers.

XL. Practical Checklist After Unauthorized Use

First Hour

  1. Call bank hotline.
  2. Block card.
  3. Request replacement.
  4. Record reference number.
  5. Check recent transactions.
  6. Identify unauthorized charges.
  7. Change online banking and email passwords.
  8. Block stolen SIM or phone, if involved.

Same Day

  1. Send written dispute.
  2. File police report if stolen.
  3. Prepare affidavit of loss or theft.
  4. Notify affected merchants or platforms, if needed.
  5. Report phishing or cyber fraud, if applicable.
  6. Save all alerts and screenshots.

Within the Next Few Days

  1. Submit bank dispute forms.
  2. Provide police report and affidavit.
  3. Monitor statement.
  4. Follow up with bank.
  5. Escalate if no response.
  6. Prepare complaint-affidavit if pursuing criminal case.
  7. Preserve CCTV or merchant records if possible.

XLI. Frequently Asked Questions

1. Am I liable for charges after my credit card was stolen?

It depends on the timing of the transactions, when you reported the loss, the bank’s terms, whether you were negligent, and the evidence. Report immediately and dispute unauthorized charges in writing.

2. What should I do first?

Call the bank immediately to block the card. Then check transactions, file a written dispute, and file a police report if the card was stolen.

3. Is a police report required?

It may not always be required for every bank dispute, but it is strongly recommended for stolen cards and may be required by the bank or useful for legal action.

4. What if the transaction happened before I reported the card lost?

You may still dispute it, but the bank will investigate the circumstances. Prompt reporting and strong evidence are important.

5. What if the transaction happened after I reported the card lost?

You have a stronger basis to contest liability because the bank was already notified and should have blocked the card.

6. Can unauthorized card use be a criminal offense?

Yes. It may involve access device fraud, theft, estafa, cybercrime-related fraud, identity theft, or other offenses depending on the facts.

7. What if my OTP was used?

The dispute may be harder because the bank may treat OTP use as authentication. Still, report fraud immediately, especially if the OTP was obtained through phishing, coercion, SIM compromise, or account takeover.

8. Can I refuse to pay disputed charges?

You should ask the bank in writing how disputed charges will be treated. It is usually safer to pay undisputed amounts while formally disputing unauthorized charges.

9. What if the bank denies my dispute?

Request a written explanation, submit reconsideration with additional evidence, escalate through the bank’s complaint process, and consider regulatory or legal remedies.

10. What if a relative used my card without permission?

It may still be unauthorized, but the bank may examine prior permission, shared access, and household circumstances. A criminal or civil complaint may be possible depending on the facts.

11. Should I post about the thief online?

Be careful. Public accusations can create defamation risks. It is safer to report to the bank, police, cybercrime authorities, and other proper channels.

12. Can I recover the money?

Possibly, through bank reversal, chargeback, merchant refund, settlement, civil action, or criminal case civil liability. Recovery depends on evidence, timing, and traceability.


XLII. Conclusion

Unauthorized use of a credit card after loss or theft in the Philippines requires immediate action. The cardholder should promptly notify the bank, block the card, dispute unauthorized transactions in writing, file a police report if the card was stolen, execute an affidavit if required, secure related accounts, and monitor future statements.

The legal issues may involve contract obligations with the bank, access device fraud, theft, estafa, cybercrime, identity theft, data privacy, consumer protection, and civil liability. The cardholder’s strongest protection is a clear timeline, prompt reporting, complete documentation, and organized evidence.

A lost or stolen credit card is not merely a missing piece of plastic. It is a potential gateway to unauthorized transactions, identity theft, account compromise, and financial harm. The faster the cardholder acts, the stronger the chance of limiting liability, preserving remedies, and holding the responsible person accountable.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.