Legal Remedies for Employee Fraud and Solicitation of Money from Clients

I. Introduction

Employee fraud is a serious legal and business problem in the Philippines. It becomes especially damaging when an employee misuses the employer’s name, position, access, client relationships, company records, or apparent authority to solicit money from clients for personal benefit.

This situation may arise when an employee asks clients to pay money directly to the employee, invest in a supposed company project, advance payment outside official channels, pay “processing fees,” participate in a side business, or settle invoices through unauthorized accounts. It may also occur when an employee uses company data, invoices, official receipts, emails, social media pages, messaging apps, or client trust to deceive customers.

The employer may have several remedies: internal disciplinary action, termination for just cause, civil recovery, criminal complaint, regulatory reporting, protective notices to clients, data privacy response, labor law compliance, and preventive policy reform. Clients who were defrauded may also have claims against the employee and, in some cases, may attempt to hold the employer liable depending on the facts.

The legal response must therefore be careful. The employer should act quickly to preserve evidence and protect clients, but must also observe due process, avoid premature defamatory statements, and ensure that any dismissal complies with Philippine labor law.


II. Common Forms of Employee Fraud Involving Clients

Employee fraud involving solicitation of money from clients may take many forms, including:

  1. Unauthorized collection of payments The employee collects money from clients but does not remit it to the employer.

  2. Use of personal bank or e-wallet accounts The employee instructs clients to send payments to a personal bank account, GCash, Maya, remittance account, or cryptocurrency wallet.

  3. Fake company fees The employee asks clients to pay processing fees, facilitation fees, taxes, documentation charges, reservation fees, or “expedite” payments not authorized by the company.

  4. False investment solicitation The employee tells clients that the company has an investment opportunity, expansion plan, special project, lending pool, real estate venture, trading account, or financing arrangement.

  5. Side transactions using company relationships The employee offers products or services privately to company clients, sometimes competing with the employer or diverting business.

  6. Forgery of receipts and documents The employee issues fake receipts, altered invoices, fabricated contracts, or unauthorized acknowledgments.

  7. Misrepresentation of authority The employee claims to have authority to collect, approve, discount, waive, release, or process transactions when no such authority exists.

  8. Kickbacks and commissions The employee solicits money from clients or suppliers in exchange for preferential treatment.

  9. Client data misuse The employee uses customer lists, contact details, transaction history, or confidential information to solicit money.

  10. Online impersonation The employee creates or uses fake company pages, email addresses, social media accounts, or messaging profiles to deceive clients.

  11. Post-employment fraud A former employee continues contacting clients and pretending to represent the company.

  12. Collusion with outsiders The employee works with third parties to defraud clients or divert company funds.

These acts may give rise to employment, civil, criminal, corporate, tax, data privacy, and reputational consequences.


III. Initial Legal Assessment

When fraud is discovered, the employer should identify the legal nature of the conduct. The following questions are important:

  1. Was the employee acting within assigned duties or outside authority?
  2. Did the employee use company name, documents, email, logo, client database, or official position?
  3. Did the client pay the employee personally or pay an official company account?
  4. Was the money intended for the company, the employee, or a fake opportunity?
  5. Was there deceit, misrepresentation, falsification, or abuse of confidence?
  6. Did the employee receive and misappropriate funds?
  7. Were company records altered?
  8. Were official receipts issued?
  9. Did other employees participate?
  10. How many clients were affected?
  11. Was the conduct done online or through electronic means?
  12. Did the employee access or misuse personal data?
  13. Did the employee continue after being warned?
  14. Did the company suffer financial loss, reputational harm, or legal exposure?

The answers determine the appropriate remedies.


IV. Immediate Steps for the Employer

The employer should act promptly but carefully.

1. Preserve evidence

The company should secure:

  • emails;
  • chat messages;
  • client complaints;
  • payment receipts;
  • bank or e-wallet transaction records;
  • invoices;
  • official receipts;
  • CCTV footage;
  • call recordings, if lawfully obtained;
  • CRM records;
  • access logs;
  • company-issued device contents, subject to policy and law;
  • social media posts;
  • screenshots;
  • client statements;
  • internal approvals;
  • audit trails;
  • accounting records;
  • payroll and commission records;
  • employment documents;
  • company policies signed by the employee.

Evidence should be preserved in original form where possible. Screenshots are useful, but the company should also preserve native files, metadata, system logs, and original communications.

2. Restrict access

If there is reasonable basis, the company may consider temporarily restricting access to:

  • client databases;
  • email accounts;
  • payment systems;
  • accounting software;
  • CRM platforms;
  • company devices;
  • official social media pages;
  • confidential documents;
  • premises or sensitive areas.

The restriction should be proportionate and documented.

3. Conduct an internal investigation

The company should appoint an investigator or committee, ideally involving HR, legal, finance, compliance, IT, and the business unit concerned.

The investigation should establish:

  • what happened;
  • who was involved;
  • how much was collected;
  • from whom;
  • through what channels;
  • when it occurred;
  • whether company records were altered;
  • whether clients were misled;
  • whether there was a pattern;
  • whether the company has exposure;
  • what remedial steps are needed.

4. Interview witnesses

The company may interview clients, co-employees, supervisors, accounting personnel, and other relevant persons. Written statements should be obtained where possible.

5. Avoid premature public accusations

The company should not immediately publish accusations unless necessary and carefully worded. Public statements should be factual, restrained, and preferably reviewed by counsel.

6. Consider preventive suspension

If the employee’s continued presence poses a serious and imminent threat to company property, operations, evidence, witnesses, or clients, preventive suspension may be considered subject to labor law limits.


V. Employment Law Remedies

Employee fraud may justify disciplinary action, including dismissal, if the facts support it and due process is observed.

A. Just Causes for Dismissal

Under Philippine labor law, an employee may be dismissed for just causes, including:

  1. Serious misconduct
  2. Willful disobedience of lawful orders
  3. Gross and habitual neglect of duties
  4. Fraud or willful breach of trust
  5. Commission of a crime or offense against the employer or the employer’s representative
  6. Other analogous causes

In cases involving solicitation of money from clients, the most relevant grounds are usually serious misconduct, fraud, willful breach of trust, and commission of an offense.

