Legal Due Diligence for Investment Platforms and Possible Securities Fraud in the Philippines

1) Why “investment platforms” are high-risk from a legal standpoint

“Invesment platforms” is an umbrella term that can cover very different business models, each regulated differently in the Philippines:

  • Securities intermediation (brokerage, trading apps, investment houses)
  • Capital raising (crowdfunding, token sales, private placements, syndications)
  • Asset/wealth management (portfolio management, advisory, copy-trading, pooled funds)
  • Payments and e-money rails (cash-in/cash-out, wallets)
  • Lending/financing (P2P lending, notes, “fixed income” programs)
  • Virtual assets (exchanges, custodians, staking-like programs, “yield” products)
  • “Passive income” programs (often the source of Ponzi-style fraud)

The legal risk is that a platform marketed as “tech,” “membership,” “education,” “signals,” “community,” “e-commerce,” or “lending” may, in substance, be selling or facilitating the sale of securities—which triggers registration, licensing, disclosure, and anti-fraud rules.

A good due diligence process in the Philippine context focuses on two questions:

  1. What is being offered or sold (legally speaking)?
  2. Is the platform authorized to offer/sell/operate that activity in the Philippines?

2) Core Philippine legal framework (high-level map)

A. Securities Regulation Code (SRC, Republic Act No. 8799)

This is the center of gravity when the platform involves “investments,” “returns,” “profit-sharing,” “pooling,” or “raising money from the public.”

Key concepts:

  • Securities generally must be registered before being offered/sold to the public, unless an exemption applies.
  • Entities acting as brokers, dealers, salesmen, investment houses, exchanges, or other regulated intermediaries typically need SEC registration and licensing (and sometimes additional memberships/approvals depending on structure).
  • Anti-fraud provisions apply broadly: misstatements, omissions of material facts, manipulative schemes, and other deceptive conduct can trigger civil, administrative, and criminal exposure.

B. Revised Corporation Code (RCC) and SEC corporate rules

All platforms operating through Philippine entities must comply with corporate requirements (incorporation, governance, beneficial ownership disclosures, capital structure, reportorial filings).

C. BSP / payments / e-money / banking laws

If the platform touches:

  • Deposits or deposit-like products,
  • Payment services, e-money, or wallets,
  • Remittance, money service business features,
  • Or functions that resemble banking, then BSP regulation becomes central. In many cases, the platform must be registered/authorized as an appropriate BSP-supervised entity or agent/partner of one.

D. AMLA (Anti-Money Laundering Act, RA 9160 as amended) and AMLC rules

Investment platforms are frequently used to launder proceeds. If the platform is a “covered person” or dealing with covered transactions, AML obligations can include:

  • Customer due diligence (CDD/KYC)
  • Suspicious transaction reporting (STR)
  • Record-keeping
  • Sanctions screening Even when not clearly a “covered person,” strong AML controls are often expected by banks, investors, and counterparties.

E. Consumer protection, advertising, and fair marketing

Platforms marketed to retail users face legal exposure from:

  • Misleading advertising claims (“guaranteed,” “risk-free,” “sure profit”)
  • Unfair contract terms
  • Improper disclosure of fees, risks, and conflicts

F. Data Privacy Act (RA 10173)

KYC, biometrics, IDs, and financial data trigger strict privacy and security requirements:

  • Lawful basis for processing
  • Transparency and consent practices (where applicable)
  • Data protection measures, breach response
  • Vendor and cross-border transfer controls

G. Criminal statutes commonly used in investment fraud cases

Beyond the SRC, Philippine enforcement often involves:

  • Estafa (fraud) under the Revised Penal Code
  • Syndicated estafa (commonly invoked in large-scale investment scams)
  • Cybercrime (RA 10175) when online systems are used to perpetrate fraud
  • Forgery / falsification offenses when documents are fabricated
  • Illegal recruitment is sometimes bundled in “investment” schemes tied to hiring promises

3) What counts as a “security” in practice (substance over labels)

Many schemes avoid the word “investment” but still function as securities offerings. A practical lens:

A. Common “security-like” features

A product tends to look like a security when it involves:

  • Money contributed by participants,
  • Expectation of profits/returns,
  • Profits derived primarily from the efforts of others (the promoter/platform),
  • Pooling of funds or collective enterprise,
  • Distribution of profits, “dividends,” “shares,” or “yield,”
  • Marketing to the public rather than a small, controlled set of qualified counterparties.

