Crypto License in Philippines

BSP VASP, SEC CASP & CEZA FTS — Regulated Market Entry for Crypto Businesses

Entering the Philippine crypto market requires more than regulatory awareness. It requires building a supervised financial operation that can withstand continuous oversight by the Bangko Sentral ng Pilipinas, AMLC scrutiny, and real-world operational stress.

We provide full-scope regulatory market entry for crypto exchanges, custodians, and transfer platforms seeking lawful access to the Philippine ecosystem. The service covers BSP VASP licensing strategy, SEC CASP structuring where securities exposure exists, and CEZA offshore frameworks for operators targeting international markets without PHP exposure.

This is not a document service. We design and implement a regulator-defensible operating model: governance authority, AML execution, Travel Rule infrastructure, custody controls, and supervisory readiness. The outcome is a Philippine crypto structure that can obtain approval, maintain banking relationships, survive audits, and scale without regulatory rework.

If your objective is not merely approval, but long-term operation in a high-scrutiny jurisdiction, this page defines how that is built.

Who This Service Is For

This engagement is designed for operators who need supervised, bankable market access — not exploratory experimentation.

Typical clients include:

  • exchanges offering fiat-to-crypto and crypto-to-fiat involving PHP

  • custodians and wallet providers holding client keys or assets

  • remittance-driven models using virtual assets as a transfer rail

  • broker/dealer-style platforms providing execution or intermediation

  • token issuers or venues that may trigger SEC “digital securities” treatment

  • offshore exchanges seeking an Asian base without serving Philippine residents


What You Achieve

Commercial outcomes of a correctly built Philippine structure:

  • a clear, regulator-aligned service perimeter (what you can do, legally and operationally)

  • a licensing route that matches your product reality (BSP, SEC, CEZA, or combination)

  • an AML and Travel Rule operating model that survives audits and escalations

  • custody and key-control architecture that is inspectable and defensible

  • a bank-facing compliance narrative aligned to risk committees

  • a system designed for ongoing supervision, not just initial approval


Philippine Regulatory Routes We Build Around

BSP VASP Certificate of Authority

BSP supervision is decisive for any operator touching PHP rails or behaving like a money service business.

BSP scope typically includes:

  • exchange between virtual assets and fiat currencies

  • exchange between virtual assets

  • transfer of virtual assets (including remittance-like flows)

  • custody or administration of virtual assets (custodial wallet models)

What the BSP tests in practice:

  • governance authority that can act locally and under pressure

  • AML decision-making discipline and escalation pathways

  • operational controls that match declared policies

  • IT risk management, resilience, and incident response capability

  • capital adequacy logic for your model and custody exposure

SEC CASP Registration and Digital Securities Perimeter

SEC involvement arises when the asset or the offering resembles a security, or the venue behaves like a securities market.

Common SEC-trigger patterns:

  • public offering structures that resemble investment contracts

  • tokenized securities, fractionalized instruments, revenue-share constructs

  • trading venues listing assets likely to be treated as securities

  • marketing claims that create investor-expectation characteristics

We do not “assume” SEC risk away. We classify and structure around it.

CEZA FTS Offshore License

CEZA is a separate track for offshore operations within the economic zone, built for foreign-facing activity.

CEZA route fits operators who:

  • do not serve Philippine residents

  • do not run PHP conversions

  • need a tax-advantaged offshore base and operational presence

This is not a shortcut to onshore access. It is an offshore strategy with strict domestic prohibitions.


The 2025 Reality: Market Entry Under the BSP Moratorium

For 2025 entry planning, the BSP moratorium changes the dominant strategy from “apply” to “acquire or partner.”

Practical entry options we execute:

  • acquisition of an existing licensed or authorized entity (where change-of-control can be defended)

  • structured partnership models where licensed activity is performed by the authorized entity and your platform is integrated through controlled boundaries

  • CEZA-first offshore launch for international activity while building Philippine readiness for future BSP reopening

  • non-custodial or non-PHP product staging while preparing the full compliance operating system

The commercial point is simple: we build a route that can be executed now, not a theoretical plan that stalls at the gate.


Licensing Architecture: How We Decide “BSP vs SEC vs CEZA”

We start by mapping your real value chain, not your preferred label.

We classify your activities across:

  • fiat touchpoints and payment rails

  • custody exposure (who controls keys, who bears loss, who can freeze/restore)

  • transfer features (remittance-like routing, beneficiary handling, cross-border flows)

  • market-venue features (matching, order handling, execution, listing governance)

  • token distribution and offering mechanics

  • retail marketing posture and consumer exposure

Deliverable from this stage: one coherent licensing architecture with a defensible regulator narrative.