B. Fraud or Willful Breach of Trust

Fraud or willful breach of trust is often the strongest employment ground where the employee holds a position of confidence or handles clients, money, documents, accounts, sales, collections, or company property.

An employee may commit breach of trust by:

  • collecting money without authority;
  • diverting company funds;
  • using personal accounts for client payments;
  • hiding transactions;
  • falsifying records;
  • misusing client relationships;
  • soliciting personal loans or investments from clients using company influence;
  • misrepresenting company policy;
  • concealing complaints;
  • failing to remit collections.

For managerial employees and employees occupying positions of trust, loss of confidence may justify dismissal if based on a willful breach and supported by substantial evidence.

C. Serious Misconduct

Serious misconduct may exist where the employee’s acts are grave, improper, wrongful, and connected to work. Soliciting money from clients under false pretenses may be considered serious misconduct because it damages the employer’s trust, reputation, and client relationships.

D. Willful Disobedience

If the company has clear rules prohibiting unauthorized collections, personal dealings with clients, use of personal accounts, side transactions, or solicitation of money, violation of those rules may constitute willful disobedience.

To support this ground, the employer should show:

  1. the order or policy was lawful;
  2. the policy was known to the employee;
  3. the policy was reasonable and related to business;
  4. the employee intentionally violated it.

E. Analogous Causes

Even if the act does not neatly fall into a listed just cause, it may be treated as analogous where it is similar in gravity and effect to recognized grounds. Fraudulent solicitation from clients may be analogous to fraud, breach of trust, or serious misconduct.


VI. Procedural Due Process in Employee Discipline

Even if the evidence of fraud appears strong, the employer must observe procedural due process. Failure to do so may expose the employer to liability for nominal damages, and in some cases may weaken the dismissal.

The usual process for dismissal based on just cause is the twin-notice and hearing requirement.

A. First Notice: Notice to Explain

The first written notice should state:

  1. the specific acts or omissions complained of;
  2. the company rules or legal grounds allegedly violated;
  3. the relevant dates, transactions, clients, and amounts, if known;
  4. the possible penalty, including dismissal if applicable;
  5. a reasonable period for the employee to submit a written explanation.

The notice should be specific enough to allow the employee to respond meaningfully. Vague accusations such as “fraud” or “dishonesty” without details may be insufficient.

B. Opportunity to Be Heard

The employee must be given a real opportunity to explain. This may be through:

  • a written explanation;
  • an administrative conference;
  • a hearing;
  • submission of documents;
  • presentation of witnesses.

A formal trial-type hearing is not always required, but if requested or if facts are contested, an administrative conference is often advisable.

C. Second Notice: Notice of Decision

After considering the evidence and the employee’s explanation, the employer should issue a written decision stating:

  1. the facts established;
  2. the company policies or legal grounds violated;
  3. the reasons for the penalty;
  4. the effective date of dismissal or lesser sanction.

The decision should be based on substantial evidence.


VII. Preventive Suspension

Preventive suspension is not a penalty. It is a temporary measure to protect the company while investigation is pending.

It may be justified where the employee’s continued presence poses a serious and imminent threat to:

  • company property;
  • client accounts;
  • witnesses;
  • evidence;
  • confidential information;
  • business operations;
  • workplace safety.

In fraud cases, preventive suspension may be appropriate where the employee can still contact clients, alter records, pressure witnesses, destroy documents, or access funds.

However, preventive suspension should not be abused. It must be reasonable and consistent with Philippine labor standards.


VIII. Standard of Proof in Administrative Discipline

In employee discipline, the standard is generally substantial evidence, not proof beyond reasonable doubt. Substantial evidence means such relevant evidence as a reasonable mind might accept as adequate to support a conclusion.

This means the employer does not need to prove the fraud with the same strictness required in criminal prosecution. However, the evidence must still be real, documented, and logically connected to the charge.

Useful evidence includes:

  • client affidavits;
  • transaction receipts;
  • chat messages;
  • bank deposit slips;
  • screenshots;
  • internal audit findings;
  • accounting discrepancies;
  • admission by the employee;
  • unauthorized use of company materials;
  • records showing personal receipt of funds;
  • failure to remit collections.

IX. Criminal Remedies

Employee fraud and solicitation of money from clients may constitute criminal offenses. The exact charge depends on the facts.

A. Estafa

Estafa is one of the most common criminal charges in fraud cases.

Estafa may arise where an employee defrauds a client or employer through deceit, abuse of confidence, or misappropriation.

1. Estafa by deceit

This may occur where the employee falsely represents that:

  • the company authorized the payment;
  • the employee is authorized to collect;
  • the money is required for processing;
  • the client will receive a product, service, approval, refund, loan, discount, release, or investment return;
  • the payment will go to the company;
  • the employee is acting officially.

If the client relies on the false representation and parts with money, estafa by deceit may be considered.

2. Estafa with abuse of confidence or misappropriation

This may occur where the employee receives money in trust, on commission, for administration, or with an obligation to deliver or return it, but misappropriates or converts it.

Examples:

  • collector receives client payments but keeps them;
  • sales agent accepts down payment but does not remit it;
  • employee receives company funds for a client transaction but uses them personally;
  • employee takes client money supposedly for documentation but diverts it.

3. Estafa against the employer or client

Depending on the facts, the offended party may be:

  • the client who was deceived into paying;
  • the employer whose funds or reputation were damaged;
  • both the client and employer.

If the client paid the employee believing the payment was for the company, both client and employer may have interests in the case.


B. Qualified Theft

Qualified theft may apply where the employee unlawfully takes property belonging to the employer, with grave abuse of confidence.

This may be relevant when:

  • the employee takes company money;
  • the employee steals company property;
  • the employee receives payments that are company property and appropriates them;
  • the employee has access to funds because of employment.

