This article is for general information in the Philippine legal context and is not a substitute for advice from a lawyer who can evaluate your specific facts.
Harassment can be verbal, physical, sexual, psychological, or digital. In the Philippines, your legal options depend on what happened, where it happened (street, workplace, school, online, home), who did it (stranger, coworker, partner, neighbor), and the evidence you can preserve.
This guide covers:
- What “harassment” can legally mean in Philippine law
- Which laws may apply (criminal, administrative, civil)
- Protection options (including when protection orders are possible)
- How complaints are filed and what to expect
- Evidence to gather and how to preserve it so it holds up
1) First priorities: safety, documentation, and “do not lose evidence”
If you are in immediate danger
- Go to a safe place, call emergency help (police/barangay), or seek medical assistance.
- If injuries occurred, get checked and request medical documentation (more on this below).
Start documenting right away
Even if you are not ready to file a case, start a timeline:
- Date/time, location, what happened, exact words (as best you can)
- Names/handles, phone numbers, account links
- Witnesses (who saw/heard it, how to reach them)
- What you did afterward (reported to HR/barangay/police, blocked the person, etc.)
Preserve digital evidence before it disappears
Online harassers delete messages; platforms remove content. Preserve now:
- Screenshots including the username/handle, date/time, and full thread context
- Screen recordings showing navigation (profile → message → timestamp → URL)
- Save links, message IDs, email headers, and file originals
- Back up to at least two places (device + cloud/drive)
2) Understanding “harassment” in Philippine law
“Harassment” is an umbrella term. Your best legal pathway usually matches a specific legal category, such as:
- Gender-based sexual harassment (public spaces, online, workplaces, schools)
- Sexual harassment in work/education/training settings
- Stalking (including repeated unwanted contact and surveillance behaviors)
- Threats, coercion, unjust vexation (criminal acts under the Revised Penal Code)
- Libel/cyberlibel (defamatory posts/messages)
- Voyeurism or non-consensual sharing of sexual content
- Violence Against Women and their Children (VAWC) when the offender is a spouse/partner or someone you have or had a dating/sexual relationship with
Because remedies and proof requirements differ, a strong approach is to classify the conduct and build evidence around that classification.
3) Key Philippine laws commonly used for harassment cases
A) Safe Spaces Act (RA 11313) — Gender-based sexual harassment
This is a major law for harassment in:
- Public spaces (streets, transport, bars, malls, etc.)
- Workplaces
- Educational and training institutions
- Online spaces
It covers a broad range of behaviors that can include:
- Catcalling, unwanted sexual remarks/gestures
- Unwanted sexual advances, persistent unwanted invitations
- Public masturbation, flashing
- Stalking-like behaviors and repeated unwanted contact depending on circumstances
- Online sexual harassment (sexual comments, unwanted sexual messages, sexist slurs, sexually degrading content)
Where it helps most: harassment that is sexual/gender-based even if it doesn’t fit older “sexual harassment” definitions.
Possible consequences: depending on the act and setting, penalties can include fines and/or imprisonment, and administrative sanctions in workplaces/schools.
B) Anti-Sexual Harassment Act (RA 7877) — Work, education, training (quid pro quo / authority-based)
This older law focuses on sexual harassment committed by someone who has authority, influence, or moral ascendancy over the victim in:
- Employment
- Education
- Training environments
Classic examples:
- A boss/professor demands sexual favors for hiring/passing/promotion
- A superior conditions benefits on sexual compliance
- A supervisor creates a hostile environment tied to abuse of authority
Where it helps most: when the offender has power over you and uses it to obtain sexual favors or punish refusal.
Practical note: Many cases involve both RA 7877 (authority-based) and RA 11313 (broader gender-based harassment), plus internal workplace/school rules.
C) Violence Against Women and Their Children (RA 9262) — when the harasser is an intimate partner
RA 9262 covers physical, sexual, psychological, and economic abuse committed by:
- A husband or ex-husband
- A boyfriend/ex-boyfriend
- Someone you have had a dating relationship or sexual relationship with
- The father of your child
This is crucial because it can include psychological violence such as:
- Threats, intimidation, harassment that causes mental or emotional suffering
- Repeated unwanted contact, monitoring, humiliation, control
- Online harassment used to threaten, shame, or control
Key advantage: RA 9262 allows access to protection orders (see Section 6).