Compliance Operating Model the Philippines Actually Enforces

AMLC Registration and AML Operating Discipline

Philippine supervision treats AML as an operating system.

We build:

  • risk-based AML program aligned to your customer and transaction profile

  • KYC and verification flows that do not collapse at scale

  • suspicious activity governance: thresholds, typologies, escalation, decision logs

  • STR/CTR readiness with evidence-grade recordkeeping

  • sanctions and adverse media workflows integrated into onboarding and monitoring

  • EDD triggers for high-risk profiles and large-value activity

FATF Travel Rule Implementation

Travel Rule is not a policy paragraph. It is a platform capability.

We implement:

  • data capture logic for originator and beneficiary information

  • secure transmission and storage model for Travel Rule data

  • exception handling for counterparty mismatch and incomplete data

  • rules for unhosted wallet interactions, including enhanced due diligence

  • audit trails that can be reconstructed months later without narrative gaps

Technology Risk and Security Controls

BSP-grade resilience requires more than generic “security best practices.”

We structure:

  • IT risk management framework with governance ownership

  • penetration testing scope, cadence, remediation governance, and evidence packaging

  • incident response playbooks aligned to regulator expectations

  • custody and key management controls (HSM, multi-sig policy, access governance)

  • asset segregation model (legal + operational segregation, not just accounting lines)

  • business continuity and disaster recovery with realistic crypto-specific scenarios


Deliverables

You receive a complete, commercial-grade regulatory package plus an implementable operating system.

Regulatory Architecture Pack

  • service perimeter classification and regulator mapping

  • onshore vs offshore route decision memo (BSP/SEC/CEZA or combination)

  • moratorium-compliant entry strategy (acquisition/partnership/CEZA-first)

  • supervisory narrative that aligns governance, AML, custody, and technology into one system

Governance and Substance Pack

  • governance structure, roles, delegations, and decision authority design

  • fit-and-proper readiness dossier for directors, officers, and key shareholders

  • local substance plan: office, staffing model, and accountable control functions

  • board and management committee framework, minutes templates, escalation logs

AML and Financial Crime Pack

  • AML/CFT manual with risk-based approach tailored to your product

  • KYC/CDD/EDD procedures and operational workflows

  • monitoring rules, typologies, and alert handling SOPs

  • STR readiness processes and evidence retention structure

  • Travel Rule implementation plan integrated into onboarding and transfers

Technology and Custody Pack

  • IT risk management framework and control mapping

  • cybersecurity and incident response operating procedures

  • custody model documentation: segregation, wallet policy, key control governance

  • independent testing coordination pack (pen-test, vulnerability management reporting)

  • BCP/DR plan with crypto-specific stress scenarios and client notification logic

Submission and Supervisory Management Pack

  • application assembly, completeness checks, and regulator-ready formatting

  • Q&A management structure: tracking, evidence linking, version control

  • readiness for technical demonstrations and on-site inspections

  • post-approval supervisory reporting discipline design


Process

Discovery and Service Perimeter Definition

We translate your platform into regulated activities and identify your true regulator exposure.
Outputs include the perimeter map, gap analysis, and route selection.

Operating Model Build

We build the “institutional truth” regulators test: governance authority, AML execution, IT resilience, custody control, and record discipline.

Evidence and Dossier Assembly

We package the system into regulator-ready documentation — consistent, auditable, and free of contradictions between policies and actual operations.

Supervisory Engagement Management

We run the interaction cycle: follow-ups, clarifications, evidence production, remediation, and readiness for demonstrations and inspections.

Post-Approval Stabilisation

We convert the approval into a stable supervised business: reporting routines, control testing cadence, and audit readiness.


Timelines and What Drives Them

Timelines depend on route and readiness.

Typical planning ranges:

  • perimeter mapping and route decision: a few weeks, depending on complexity

  • operating model build and dossier assembly: varies by custody scope and platform maturity

  • acquisition-led entry: timeline driven by due diligence depth, change-of-control approval handling, and remediation needs

  • CEZA offshore setup: driven by substance build and zone registration execution

What usually extends timelines:

  • weak local decision authority (remote-control governance)

  • incomplete ownership transparency or fit-and-proper gaps

  • Travel Rule treated as a “vendor checkbox” without exception handling

  • custody controls that are not independently testable

  • missing evidence trails for controls claimed in policies


Key Commercial Decisions We Help You Get Right

  • whether you should be custodial in the Philippines, or stage custody later

  • how to structure PHP exposure without creating uncontrolled risk

  • how to handle unhosted wallets without breaking the client experience

  • how to design compliance so it scales with remittance-like growth

  • how to build a bank-facing narrative that risk committees accept

  • how to approach the BSP moratorium with an executable entry plan


Engagement Format

We run this as a managed regulatory project, not a document delivery.