The distinction between estafa and qualified theft can be fact-sensitive. Generally, if juridical possession was entrusted to the employee and then misappropriated, estafa may be considered. If the employee had only material possession or access and unlawfully took the property, qualified theft may be considered.

The classification affects the complaint, evidence, and penalties.


C. Falsification of Documents

Falsification may be involved if the employee:

  • creates fake receipts;
  • alters invoices;
  • forges signatures;
  • fabricates contracts;
  • changes payment instructions;
  • issues false acknowledgments;
  • tampers with official records;
  • alters bank details in documents;
  • uses fake company letterhead;
  • falsifies liquidation reports;
  • fabricates client approvals.

Falsification may be charged separately or together with estafa, depending on how the documents were used.


D. Other Deceits

Some fraudulent conduct may fall under other forms of deceit, depending on the value, method, and facts. Where the fraud does not meet all elements of estafa, other offenses under the Revised Penal Code may be considered.


E. Cybercrime

If the fraud was committed through information and communications technology, cybercrime implications may arise.

Examples include:

  • solicitation through email;
  • fraudulent Facebook or LinkedIn messages;
  • fake company website;
  • use of online payment links;
  • use of messaging apps;
  • forged digital documents;
  • fake e-receipts;
  • online impersonation of the company;
  • unauthorized access to systems;
  • deletion or alteration of digital records.

Where estafa is committed using ICT, cybercrime provisions may increase legal exposure. Separate offenses may also arise from illegal access, computer-related fraud, identity misuse, or data interference, depending on the facts.


F. Unauthorized Use of Access Devices or Payment Methods

If the employee used credit cards, account credentials, payment gateways, electronic wallets, or access devices without authority, additional offenses may be considered under applicable laws.

Examples include:

  • unauthorized use of company payment accounts;
  • diversion of payment links;
  • use of client card details;
  • fraudulent online transactions;
  • manipulation of payment instructions.

G. Data Privacy Violations

If the employee misused client personal data, there may be consequences under data privacy law.

Examples:

  • extracting client lists for personal solicitation;
  • using client phone numbers to solicit money;
  • selling client data;
  • disclosing confidential client records;
  • accessing personal data without authority;
  • using personal data for fraudulent purposes;
  • retaining client information after employment.

The employer may need to investigate whether a personal data breach occurred and whether notification duties are triggered.


H. Anti-Money Laundering Concerns

Large-scale employee fraud may involve laundering of proceeds through personal bank accounts, e-wallets, nominees, shell businesses, crypto wallets, or remittance channels.

The employer and victims may need to preserve transaction records and coordinate with financial institutions and law enforcement. In appropriate cases, suspicious transaction reporting and asset preservation may become relevant.


X. Civil Remedies

The employer and affected clients may pursue civil remedies to recover losses and damages.

A. Collection or Recovery of Money

The employer may demand return of:

  • unremitted collections;
  • stolen funds;
  • unauthorized commissions;
  • diverted payments;
  • company property;
  • damages arising from client claims.

Clients may demand return of amounts paid to the employee, especially where the payment was induced by fraud.

B. Damages

Depending on the facts, recoverable damages may include:

  • actual damages;
  • moral damages, in proper cases;
  • exemplary damages, in proper cases;
  • attorney’s fees;
  • litigation expenses;
  • interest;
  • reputational or business losses, if proven.

Actual damages must be proved with reasonable certainty.

C. Breach of Employment Contract

If the employee signed an employment agreement, confidentiality agreement, code of conduct, non-solicitation clause, conflict-of-interest policy, or accountability undertaking, the employer may invoke breach of contract.

The company may seek damages or other remedies based on contractual obligations.

D. Breach of Fiduciary Duty

Employees who occupy positions of trust may owe duties of loyalty, honesty, confidentiality, and faithful service. Misusing client relationships for personal gain may be treated as a breach of these duties.

E. Unjust Enrichment

If the employee unjustly benefited from money, opportunities, commissions, or client payments at the expense of the employer or client, unjust enrichment principles may support recovery.

F. Injunction

An employer may seek injunctive relief to stop a current or former employee from:

  • contacting clients using company data;
  • using company name or logo;
  • collecting payments;
  • representing himself as connected with the company;
  • disclosing confidential information;
  • operating fake pages or accounts;
  • continuing fraudulent solicitations.

Injunction requires proper court action and proof of legal grounds.

G. Attachment

Where there is risk that the employee will dispose of assets to avoid recovery, provisional remedies such as attachment may be considered in proper cases. This requires court approval and compliance with procedural rules.


XI. Employer Liability to Clients

A major concern is whether the employer may be held liable for the employee’s fraudulent acts.

The answer depends on the facts.

A. General Rule

An employer is not automatically liable for every wrongful personal act of an employee. If the employee acted purely for personal benefit and outside the scope of employment, the employer may argue that the fraud was unauthorized and personal.

B. Possible Employer Exposure

However, clients may attempt to hold the employer liable where:

  1. the employee appeared authorized to collect money;
  2. the employee used official company documents;
  3. the company allowed the employee to handle payments;
  4. the company failed to supervise the employee;
  5. the payment was related to company business;
  6. the company accepted benefits from the transaction;
  7. the client reasonably believed the employee had authority;
  8. the company’s internal controls were weak;
  9. similar complaints were ignored;
  10. the fraud occurred through official company channels.

C. Apparent Authority

If the employee appeared to have authority because of the employer’s conduct, the client may argue that the company should bear responsibility.

For example, risk increases if:

  • the employee was the assigned account manager;
  • the employee used official email;
  • the employee was previously authorized to collect;
  • clients were not informed of official payment channels;
  • company invoices did not clearly identify authorized accounts;
  • the company tolerated informal payment arrangements.

D. Employer Defenses

The employer may defend by showing:

  • the employee had no authority;
  • clients were informed of official payment procedures;
  • company policies prohibited personal collections;
  • the client paid a personal account despite warnings;
  • the employee acted outside the scope of employment;
  • the company did not benefit;
  • the company acted promptly upon discovery;
  • the fraud was concealed despite reasonable controls.