D) Cybercrime Prevention Act (RA 10175) — online harassment that is a crime
RA 10175 is often used when harassment occurs through ICT (internet, devices) and matches an underlying offense such as:
- Cyberlibel (online defamation)
- Online threats, coercion, identity misuse depending on facts and prosecutorial theory
It often increases complexity (evidence handling, jurisdiction, platform records) and may affect penalties.
E) Anti-Photo and Video Voyeurism Act (RA 9995) — intimate images taken/shared without consent
If the harassment involves:
- Recording private sexual activity without consent
- Sharing intimate images/videos without consent
- Threatening to share (“revenge porn” or sextortion-like conduct)
RA 9995 is a primary law. Related offenses may also apply depending on age, coercion, or trafficking indicators.
F) Data Privacy Act (RA 10173) — doxxing and misuse of personal information (in some cases)
If the harassment includes publishing or misusing personal data (address, ID numbers, workplace details, family info) without lawful basis, data privacy may be implicated. Outcomes can include complaints with the appropriate regulatory process and potential criminal liability in certain scenarios, but applicability is fact-specific.
G) Revised Penal Code (RPC) — “traditional” criminal offenses that often cover harassment
Depending on what the harasser did, RPC provisions may apply, such as:
- Grave threats / light threats (threatening harm)
- Grave coercion / light coercion (forcing you to do or not do something)
- Slander (oral defamation) (spoken defamatory statements)
- Libel (written/publication defamation; online often charged as cyberlibel)
- Unjust vexation (broad, catch-all annoyance/harassment that causes irritation or distress without lawful purpose; often invoked when conduct is persistent and unreasonable but doesn’t neatly fit other crimes)
Charges depend heavily on wording, context, repetition, and provable harm.
H) School-specific protections (anti-bullying and child protection rules)
For minors and school settings, administrative mechanisms and child protection policies often apply alongside criminal laws when appropriate. Schools typically have mandated procedures for complaints, investigation, interim safety measures, and discipline.
4) Choosing your legal pathway: criminal, administrative, civil — or several at once
You can often pursue multiple tracks simultaneously:
1) Criminal complaint (to penalize and deter)
You file a complaint for violations of applicable laws (e.g., Safe Spaces Act, threats/coercion, libel/cyberlibel, voyeurism, VAWC).
Where cases go: typically the Office of the City/Provincial Prosecutor after initial reporting/investigation steps.
2) Administrative complaint (workplace/school/organization discipline)
Even if you don’t file criminally, you can seek discipline through:
- HR and internal grievance mechanisms
- A Committee on Decorum and Investigation (often referred to as CODI) or similar body under workplace/school policy frameworks
- School discipline offices, child protection committees, or student conduct bodies
Administrative cases can be faster for workplace/school remedies (transfer, no-contact directives, suspension/dismissal), but they don’t replace criminal accountability.
3) Civil case (damages and injunctive relief concepts)
The Civil Code recognizes causes of action tied to:
- Abuse of rights and acts contrary to morals, good customs, or public policy
- Violations of dignity, privacy, and peace of mind
- Defamation-related damages
Civil actions can be used where the goal is compensation for harm and reputational injury, but they require resources and time and are typically pursued with counsel.
5) Where to report in practice (common routes)
Your best reporting channel depends on where the harassment occurred:
If it happened in public spaces (street/transport/establishment)
- Report to local authorities (barangay or police), and document the incident.
- For establishment-based incidents (mall, bar, building), request CCTV preservation immediately.
If it happened at work
Report internally (HR/grievance committee). Ask for:
- A written acknowledgment of your complaint
- Interim measures (schedule changes, no-contact directives, reassignment, remote work, etc.)
You may still pursue a criminal complaint depending on the act.
If it happened in school/training
- Report to the designated school office/body handling harassment or student discipline.
- For minors, ensure child protection processes are triggered when relevant.
If it happened online
- Preserve evidence first.
- Consider reporting to law enforcement units that handle cybercrime, and/or the NBI cybercrime unit where appropriate.
- If the platform allows it, file in-platform reports after you have preserved evidence.
If it involves an intimate partner/ex-partner
- Consider RA 9262 pathways, including protection orders and police/Women and Children Protection Desk support.