You will have:

  • a structured workplan with clear milestones

  • weekly execution cadence and issue tracking

  • a single coherent documentation set with controlled versioning

  • a supervisor-ready operating system, not isolated policy fragments

Request a Crypto Licensing Assessment

Supervisory Reality After Approval

How BSP, SEC, and AMLC Actually Supervise a Live Crypto Business

Approval in the Philippines is not an endpoint. It is the beginning of a permanent supervisory relationship where regulators evaluate behaviour, not documents. This section explains what happens after authorisation, how supervision is exercised in practice, and what distinguishes VASPs that remain stable under scrutiny from those that drift into regulatory risk.

Philippine supervisors do not treat crypto businesses as technology platforms. They treat them as financial institutions operating high-risk transfer infrastructure. Every supervisory interaction is framed around one question: does the organisation behave as declared when pressure appears?


Supervision as an Ongoing Operating Condition

Supervision in the Philippines is continuous, not episodic. Regulators assume that crypto businesses are exposed to volatility, fraud, cyber risk, and rapid scale. As a result, they test whether controls operate consistently over time.

Key characteristics of ongoing supervision include:

  • repeated information requests tied to transaction behaviour

  • thematic reviews focused on AML, Travel Rule execution, and custody controls

  • ad-hoc inquiries triggered by market events or user complaints

  • retrospective reconstruction of past decisions and incidents

Supervisors are less interested in whether a policy exists and more interested in whether the organisation can prove how it acted in a specific situation months later.


What Regulators Monitor Continuously

Governance Behaviour Under Stress

Governance is tested during moments of friction, not during routine operations.

Supervisors observe:

  • who actually makes risk decisions when alerts escalate

  • whether board and senior management involvement is real or symbolic

  • how conflicts between commercial objectives and compliance controls are resolved

  • whether delegations of authority are respected in practice

Weak governance patterns include delayed decisions, informal overrides, undocumented approvals, and reliance on offshore parent instructions without local accountability.


AML Execution and Decision Discipline

AML supervision focuses on execution quality, not policy language.

Regulators assess:

  • alert volumes versus resolution capacity

  • quality of investigation narratives

  • consistency of STR filing thresholds

  • escalation discipline for complex or borderline cases

  • evidence that alerts are closed based on analysis, not pressure

A common failure pattern is “alert fatigue”, where monitoring rules exist but teams lack the authority or capacity to act decisively.


Travel Rule Operational Integrity

Travel Rule compliance is reviewed as a transactional process, not a compliance checkbox.

Supervisory attention includes:

  • accuracy and completeness of transmitted data

  • handling of counterparties with incompatible Travel Rule standards

  • treatment of failed or partial data transfers

  • controls around unhosted wallet interactions

  • reconciliation between blockchain data and internal records

Breakdowns usually occur at scale, when transaction volumes rise and exception handling is underdeveloped.


Custody and Asset Protection Behaviour

Custody supervision focuses on control, not technology branding.

Regulators test:

  • who can access private keys and under what conditions

  • how emergency access is governed

  • segregation between client and proprietary assets

  • procedures for loss events, forks, or protocol failures

  • reconciliation frequency and discrepancy handling

Any ambiguity around key control or asset ownership is treated as a material supervisory concern.


Supervisory Interaction Patterns

Routine Reporting

Licensed VASPs are required to submit regular reports covering:

  • transaction volumes and values

  • user metrics and activity segmentation

  • AML indicators and STR statistics

  • operational incidents and remediation actions

  • financial condition and capital position

Reports are not passive filings. Supervisors use them to build behavioural profiles and identify anomalies over time.


Thematic Reviews

Regulators periodically launch focused reviews across the sector.

Typical themes include:

  • AML effectiveness in high-risk corridors

  • Travel Rule implementation consistency

  • cybersecurity resilience and incident handling

  • custody and asset segregation controls

  • outsourcing and third-party risk management

Thematic reviews often result in follow-up actions, even for compliant firms.