E. Practical Approach

Even where the employer has legal defenses, reputational and commercial considerations may require careful client handling. The company may need to issue notices, assist with complaints, strengthen controls, and evaluate whether settlement is commercially advisable.


XII. Notice to Clients

When employee fraud affects clients, the company may need to notify them.

A client notice should be factual and careful. It may state:

  • official payment channels;
  • warning not to send money to personal accounts;
  • that certain persons are not authorized to collect;
  • request for clients to report suspicious solicitations;
  • contact details for verification;
  • that the company is investigating irregularities.

The notice should avoid unnecessary defamatory statements unless facts are already established and disclosure is legally necessary.

A sample neutral notice:

“Please be advised that payments to the company should be made only through the official channels listed below. No employee, agent, or representative is authorized to request payment to personal bank accounts, e-wallets, or private accounts. If you receive any request for payment outside official channels, please verify directly with our office before making any transfer.”

If the employee has already been dismissed or is no longer connected:

“Please be informed that [Name] is no longer connected with the company and is not authorized to transact, collect, or receive payments on our behalf. For your protection, please direct all transactions only to our official contact channels.”

Care must be taken when naming individuals publicly. The safer route is to consult counsel before wide publication.


XIII. Demand Letter to the Employee

Before or alongside legal action, the employer may send a demand letter.

The demand letter may include:

  1. identity of the employee;
  2. summary of employment position;
  3. description of fraudulent acts;
  4. list of clients and transactions involved;
  5. amount demanded;
  6. demand to return money and company property;
  7. demand to cease contacting clients;
  8. demand to stop using company name, logo, documents, or data;
  9. deadline for compliance;
  10. reservation of rights to pursue civil, criminal, administrative, and labor remedies.

A demand letter can support later claims, but it should be carefully drafted to avoid admissions or inconsistencies.


XIV. Complaint-Affidavit and Criminal Filing

A criminal complaint usually requires a complaint-affidavit and supporting evidence.

The complaint-affidavit should include:

  1. complainant’s identity and authority to represent the company;
  2. employee’s position and duties;
  3. how the fraud was discovered;
  4. detailed transaction timeline;
  5. names of affected clients;
  6. amounts solicited or collected;
  7. misrepresentations made;
  8. proof of payment;
  9. proof of non-remittance or misappropriation;
  10. company policies violated;
  11. client statements;
  12. employee’s explanations or admissions, if any;
  13. damages suffered;
  14. specific offenses alleged.

If clients are direct victims, their affidavits are important. A company representative may complain for company losses, but client testimony may be necessary to prove deceit used against clients.


XV. Evidence Checklist

The following evidence should be gathered:

Employment documents

  • employment contract;
  • job description;
  • code of conduct;
  • confidentiality agreement;
  • conflict-of-interest policy;
  • collection policy;
  • cash handling policy;
  • IT policy;
  • data privacy acknowledgments;
  • prior disciplinary records;
  • performance records;
  • authorization matrix.

Transaction documents

  • invoices;
  • official receipts;
  • acknowledgment receipts;
  • delivery receipts;
  • statements of account;
  • payment instructions;
  • deposit slips;
  • bank statements;
  • e-wallet transaction records;
  • remittance records;
  • reconciliation reports.

Digital evidence

  • emails;
  • screenshots;
  • chat logs;
  • CRM notes;
  • call logs;
  • website posts;
  • social media messages;
  • online forms;
  • payment links;
  • metadata;
  • access logs;
  • audit trails.

Witness evidence

  • client affidavits;
  • co-employee statements;
  • supervisor reports;
  • finance team findings;
  • IT reports;
  • audit reports.

Company evidence

  • proof of official payment channels;
  • proof that personal collections were prohibited;
  • prior announcements to clients;
  • internal control procedures;
  • proof of non-remittance;
  • accounting discrepancy reports.

XVI. Handling Digital Evidence

Digital evidence must be preserved properly.

The company should:

  1. export emails in native format where possible;
  2. preserve chat histories;
  3. take screenshots showing timestamps and sender identity;
  4. record URLs and account handles;
  5. preserve device images or logs if legally and technically appropriate;
  6. document who collected the evidence;
  7. maintain chain of custody;
  8. avoid altering original files;
  9. make working copies for review;
  10. obtain affidavits from persons who captured screenshots.

Poorly preserved digital evidence may be challenged later.


XVII. Internal Audit and Accounting Controls

After discovery, the company should conduct an internal audit to determine:

  1. total amount lost;
  2. total number of affected clients;
  3. period covered;
  4. accounts used;
  5. whether official records were manipulated;
  6. whether there were accomplices;
  7. whether supervisors failed to detect red flags;
  8. whether internal controls were inadequate;
  9. whether tax records are affected;
  10. whether financial statements need correction.

The audit report may support disciplinary action, criminal complaint, insurance claim, and civil recovery.


XVIII. Data Privacy Response

If the employee used client personal information without authorization, the company should assess whether a personal data breach occurred.

The response should include:

  1. identifying the personal data involved;
  2. determining whether data was accessed, copied, disclosed, or misused;
  3. assessing risk of harm to clients;
  4. containing further access;
  5. documenting the incident;
  6. notifying affected clients where appropriate;
  7. notifying the National Privacy Commission if legally required;
  8. strengthening access controls;
  9. disciplining responsible persons;
  10. reviewing data retention and access policies.

Even if the employee acted unlawfully, the company may still need to show that it had reasonable organizational, technical, and physical security measures.


XIX. Labor Case Risks for the Employer

An employee dismissed for fraud may file a complaint for illegal dismissal. The employer must be prepared to prove both substantive and procedural validity.

A. Substantive validity

The employer must show that there was a valid just cause, supported by substantial evidence.

B. Procedural validity

The employer must show compliance with due process:

  • first notice;
  • opportunity to explain;
  • second notice.