6) Protection orders and “no contact” measures
Protection Orders under RA 9262 (VAWC)
If RA 9262 applies, protection orders can be a powerful tool. Common forms include:
- Barangay Protection Order (BPO) (typically for immediate, short-term protection at barangay level)
- Temporary Protection Order (TPO) (court-issued, interim)
- Permanent Protection Order (PPO) (court-issued after hearing)
Protection orders can include provisions like:
- No contact/harassment
- Stay-away distances
- Removal from residence (in certain cases)
- Other safety-related directives
Protection orders are fact-dependent and require careful documentation of the relationship and abusive acts.
Workplace/school interim measures
Even without a court order, workplaces/schools can implement:
- No-contact directives
- Modified schedules or seating
- Restricted access to premises
- Remote arrangements
- Security escorts or controlled entry
Get these measures in writing.
7) Evidence to gather (and how to gather it properly)
Evidence quality often determines outcomes. Aim for clarity, authenticity, completeness, and continuity.
A) Your written timeline (foundational evidence)
Create a single document or notebook log:
- Every incident in chronological order
- Date/time/location
- What exactly happened (quote exact phrases when possible)
- Witnesses and their contact details
- Any reports you made (who, when, outcome)
- Emotional/physical effects (panic attacks, insomnia, missed work, etc.)
This helps prosecutors/investigators see a pattern, especially in stalking-like harassment.
B) Messages, chats, emails, and call logs
For harassment by phone or online:
- Screenshots showing the full conversation, not isolated messages
- Visible identifiers (username/number), timestamps, and platform context
- Export chat logs if the platform allows (some apps provide download/export)
- Email evidence: save the email with full headers when possible
- Call logs and voicemails (keep originals; don’t edit)
Do not edit screenshots (no cropping that removes context, no markup). If you must redact for sharing, keep an unredacted original.
C) Social media posts, comments, stories, and livestreams
- Screenshot + screen record scrolling through the profile and the post
- Save the post URL and the profile URL
- Capture comments (including your replies and others’ replies)
- If it’s a story that expires, record it immediately
If the harasser uses multiple accounts, capture evidence linking them (same phone, same photos, admissions, mutual contacts, etc.), but avoid speculative accusations—stick to what you can prove.
D) Photos, videos, and CCTV
If an incident occurred in a place with cameras:
- Request the establishment to preserve CCTV immediately (many systems overwrite in days)
- Record who you spoke to, when, and what they said
- If police assistance is needed to secure footage, document your request
For your own recordings:
- Keep original files (with metadata intact)
- Avoid re-saving through apps that strip metadata
- Back up originals
E) Witness statements
Witnesses can be decisive for public harassment and workplace/school incidents.
- List witnesses promptly while memories are fresh
- Ask them to write a statement while details are clear
- Note how they witnessed it (saw/heard; distance; duration; lighting; etc.)
Formal affidavits are typically prepared later for legal proceedings, but early written accounts help.
F) Medical and psychological documentation
If harassment involved physical contact, injury, or trauma:
- Medical certificate and treatment records
- Photos of injuries (dated, multiple angles, include an object for scale)
- If you sought counseling/therapy, keep records of visits and diagnoses (if any)
Psychological harm can matter in cases like VAWC (psychological violence) and in damages claims.
G) Physical evidence
Depending on the case:
- Gifts/letters left at your door, notes, packages
- Clothing (if relevant)
- Objects used to intimidate
- Receipts showing travel to meet you, hotel bookings sent as threats, etc.
Store items in a clean envelope/bag; label date/time/how obtained.
H) Evidence of identity (who did it)
A common defense is “that wasn’t me.” Identity proof matters:
- Account profile info, handles, phone numbers, email addresses
- Screens showing the account logged in on a shared device
- Admissions (“yes, it was me” messages)
- Witnesses who saw the person send messages or commit acts
- Links between accounts (same photos, same phone number recovery, same writing patterns—use cautiously and focus on objective links)
For serious online cases, formal requests to platforms/telecoms may be needed; this is typically done through law enforcement or legal process.