Event-Driven Inquiries

Certain events automatically attract supervisory attention:

  • security breaches or attempted intrusions

  • abnormal transaction spikes

  • significant customer complaints

  • media exposure involving fraud or losses

  • rapid growth without corresponding control expansion

In these situations, regulators expect immediate transparency and structured responses.


Recordkeeping and Regulatory Memory

Retrospective Accountability

Philippine supervisors operate with long institutional memory.

VASPs must be able to reconstruct:

  • why a customer was onboarded

  • why a transaction was allowed or blocked

  • who approved an exception

  • what information was available at the time

  • how risks were assessed then, not later

Poor recordkeeping is treated as a governance failure, not an administrative lapse.


Evidence Expectations

Evidence must be:

  • contemporaneous, not recreated

  • internally consistent across systems

  • attributable to specific decision-makers

  • preserved for regulatory inspection

Email chains, chat messages, and informal approvals often become part of supervisory reviews.


Operational Substance and Local Authority

Why Local Presence Is Actively Tested

Local presence is not symbolic. Regulators test whether:

  • key officers are physically accessible

  • decisions can be made without offshore approval delays

  • compliance teams can act independently

  • escalation paths remain functional during crises

Remote-control models are systematically challenged.


Staffing and Capacity Monitoring

Supervisors observe:

  • staffing ratios relative to transaction volumes

  • turnover in compliance and risk roles

  • training effectiveness and continuity

  • reliance on contractors versus internal staff

Under-resourced teams are viewed as structural risk indicators.


Banking Relationships and Supervisory Alignment

How Banking Access Is Evaluated

Banks in the Philippines rely heavily on regulatory signals.

They assess:

  • quality of BSP supervision

  • history of regulatory findings

  • AML execution credibility

  • transparency of ownership and governance

A VASP’s ability to maintain banking relationships is directly linked to its supervisory reputation.


Managing Bank-Driven Reviews

Banks routinely conduct their own reviews, which often mirror regulatory concerns.

Successful VASPs:

  • maintain regulator-aligned documentation

  • can explain control logic clearly

  • provide timely, structured responses

  • avoid contradictions between bank and regulator narratives


Scaling Under Supervision

Growth as a Supervisory Test

Rapid growth is not viewed positively by default.

Regulators evaluate:

  • whether controls scale with volumes

  • whether monitoring thresholds are recalibrated

  • whether staffing expands proportionally

  • whether governance keeps pace with complexity

Uncontrolled growth is treated as a risk event.


Product Expansion Controls

Adding new features or services requires internal discipline.

Supervisors expect:

  • documented change management

  • risk assessments for new products

  • AML and Travel Rule impact analysis

  • governance approvals before launch

Silent feature creep is a common supervisory red flag.


Incident Management Expectations

Security and Operational Incidents

When incidents occur, regulators expect:

  • immediate containment actions

  • clear internal escalation

  • accurate impact assessment

  • timely regulator notification

  • structured remediation plans

Minimisation or delayed disclosure significantly worsens outcomes.


Customer Impact and Communication

Supervisors evaluate:

  • how clients are informed

  • whether communications are accurate and timely

  • whether compensation or remediation is handled fairly

  • whether complaint handling remains functional

Poor client communication often triggers deeper reviews.


Enforcement Philosophy

Progressive Intervention

Philippine regulators typically escalate gradually:

  • observations and guidance

  • formal findings and remediation timelines

  • activity restrictions

  • penalties or licence suspension

Early transparency and cooperation materially influence outcomes.


What Triggers Severe Action

Severe intervention is usually linked to:

  • misrepresentation of operations

  • repeated AML failures

  • asset protection breaches

  • obstruction or non-cooperation

  • governance collapse

Documentation alone cannot compensate for behavioural failures.


How We Build for Supervisory Longevity

Our approach is designed around survivability under supervision, not just approval.

We structure:

  • decision frameworks that work during crises

  • AML processes that scale and remain defensible

  • Travel Rule execution that handles exceptions gracefully

  • custody controls that withstand forensic review

  • governance that can explain itself years later

The objective is a Philippine crypto operation that regulators, banks, and partners trust over time — even as the market evolves and pressure increases.

Institutional Operating Model

How a Philippine Crypto Business Must Actually Be Built to Survive Supervision

A Philippine crypto licence is only defensible if the business is constructed as a single, internally coherent operating system. Regulators do not evaluate compliance functions, technology, governance, and finance separately. They evaluate whether these components reinforce each other under pressure.

This section explains how a Philippine crypto operation must be architected, not described. It focuses on operating logic, internal discipline, and structural decisions that determine whether the licence remains stable over time.