C. Possible consequences of defective dismissal

If dismissal is not properly supported, the employer may face:

  • reinstatement;
  • backwages;
  • separation pay in lieu of reinstatement in proper cases;
  • damages;
  • attorney’s fees.

If there was just cause but procedural due process was defective, the employer may still be liable for nominal damages.


XX. Resignation During Investigation

Employees accused of fraud sometimes resign to avoid discipline.

The employer should not automatically treat resignation as resolving the matter. It may still:

  1. continue investigation;
  2. accept or reject resignation depending on timing and policy;
  3. document pending accountabilities;
  4. demand return of money and property;
  5. pursue civil remedies;
  6. file criminal complaints;
  7. notify clients that the employee is no longer connected;
  8. revoke access immediately;
  9. conduct final pay clearance subject to legal limits.

Final pay should be handled carefully. Employers should avoid unlawful withholding, but may document claims and pursue proper remedies for recovery.


XXI. Final Pay, Offsetting, and Accountability

The employer may be tempted to deduct losses from final pay. This must be handled cautiously.

Deductions from wages are regulated. Unauthorized deductions can create labor exposure. The company should evaluate:

  1. whether the employee gave written authorization;
  2. whether the amount is admitted or established;
  3. whether deduction is allowed by law or contract;
  4. whether due process was observed;
  5. whether the company should instead file a claim.

Where the amount is disputed or substantial, it is usually safer to pursue recovery through proper legal channels rather than unilateral deductions.


XXII. Employee Loans, Commissions, and Incentives

If the employee earned commissions from fraudulent transactions, the employer may consider forfeiture or recovery if supported by contract or policy.

Questions include:

  1. Were commissions already earned under the compensation plan?
  2. Were they based on fraudulent transactions?
  3. Did the employee breach conditions for entitlement?
  4. Does the commission policy allow clawback?
  5. Were clients refunded?
  6. Were sales reversed?
  7. Was the employee unjustly enriched?

Clear written commission policies are important.


XXIII. Non-Solicitation and Conflict of Interest

Soliciting money from clients may violate conflict-of-interest and non-solicitation rules.

A strong company policy should prohibit employees from:

  1. borrowing money from clients;
  2. lending money to clients in connection with company transactions;
  3. soliciting investments from clients;
  4. offering side deals to clients;
  5. accepting gifts or commissions beyond allowed limits;
  6. using client data for personal gain;
  7. directing clients to personal accounts;
  8. representing private ventures as company-approved;
  9. competing with the company;
  10. transacting with clients after resignation using company data.

Violations should carry disciplinary consequences up to dismissal.


XXIV. Solicitation of Loans or Personal Financial Help from Clients

Not all solicitations are framed as business transactions. An employee may ask a client for a personal loan, emergency help, donation, or “temporary advance.”

This can still be a serious workplace offense, especially if:

  1. the request exploits the employee’s position;
  2. the client feels pressured;
  3. the employee implies company involvement;
  4. the client’s pending transaction may be affected;
  5. the employee promises preferential treatment;
  6. the employee uses confidential client information;
  7. the employee repeats the conduct with many clients.

Even without classic estafa, the conduct may justify discipline for misconduct, conflict of interest, abuse of position, or breach of trust.


XXV. Solicitation in Regulated Industries

The legal risk is higher in regulated industries such as:

  • banking;
  • insurance;
  • lending;
  • securities;
  • real estate;
  • healthcare;
  • education;
  • recruitment;
  • immigration services;
  • government contracting;
  • utilities;
  • payment services;
  • telecommunications.

In these industries, employee misconduct involving clients may trigger regulatory reporting, license issues, consumer protection concerns, or administrative penalties.

For example, an employee who solicits money for fake insurance premiums, investment products, loan approvals, employment placements, visas, permits, medical benefits, or real estate reservations may expose both the employee and company to additional legal scrutiny.


XXVI. Special Issue: Employee Represents That the Company Authorized the Solicitation

If the employee tells clients that the company authorized the money solicitation, the company must quickly establish the truth.

The company should verify:

  1. Was there any board approval?
  2. Was there management approval?
  3. Was there an authorized product or service?
  4. Were payment channels official?
  5. Were receipts issued?
  6. Did any supervisor know?
  7. Did the company benefit?
  8. Were similar solicitations tolerated?
  9. Were clients previously instructed to deal with the employee?
  10. Were company documents used?

If the solicitation was unauthorized, the company should promptly communicate official payment procedures and revoke any apparent authority.


XXVII. Special Issue: Employee Used Company Receipts

If an employee issued official receipts or apparently official receipts, the legal analysis becomes more complex.

Questions include:

  1. Were the receipts genuine or fake?
  2. If genuine, how did the employee access them?
  3. Were they recorded in the books?
  4. Were taxes reported?
  5. Did the company receive the money?
  6. Did the client reasonably rely on the receipt?
  7. Was there supervisory negligence?
  8. Were blank receipts properly controlled?

If genuine receipts were issued, the company may face stronger client claims, even if the employee later misappropriated the money. Internal control over receipts is therefore critical.


XXVIII. Special Issue: Employee Used Personal Account for Company Payments

Payments to personal accounts are a major red flag. However, in some businesses, informal practices may have been tolerated historically.

The company’s position is stronger if it can show that:

  1. personal collections were prohibited;
  2. clients were informed of official accounts;
  3. invoices displayed official payment details;
  4. employees were trained on payment policies;
  5. violations were disciplined;
  6. personal account use was not tolerated.

If management knew that employees commonly accepted client payments through personal accounts, the company may face greater risk.


XXIX. Special Issue: Employee Solicited “Investments” from Clients

If an employee solicits investment money from clients, additional legal issues arise.

The employee may claim it was a private transaction unrelated to the employer. The employer should determine whether:

  1. the employee used the company name;
  2. the employee claimed the investment was company-backed;
  3. the employee targeted company clients;
  4. the employee used client data;
  5. the employee solicited during work hours;
  6. company premises or email were used;
  7. other employees joined;
  8. the employer benefited;
  9. the activity competed with or damaged the employer;
  10. the investment involved securities law violations.