B. Examples of structures that frequently become securities issues

  • “Fixed daily/weekly/monthly returns” programs
  • “Capital guarantee” claims
  • “VIP tiers” where higher contributions generate higher “passive income”
  • “Arbitrage bots,” “AI trading,” copy-trading where users merely deposit and wait
  • “Revenue-sharing” from a business the participant does not control
  • Token sales tied to profit, platform revenue, buyback promises, or staking-like yield
  • Notes, promissory instruments, or “lend to the company and earn” products offered broadly

C. The “public offering” trigger

Even if a platform claims a “private” program, it can be treated as public offering if it is marketed widely (social media, referrals, events, mass onboarding) or if the investor base is effectively open-ended.


4) Philippine regulatory roles: who regulates what (functional view)

A. SEC: the default regulator for “investment” and capital raising

Likely SEC-regulated:

  • Sale/offering of securities
  • Crowdfunding / pooled investment programs (depending on structure)
  • Broker/dealer/salesman functions
  • Investment solicitation and distribution arrangements

B. BSP: money, payments, and banking-adjacent activities

Likely BSP-regulated:

  • E-money issuance / wallets
  • Payment service operations
  • Deposit-taking or deposit-like products
  • Remittance/money service business functions
  • Virtual asset service providers (where treated as such in BSP frameworks)

C. Insurance Commission (IC): insurance-like products

If the “investment platform” sells:

  • Insurance, variable products, pre-need, or investment products packaged as insurance, IC involvement becomes critical.

D. Cooperative Development Authority (CDA): cooperatives

Some schemes route fundraising through cooperatives; that does not automatically exempt securities issues, but it changes governance and regulatory posture.


5) Due diligence goals: what you are trying to prove

Legal due diligence for an investment platform usually aims to answer:

  1. Entity legitimacy

    • Real corporate existence, good standing, correct ownership and control
  2. Regulatory authorization

    • Proper registrations, licenses, secondary licenses, and scope compliance
  3. Product legality

    • The offered product is not an unregistered security and is not deposit-taking
  4. Disclosure integrity

    • Marketing and investor communications are not misleading; risks are disclosed
  5. Funds flow integrity

    • Clear custody, segregation, reconciliation, and audit trails
  6. Governance and accountability

    • Decision rights, conflicts management, complaint handling, incident response
  7. Enforcement and litigation risk

    • Past warnings, cease-and-desist exposure, complaints, criminal referrals

6) A Philippine due diligence checklist (practical and document-driven)

A. Corporate, ownership, and governance

Request and validate:

  • Articles of Incorporation and By-Laws; amendments
  • GIS (General Information Sheet) filings and latest beneficial ownership information
  • Secretary’s Certificates / Board Resolutions authorizing offerings and key contracts
  • Cap table, share issuances, option pools, convertible instruments
  • Parent/subsidiary structure; offshore entities; nominee arrangements
  • Background checks on directors/officers/beneficial owners (identity, track record, disqualifications)

Red flags:

  • “Borrowed” corporations or sudden changes in directors
  • Complex offshore layering with no business reason
  • Undisclosed beneficial owners or frequent ownership reshuffles

B. Regulatory status and permissions

A robust diligence pack includes:

  • SEC registrations relevant to the activity (not just a certificate of incorporation)
  • Any SEC secondary licenses if the business involves securities activities
  • Evidence of compliance with reportorial requirements
  • BSP authorizations if handling payments/e-money/remittance/virtual assets
  • Any IC registrations if insurance-linked
  • Local permits, business registration, BIR/tax registrations