I) Chain of custody and credibility tips
To strengthen admissibility and credibility:
- Keep originals and duplicates
- Don’t modify files
- Use a consistent folder naming system (e.g.,
2026-01-10_FBMessages,2026-01-12_CCTVRequest) - Record how/when you captured each item
- If you printed screenshots, keep a record of the device used and the capture date
A simple “evidence index” spreadsheet/list can help:
- Exhibit number
- Description
- Date created
- Where stored
- What it proves
8) What to expect when filing a complaint (high-level)
While procedures vary by locality and case type, many complaints follow a pattern:
Initial report / documentation
- Police blotter entry or incident report
- For workplace/school: written complaint to the designated office
Affidavit and supporting documents
- You (and witnesses) may execute sworn statements
- Attach screenshots, logs, medical records, photos, etc.
Case evaluation and possible inquest/preliminary investigation
- Prosecutor evaluates whether there is probable cause
- Respondent may file counter-affidavits
Filing in court
- If probable cause is found, the case is filed and proceeds through court stages
For administrative cases, expect:
- Notice to the respondent
- Investigation/hearing steps
- Interim measures possible
- Decision and sanctions if proven
9) Practical strategy: match facts to the strongest remedies
Because “harassment” can be charged in different ways, a practical approach is:
If it’s sexual/gender-based (public/work/school/online)
- Document the sexual/gendered content, frequency, setting, and impact.
- RA 11313 (Safe Spaces) is often central.
If it’s authority-based sexual coercion (boss/professor)
- Document the authority relationship and the “condition” (favor demanded, threat to grade/job).
- RA 7877 becomes more relevant.
If it’s repeated unwanted contact and monitoring
- Build a pattern: repeated messages, visits, surveillance, third-party contacts, appearances at your locations.
- Your timeline + corroboration (CCTV, witnesses, logs) is key.
If it’s threats/coercion
- Preserve the exact words, the context, and any acts showing capacity to carry out threats.
- Report promptly; threats are treated more seriously when documented early.
If it’s reputational attacks online
- Preserve posts/comments, URLs, and engagement metrics.
- Consider libel/cyberlibel and civil damages, but be aware these are technical and fact-sensitive.
If it involves intimate images or sexual content shared without consent
- Preserve evidence but limit circulation.
- RA 9995 and related laws may apply; these cases often require careful handling to avoid further harm.
If the offender is a current/former partner
- RA 9262 may offer the most immediate protection leverage (including protection orders), depending on facts.
10) Common mistakes that weaken harassment cases
- Waiting too long to preserve posts/messages (content gets deleted)
- Only saving cropped screenshots without identifiers/timestamps
- Engaging in long back-and-forth arguments that muddy the narrative
- Publicly posting allegations without evidence (can create counterclaims)
- Not requesting CCTV preservation quickly
- Losing original files or only keeping re-uploaded copies that strip metadata
- Failing to document relationship status when RA 9262 is relevant
11) Digital safety and risk reduction while building your case
These steps don’t replace legal remedies, but they reduce ongoing harm:
- Tighten privacy settings, remove public phone/email
- Enable 2FA, change passwords, review account logins
- Audit what personal info is searchable (old posts, public directories)
- Tell trusted contacts not to share your location or info
- Consider a separate email/number for complaint-related communications
- Avoid in-person confrontations; keep communication documented
12) A concise “evidence checklist” you can follow
Identity
- Full name/aliases/handles
- Profile URLs, phone numbers, emails
- Screens linking the person to the account
Incident proof
- Screenshots with timestamps and context
- Screen recordings showing navigation and URLs
- Photos/videos (original files)
- CCTV request notes + footage if obtained
- Witness names and statements
Impact
- Medical records (if any)
- Therapy/counseling records (if any)
- Work/school impact (absences, transfer requests, performance issues tied to harassment)
- Journal entries contemporaneous to incidents
Reporting trail
- HR/school emails
- Barangay/police blotter details
- Complaint forms, acknowledgments, reference numbers
- Any responses from the harasser (admissions, apologies, continued threats)
13) Final notes on strength of a case (what decision-makers look for)
Across criminal, administrative, and civil tracks, decision-makers tend to focus on:
- Credibility and consistency (your timeline matches the records)
- Corroboration (witnesses, CCTV, logs, medical records)
- Authenticity of digital evidence (clear identifiers, preserved originals)
- Pattern (repetition and escalation, especially for stalking-like behavior)
- Harm and risk (threats, power imbalance, vulnerability, ongoing danger)
If you keep evidence organized, preserve originals, and document early, you dramatically improve your chances—regardless of which legal route you choose.