If clients were induced to invest because of the company relationship, reputational and legal risks are significant.


XXX. Special Issue: Employee Collected “Facilitation Fees”

Facilitation fees may be disguised bribes or fraudulent charges.

Examples include:

  • “approval fee”;
  • “release fee”;
  • “processing fee”;
  • “priority fee”;
  • “documentation fee”;
  • “clearance fee”;
  • “under-the-table fee”;
  • “expedite fee.”

Such conduct may violate company policy, anti-corruption principles, criminal law, and industry regulations. If public officers are involved, anti-graft concerns may also arise.


XXXI. Remedies Against Former Employees

If the person is no longer employed, the company may still pursue remedies.

Possible actions include:

  1. demand letter;
  2. cease-and-desist letter;
  3. criminal complaint;
  4. civil case for damages;
  5. injunction;
  6. notice to clients;
  7. data privacy complaint or response;
  8. recovery of company property;
  9. enforcement of confidentiality and non-solicitation agreements.

The company should immediately revoke access to all systems and notify clients that the person is no longer authorized.


XXXII. Remedies Against Co-Conspirators

Fraud may involve other employees, agents, relatives, suppliers, clients, or outsiders.

The company should investigate:

  1. who received the money;
  2. who provided account details;
  3. who created fake documents;
  4. who recruited clients;
  5. who approved transactions;
  6. who concealed complaints;
  7. who benefited from the scheme;
  8. who had access to records;
  9. who deleted evidence.

Civil and criminal complaints may include all persons who participated, benefited, conspired, or aided the fraud, if supported by evidence.


XXXIII. Role of Client Affidavits

Client affidavits are often crucial.

A good client affidavit should state:

  1. how the client knows the employee;
  2. what the employee represented;
  3. whether the employee used company name or position;
  4. what amount was requested;
  5. when and how payment was made;
  6. account or wallet used;
  7. what documents or receipts were issued;
  8. what the client expected in return;
  9. whether the company was believed to be involved;
  10. what happened after payment;
  11. whether refund was demanded;
  12. attachments proving the transaction.

Without client testimony, it may be harder to prove deceit, reliance, and damage.


XXXIV. Settlement Considerations

Settlement may arise between:

  • employer and employee;
  • client and employee;
  • employer and client;
  • all parties together.

Settlement may include:

  1. return of money;
  2. payment schedule;
  3. acknowledgment of debt;
  4. quitclaim;
  5. confidentiality clause;
  6. non-disparagement clause;
  7. turnover of documents;
  8. undertaking to stop contacting clients;
  9. cooperation in investigation.

However, settlement of civil liability does not always automatically extinguish criminal liability. The effect depends on the offense, timing, and applicable law.

The employer should be careful not to use settlement discussions in a way that appears coercive or inconsistent with labor rights.


XXXV. Insurance and Bond Claims

Some companies maintain fidelity bonds, employee dishonesty insurance, crime insurance, cyber insurance, or professional liability coverage.

The company should check whether the policy covers:

  • employee theft;
  • forgery;
  • computer fraud;
  • social engineering fraud;
  • funds transfer fraud;
  • client claims;
  • investigation costs;
  • legal defense;
  • notification costs;
  • reputational mitigation.

Insurance policies often have strict notice requirements. Late reporting may affect coverage.


XXXVI. Board and Management Responsibilities

Management should treat employee fraud as a governance issue.

The company should document:

  1. discovery of the incident;
  2. investigation steps;
  3. immediate controls;
  4. client protection measures;
  5. legal remedies pursued;
  6. financial exposure;
  7. regulatory issues;
  8. disciplinary action;
  9. corrective policies.

For corporations, directors and officers should ensure that the company responds in good faith, protects assets, complies with law, and avoids cover-ups.


XXXVII. Reputational Management

Fraud involving clients can damage trust. The company should balance transparency and legal caution.

Recommended measures include:

  1. designate one official spokesperson;
  2. give clients verified payment channels;
  3. avoid speculative statements;
  4. provide a secure reporting channel;
  5. coordinate with counsel before public statements;
  6. avoid naming suspects prematurely unless necessary;
  7. provide updates to affected clients when appropriate;
  8. document all communications.

A poorly handled public response may worsen liability.


XXXVIII. Preventive Policies

Prevention is the best remedy. Companies should adopt clear written policies covering:

  1. official payment channels;
  2. prohibition on personal collections;
  3. prohibition on borrowing from clients;
  4. prohibition on soliciting investments from clients;
  5. conflict of interest;
  6. gifts and entertainment;
  7. anti-bribery;
  8. confidentiality;
  9. data privacy;
  10. use of company name and logo;
  11. use of social media;
  12. client communications;
  13. document control;
  14. receipt issuance;
  15. disciplinary consequences.

Employees should acknowledge these policies in writing.


XXXIX. Internal Controls to Prevent Client Solicitation Fraud

Companies should implement controls such as:

  1. published official bank accounts;
  2. invoice templates with official payment instructions;
  3. automated receipts;
  4. segregation of duties;
  5. dual approval for discounts and refunds;
  6. periodic client confirmations;
  7. random audits;
  8. restrictions on editing payment details;
  9. monitoring of receivables aging;
  10. client hotline for verification;
  11. prohibition on cash collections unless controlled;
  12. receipt inventory controls;
  13. system logs;
  14. access limits by role;
  15. mandatory leave or rotation for sensitive roles;
  16. whistleblower channels;
  17. exit procedures for departing employees.

The company should make it easy for clients to verify whether a payment request is legitimate.


XL. Training and Communication

Policies are not enough if employees and clients do not know them.

Training should cover:

  1. what counts as unauthorized solicitation;
  2. examples of prohibited conduct;
  3. official payment procedures;
  4. consequences of fraud;
  5. conflict-of-interest scenarios;
  6. client data protection;
  7. reporting channels;
  8. disciplinary process.