Red flags:

  • “We’re registered with the SEC” used as a catch-all (incorporation ≠ licensed to sell investments)
  • Licenses that belong to an affiliate but are used to market a different entity’s product
  • “Pending license” while already soliciting funds

C. Product and offering analysis (the heart of securities diligence)

Collect:

  • Whitepaper/term sheet/plan mechanics
  • Subscription agreements, user agreements, risk disclosures
  • Pitch decks, social media scripts, referral materials, webinars
  • Return computation logic and historical performance claims
  • Evidence of how profits are generated (counterparty contracts, trading logs, audited financials)

Analyze:

  • Is it a security under Philippine standards in substance?
  • Is it a public offering?
  • If claimed as exempt/private placement: is distribution consistent with that claim?
  • Are there guarantees or capital protection representations?
  • Are funds pooled? Who controls trading/investment decisions?

Red flags:

  • Guaranteed returns, “no risk,” “principal protected”
  • Vague strategies (“AI does it,” “secret arbitrage”)
  • Returns funded by new deposits (classic Ponzi structure indicators)
  • Aggressive referral incentives tied to deposits

D. Intermediation: broker/dealer/sales and marketing compliance

Request:

  • Details of who solicits investments (employees vs agents vs “community leaders”)
  • Compensation plans, commissions, referral structures
  • Training materials and compliance scripts
  • Policies for suitability/appropriateness (especially for retail)

Red flags:

  • “Influencer armies” compensated per deposit
  • Commission structures resembling multi-level recruitment
  • Sales scripts downplaying risk and pushing urgency

E. Funds flow, custody, and financial controls

Demand clarity on:

  • Where investor money lands (bank accounts, wallets, custodians)
  • Segregation of client funds vs operating funds
  • Authority matrix: who can move funds, dual controls, approval workflows
  • Reconciliations, audit trails, internal controls
  • External audit reports, if any; quality of auditors
  • Related-party transactions and treasury management

Red flags:

  • Funds routed to personal accounts or unrelated businesses
  • No segregation; no reconciliation
  • “Custody” handled by unaccountable individuals
  • Heavy reliance on cash or informal remittance channels

F. AML/KYC compliance and banking readiness

Request:

  • AML policies, risk assessments, KYC procedures
  • Identity verification steps and records
  • Transaction monitoring approach
  • STR escalation workflow and training logs
  • Sanctions screening practices
  • Vendor due diligence for KYC providers

Red flags:

  • “No KYC needed” while handling significant volumes
  • Encouraging use of third-party accounts
  • Failure to document source of funds for large deposits

G. Data privacy and cybersecurity

Request:

  • Privacy notices, consent flows, retention schedules
  • Data processing inventory (what data, why, where stored)
  • Security policies, encryption at rest/in transit, access controls
  • Incident response plan; breach notification playbooks
  • Vendor contracts, cross-border transfer safeguards

Red flags:

  • Storing IDs/biometrics in unsecured systems
  • Broad data collection without clear purposes
  • No incident response plan

H. Contracts and legal exposure

Collect:

  • Platform user terms, dispute clauses, arbitration/venue, governing law
  • Key vendor agreements (payment processors, custodians, liquidity providers)
  • IP ownership (code, trademarks), developer assignments
  • Employment/contractor agreements and non-competes/confidentiality
  • Pending litigation, demand letters, regulatory inquiries

Red flags:

  • Contracts that allow unilateral changes to returns/fees without disclosure
  • Dispute clauses that are oppressive to consumers (higher scrutiny risk)
  • Missing IP assignments (code owned by a freelancer ex-post)

I. Tax and accounting

Assess:

  • Revenue recognition consistency with claimed business model
  • Withholding taxes on commissions/agents
  • VAT implications (services, platform fees)
  • Cross-border tax issues if offshore entities are used

Red flags:

  • Commissions paid off-ledger
  • “Profits” paid as marketing expense
  • No coherent tax posture despite high inflows

7) Detecting possible securities fraud: patterns and legal theories

A. Unregistered securities offering + fraudulent solicitation

A common enforcement posture is:

  1. the product is a security (in substance),
  2. it was offered to the public without proper registration/authority,
  3. marketing contains misstatements/omissions or deceptive schemes.