Clients should also be informed through invoices, contracts, emails, websites, and official pages that payments should only be made through designated channels.


XLI. Whistleblowing and Internal Reporting

Employee fraud is often discovered through tips. A company should have a reporting system that allows employees and clients to report suspicious behavior.

The system should:

  1. allow confidential reporting;
  2. prohibit retaliation;
  3. document complaints;
  4. provide escalation channels;
  5. ensure prompt investigation;
  6. protect evidence;
  7. involve legal or compliance where necessary.

Whistleblowers should be treated carefully, and allegations should be verified before action is taken.


XLII. Exit Controls for Resigned or Terminated Employees

Post-employment fraud is common where former employees retain client contacts or access.

Exit controls should include:

  1. immediate disabling of email and system access;
  2. return of company devices;
  3. retrieval of IDs, documents, and materials;
  4. reminder of confidentiality obligations;
  5. notice to key clients, if appropriate;
  6. audit of recent transactions;
  7. review of downloads or unusual access;
  8. deletion or transfer of company-managed accounts;
  9. final clearance procedure;
  10. monitoring for unauthorized use of company name.

XLIII. Drafting Strong Employment and Client Documents

Employment documents should include:

  1. confidentiality obligations;
  2. data privacy obligations;
  3. conflict-of-interest rules;
  4. prohibition on personal dealings with clients;
  5. prohibition on unauthorized collections;
  6. non-solicitation provisions, where appropriate;
  7. return of property clause;
  8. disciplinary clause;
  9. consent to reasonable monitoring of company systems;
  10. accountability for losses caused by fraud, subject to law.

Client contracts and invoices should include:

  1. official payment channels;
  2. warning against personal accounts;
  3. verification procedure;
  4. statement that unauthorized payments are not recognized unless confirmed by the company;
  5. official contact information.

XLIV. Distinction Between Employee Fraud and Poor Performance

Not every loss, error, or client complaint is fraud.

Fraud involves dishonesty, deceit, bad faith, misappropriation, or intentional wrongdoing. Poor performance may involve negligence, mistake, lack of skill, or failure to meet standards.

The distinction matters because fraud may justify dismissal and criminal action, while poor performance may require coaching, performance management, or dismissal under different grounds and procedures.

Evidence of fraud includes:

  • concealment;
  • personal benefit;
  • false statements;
  • fake documents;
  • unauthorized accounts;
  • repeated similar acts;
  • deletion of records;
  • admission;
  • inconsistent explanations;
  • client payments not reported;
  • secret communications.

XLV. Handling Cases Where the Employee Claims the Money Was a Loan

Employees often defend by saying the client voluntarily lent money to them personally.

The employer should examine:

  1. Did the employee use company position to obtain the loan?
  2. Was the request made during a company transaction?
  3. Did the client feel pressured?
  4. Was repayment promised from company-related proceeds?
  5. Was company approval implied?
  6. Was the client vulnerable or dependent on the employee’s processing of a matter?
  7. Did the company have a policy against borrowing from clients?
  8. Was the loan repeated with several clients?

Even if the transaction was technically a personal loan, it may still be a serious employment offense if it exploited the client relationship or violated company policy.


XLVI. Handling Cases Where the Employee Claims the Money Was an Investment

An employee may claim that the client voluntarily invested in a private venture unrelated to the employer.

The employer should examine:

  1. Was the client solicited because of the employee’s company role?
  2. Was the company name used?
  3. Were company premises or channels used?
  4. Did the employee promise returns?
  5. Did the employee use confidential client data?
  6. Did the employee conduct the activity during work hours?
  7. Did the venture compete with the employer?
  8. Was the investment itself unlawful or fraudulent?
  9. Did other employees participate?
  10. Were clients misled into believing company backing existed?

A private investment solicitation may still justify termination if it violates trust, creates conflict of interest, or damages the employer.


XLVII. Handling Cases Where the Employee Claims the Client Voluntarily Paid

Consent is not always a defense. If consent was obtained through deceit, pressure, abuse of position, or misrepresentation, the transaction may still be fraudulent.

The key question is whether the client made an informed and voluntary decision based on truthful information.


XLVIII. Tax and Accounting Issues

Employee fraud may create tax and accounting problems.

The company should check:

  1. whether fake receipts were issued;
  2. whether official receipts were misused;
  3. whether sales were recorded;
  4. whether VAT or percentage tax reporting was affected;
  5. whether income was understated;
  6. whether receivables were misstated;
  7. whether refunds or write-offs are needed;
  8. whether financial statements require adjustment.

The company should coordinate with accountants and tax counsel where necessary.


XLIX. Practical Case Scenarios

Scenario 1: Sales employee collected client payments through personal GCash

A sales employee tells clients to pay reservation fees through personal GCash. The employee issues unofficial acknowledgments and does not remit the money.

Possible remedies:

  • preventive suspension;
  • notice to explain;
  • dismissal for fraud or breach of trust;
  • estafa or qualified theft complaint;
  • demand for return of money;
  • client notice on official payment channels;
  • audit of all accounts handled by employee.

Scenario 2: Account manager solicited “investment” from clients

An account manager tells clients that the company is raising funds for a special project with guaranteed returns. The company never approved such project.

Possible remedies:

  • internal investigation;
  • cease-and-desist instruction;
  • dismissal for serious misconduct and breach of trust;
  • criminal complaint for estafa if deceit is shown;
  • securities-related concerns if investment contracts were offered;
  • client advisory;
  • data privacy review if client information was misused.

Scenario 3: Employee asked clients for processing fees

A processing officer asks clients to pay cash to “speed up” applications. The company does not authorize such fees.

Possible remedies:

  • disciplinary action;
  • criminal complaint depending on facts;
  • refund assistance;
  • audit of processed accounts;
  • policy reinforcement;
  • client reporting channel.

Scenario 4: Former employee continues collecting from clients

A resigned employee contacts clients and claims to still represent the company.

Possible remedies:

  • cease-and-desist letter;
  • client notice that person is no longer connected;
  • criminal complaint for fraud if money was collected;
  • civil action for injunction and damages;
  • report fake pages or accounts;
  • data privacy investigation.

L. Practical Checklist for Employers

When employee fraud involving clients is discovered, the employer should:

  1. secure evidence;
  2. restrict employee access;
  3. identify affected clients;
  4. conduct internal audit;
  5. issue notice to explain;
  6. consider preventive suspension if justified;
  7. interview witnesses;
  8. obtain client affidavits;
  9. preserve digital evidence;
  10. evaluate data privacy implications;
  11. assess client liability exposure;
  12. issue careful client advisory;
  13. decide on disciplinary action;
  14. send demand letter if appropriate;
  15. file criminal complaint if warranted;
  16. consider civil recovery;
  17. notify insurer if applicable;
  18. improve controls;
  19. train employees;
  20. document all actions.

LI. Practical Checklist for Clients

A client who was solicited by an employee should:

  1. preserve all communications;
  2. keep receipts and transfer records;
  3. identify the account paid;
  4. screenshot messages and profiles;
  5. verify with the company through official channels;
  6. demand written clarification;
  7. request refund where appropriate;
  8. file a complaint with the company;
  9. consider a criminal complaint against the employee;
  10. coordinate with other victims if any;
  11. notify bank or e-wallet provider quickly;
  12. avoid paying additional fees;
  13. consult counsel for recovery.

LII. Sample Company Policy Clause

A company policy may provide:

Employees are strictly prohibited from soliciting, requesting, borrowing, accepting, collecting, or receiving money, gifts, investments, loans, commissions, fees, or any financial accommodation from clients, customers, suppliers, applicants, or business partners, except as expressly authorized in writing by the company and through official company channels. Employees are likewise prohibited from directing any client or customer to deposit or transfer funds to personal accounts, e-wallets, remittance accounts, or unauthorized payment channels. Violation of this policy constitutes serious misconduct, conflict of interest, dishonesty, and breach of trust, and may result in disciplinary action up to dismissal, without prejudice to civil and criminal remedies.


LIII. Sample Client Payment Warning

A company may include this warning in invoices and client communications:

For your protection, please make payments only to the official company accounts stated in this invoice. No employee, agent, or representative is authorized to receive payments through personal bank accounts, e-wallets, remittance accounts, or private payment links. Any request for payment outside official channels should be reported immediately to [official contact details].


LIV. Sample Notice to Explain Framework

A notice to explain may include:

  1. statement that the company received reports of unauthorized solicitation;
  2. specific client names or transaction references, if disclosure is appropriate;
  3. dates and amounts involved;
  4. payment accounts used;
  5. company policies allegedly violated;
  6. instruction to submit written explanation within the required period;
  7. invitation to attend administrative conference, if applicable;
  8. statement that dismissal may be imposed if allegations are proven.

The notice should not be a pre-judgment. It should allow the employee to respond.


LV. Sample Disciplinary Findings

A disciplinary decision may state:

  1. the employee was assigned to handle client accounts;
  2. clients submitted statements and proof of payment;
  3. payments were directed to the employee’s personal account;
  4. the employee had no authority to collect through personal accounts;
  5. company policy prohibited such conduct;
  6. funds were not remitted;
  7. the employee’s explanation was unsupported or inconsistent;
  8. the conduct constituted fraud, serious misconduct, and breach of trust;
  9. dismissal is imposed effective on a stated date.

The findings should be supported by attached evidence.


LVI. Avoiding Retaliatory or Coercive Conduct

Employers should avoid:

  1. threatening employees without basis;
  2. forcing confessions;
  3. detaining employees;
  4. confiscating personal devices without legal basis;
  5. public shaming;
  6. unlawful wage deductions;
  7. denying due process;
  8. making defamatory announcements;
  9. concealing client losses;
  10. destroying evidence.

A lawful response is stronger than an emotional response.


LVII. When to Involve Counsel

Counsel should be involved early where:

  1. large amounts are involved;
  2. many clients are affected;
  3. criminal charges are likely;
  4. the employee is managerial;
  5. the employee threatens a labor case;
  6. media or social media attention is expected;
  7. data privacy breach may exist;
  8. regulatory reporting may be required;
  9. settlement is being discussed;
  10. injunction or attachment is considered.

Early legal guidance helps align labor, civil, criminal, and reputational strategy.


LVIII. Key Legal Principles

Several principles summarize the topic:

  1. Employee fraud may justify dismissal, but due process is still required.
  2. Soliciting money from clients can constitute serious misconduct, fraud, conflict of interest, or breach of trust.
  3. Unauthorized collection may give rise to estafa, qualified theft, falsification, or cybercrime liability.
  4. Employer liability to clients depends on authority, apparent authority, supervision, benefit, and internal controls.
  5. Client affidavits and payment records are crucial.
  6. Digital evidence must be preserved carefully.
  7. Data privacy issues may arise when client information is misused.
  8. Employers should act quickly but avoid defamatory or procedurally defective responses.
  9. Recovery of money may require civil, criminal, and practical asset-tracing efforts.
  10. Prevention requires clear payment channels, strong controls, client warnings, and employee training.

LIX. Conclusion

Employee fraud and solicitation of money from clients create overlapping legal problems in the Philippines. The employer must protect clients, preserve evidence, discipline the employee if warranted, recover losses, and reduce exposure to labor, civil, criminal, data privacy, and reputational claims.

The most effective response is organized and evidence-based: secure records, restrict access, investigate, observe due process, obtain client statements, assess criminal and civil remedies, notify affected parties carefully, and strengthen controls.

For clients, the safest rule is to transact only through official company channels and immediately verify any request for payment to a personal account. For employers, the safest rule is to make unauthorized solicitation impossible to confuse with legitimate business by using clear policies, official payment systems, client education, and consistent enforcement.

This article is for general legal information in the Philippine context and is not a substitute for advice from a qualified lawyer based on specific facts.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.