Typical misrepresentations:

  • Fake or inflated performance reports
  • Fabricated audits or “regulated in X country” claims
  • Misstating custody (“funds are held with…”)
  • Concealing conflicts (promoters trading against clients)
  • Misrepresenting how returns are generated

B. Ponzi and pyramid indicators (investment flavor)

While “Ponzi” and “pyramid” are often used colloquially, diligence looks for mechanics:

  • Returns paid primarily from new investor funds
  • Recruitment incentives that dominate economics
  • Lack of verifiable external revenue sufficient to cover payouts
  • Constant pressure to “reinvest” and “upgrade tiers”
  • Difficulty withdrawing; “maintenance,” “verification,” or “tax” fees demanded before release

C. Deposit-taking risk (banking boundary)

Platforms promising:

  • capital preservation,
  • fixed interest,
  • on-demand redemption, may be alleged to be engaging in deposit-taking or quasi-banking activities depending on structure, which is heavily regulated.

D. Fraud + estafa + syndicated estafa

In Philippine practice, large-scale retail investment scams often lead to:

  • Estafa complaints (deceit, abuse of confidence)
  • Syndicated estafa allegations where group activity and multiple victims are present
  • Asset freezes and criminal proceedings alongside SEC action

E. Cyber-enabled fraud

Where online systems, social media, or apps are used:

  • fake dashboards showing “profits,”
  • impersonation,
  • phishing and identity misuse, cybercrime exposure often stacks on top of investment fraud allegations.

8) How regulators and complainants typically build cases

Understanding enforcement mechanics informs diligence.

A. Evidence that matters most

  • Marketing claims (screenshots, videos, scripts)
  • Proof of solicitation to the public
  • Contracts and receipts showing money in / money out
  • Bank records and wallet trails
  • Internal chats showing knowledge of insolvency or fabricated returns
  • Lack of registration/licensing documentation

B. Early warning signals in the ecosystem

  • Complaints spikes: delayed withdrawals, changing terms, “system upgrade”
  • Sudden rebranding / migration to a new app/entity
  • Aggressive “damage control” narratives: blaming banks, regulators, or “hackers”
  • “Legal opinions” that are generic, unsigned, or from unknown sources

9) Due diligence methods: how to test claims (without relying on narratives)

A. Document authentication and triangulation

  • Match corporate documents to signatories and board approvals
  • Validate whether licenses actually cover the specific activity and entity name
  • Compare marketing statements to contractual disclosures (misalignment is a major fraud indicator)

B. Funds-flow reconstruction

Create a simple map:

  1. Investor → where funds are sent (account/wallet)
  2. Where funds go next (custody/trading/related parties)
  3. How returns are generated (revenue source)
  4. How payouts occur (source of payout funds) If step (3) is unverifiable and step (4) correlates to new deposits, risk is extreme.

C. “Operational reality” testing

  • Is there an actual trading desk, investment committee, or documented strategy execution?
  • Are there audited financial statements showing external revenue?
  • Are there credible counterparties (custodians/liquidity providers) with contracts?

D. Governance stress test

  • Who can unilaterally change terms?
  • Who can move funds?
  • Are there independent directors or controls?
  • Are conflicts disclosed and managed?

10) Contract and disclosure essentials (Philippine investor-protection posture)

A legally robust platform typically has:

A. Clear risk disclosures

  • Market, liquidity, counterparty, technology, regulatory risk
  • No misleading “guarantees” unless lawfully supported and accurate
  • Plain-language disclosures for retail users

B. Transparent fees and conflicts

  • Trading spreads, platform fees, performance fees, withdrawal fees
  • Conflicts: principal trading, affiliates, rebates, referral incentives

C. Redemption/withdrawal rules that are not deceptive

  • Objective processing times
  • Conditions clearly stated
  • No hidden “unlock” payments or arbitrary freezes

D. Proper dispute handling

  • Complaint handling procedures
  • Consumer-friendly support and escalation
  • Reasonable venue/arbitration clauses (overly oppressive provisions can backfire)

11) Specialized areas: virtual assets and “yield” products

Virtual asset platforms often sit at the intersection of:

  • payments regulation,
  • securities regulation (if token is investment-like),
  • AML risk,
  • consumer protection,
  • cybersecurity.

High-risk “yield” designs:

  • “staking” marketed as guaranteed or fixed return
  • “earn” programs that pool deposits and lend/trade without clear disclosure
  • proprietary tokens tied to platform revenue with buyback promises

Due diligence focus points:

  • Legal characterization of tokens (utility vs investment characteristics)
  • Custody model (who holds keys, segregation)
  • Market integrity (liquidity, wash trading risk)
  • Disclosures on rehypothecation and lending of user assets

12) Practical red-flag matrix (fast screening)

High severity red flags (often deal-killers)

  • Guaranteed returns or principal protection claims without a lawful, verifiable basis
  • Wide retail solicitation with no meaningful regulatory authorization
  • Inability to explain verifiable revenue source sufficient to fund returns
  • Withdrawal restrictions that appear ad hoc or worsening over time
  • Funds flowing to personal accounts or opaque related parties
  • Heavy reliance on recruitment commissions tied to deposits

Moderate severity red flags (require deeper investigation)

  • Complex offshore structures with unclear purpose
  • Incomplete governance and controls; single-person control of treasury
  • Marketing more aggressive than contractual disclosures
  • Weak KYC/AML, especially with high volumes

Lower severity (fixable but important)

  • Privacy notice gaps
  • Vendor contract weaknesses
  • Reportorial compliance slippage (if promptly curable)

13) Liability landscape for founders, officers, promoters, and investors

A. Platform operators and promoters

Possible exposures:

  • SEC administrative sanctions (cease and desist, penalties)
  • Criminal liability under securities laws for fraudulent offerings/sales
  • Civil liability for misrepresentation and investor losses
  • Criminal fraud (estafa/syndicated estafa), cybercrime where applicable
  • AML exposure if laundering indicators are ignored or facilitated

Personal exposure risk increases when individuals:

  • are public faces soliciting funds,
  • sign contracts and acknowledgments,
  • control bank accounts/wallets,
  • approve marketing claims,
  • direct payouts while insolvent.

B. Investors and strategic partners

Even passive investors can face reputational and legal risk if they:

  • knowingly aid solicitation,
  • profit from referral schemes,
  • serve as “introducers” without proper compliance,
  • ignore obvious red flags and still promote.

14) Building a defensible due diligence file (what “good” looks like)

A defensible diligence record typically includes:

  1. Regulatory memo: activity mapping → required authorizations → gaps and mitigations
  2. Product characterization memo: why it is or is not a security; offering classification
  3. Marketing audit: catalog of claims; corrections; approval workflow
  4. Funds flow map: custody, segregation, reconciliation, audit results
  5. Governance pack: board oversight, controls, conflict policy, incident response
  6. Compliance pack: AML/KYC program, privacy program, consumer complaints process
  7. Legal risk register: issues, severity, remediation owners, timelines

15) Key takeaways (Philippine context)

  • The Philippines treats “investment” activity primarily through substance: if people put in money expecting profits from others’ efforts, securities law risk is front and center.
  • “SEC-registered company” is not the same as authorized to solicit investments.
  • Most large retail “fixed return” programs that solicit widely and cannot prove external revenue are vulnerable to being treated as unregistered securities offerings and, where deceptive, as fraud.
  • A rigorous diligence process is document-led: licensing scope, product characterization, marketing truthfulness, and funds-flow integrity are the highest-value checks.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.