One Operating System, Not a Collection of Policies

The dominant supervisory assumption in the Philippines is that fragmented systems fail. A VASP built as disconnected silos will eventually contradict itself under scrutiny.

A viable institutional model demonstrates:

  • alignment between governance authority and operational execution

  • consistency between AML risk appetite and product design

  • coherence between custody controls and financial planning

  • traceability between decisions, actions, and records

Supervisors actively test for contradictions between declared intent and operational reality.


Governance Architecture That Regulators Trust

Board and Senior Management Function

The board is not symbolic. It is a control organ.

Supervisors expect boards to:

  • understand the crypto-specific risks of the business

  • actively approve risk appetite and material changes

  • receive and question compliance and incident reports

  • document dissent and challenge, not just approval

A board that only ratifies management proposals is treated as weak governance.


Executive Authority and Local Decision-Making

Local authority is a core requirement.

Effective structures ensure:

  • executives can suspend activity without offshore approval

  • compliance heads have independent escalation rights

  • local management controls budgets for risk mitigation

  • crisis decisions are not delayed by parent company politics

Remote-control governance models are systematically rejected in practice.


Committees and Control Functions

Committees are expected to function, not exist.

Common supervisory focus areas include:

  • risk committees that actively review exposure metrics

  • AML committees that resolve high-risk cases formally

  • IT or security committees that oversee resilience and incidents

Minutes are examined for substance, not formatting.


Financial Logic and Capital Discipline

Capital as a Risk Buffer, Not a Number

Paid-in capital is evaluated in relation to operational risk.

Supervisors assess:

  • custody exposure versus capital adequacy

  • liquidity under stress scenarios

  • ability to absorb operational losses

  • dependence on parent funding

Capital planning that ignores volatility or custody risk is considered superficial.


Treasury and Asset Segregation

Financial controls must be explicit and enforceable.

A defensible model includes:

  • legally segregated client accounts

  • operational separation between client and house wallets

  • reconciliation routines with escalation thresholds

  • clear loss-allocation logic

Any ambiguity around asset ownership invites regulatory intervention.


AML as an Operating Capability

Risk-Based Approach in Practice

Risk-based AML means the system adapts.

Supervisors expect:

  • differentiated treatment of customer segments

  • dynamic monitoring thresholds

  • periodic reassessment of risk profiles

  • documented rationale for risk decisions

Static risk matrices are quickly identified and criticised.


Alert Handling and Escalation

AML effectiveness is measured at the alert level.

Regulators review:

  • alert quality versus volume

  • investigation depth and reasoning

  • escalation timelines

  • senior management involvement in sensitive cases

Closing alerts without analytical narrative is a common failure point.


STR Discipline

STRs are judged on credibility.

Effective practices include:

  • clear articulation of suspicion

  • linkage to transaction patterns

  • internal approval records

  • consistency with prior risk assessments

Over-reporting and under-reporting are both treated as weaknesses.


Travel Rule as Transaction Infrastructure

Embedded, Not Layered

Travel Rule compliance must be embedded in transaction flows.

Supervisors assess:

  • how data is captured at initiation

  • how it is transmitted and verified

  • how failures are handled

  • how exceptions are escalated

Manual workarounds collapse under volume.


Unhosted Wallet Treatment

Unhosted wallets are not prohibited, but they are scrutinised.

Expected controls include:

  • enhanced due diligence triggers

  • transaction limits or monitoring intensification

  • behavioural pattern analysis

  • management sign-off for elevated risk

Treating unhosted wallets as “normal” is a regulatory red flag.


Technology as a Supervisory Topic

IT Risk Governance

Technology is supervised as infrastructure.

Regulators evaluate:

  • ownership of IT risk

  • incident response authority

  • testing and remediation discipline

  • dependency on third-party providers

Lack of internal technical understanding at management level is viewed negatively.


Cybersecurity and Incident Handling

Incident handling defines credibility.

Supervisors expect:

  • predefined incident classification

  • immediate containment actions

  • forensic capability or access

  • clear communication lines

Delayed disclosure erodes trust rapidly.


Change Management

Every platform change is a risk event.

Strong controls include:

  • documented change approval

  • risk assessment for new features

  • testing before deployment

  • rollback procedures

Silent releases are routinely uncovered during reviews.


Custody and Key Control Reality

Control Over Keys

Custody is evaluated through control, not custody labels.

Regulators test:

  • who can initiate key access

  • how approvals are granted

  • how emergency access is handled

  • how keys are backed up and recovered

Single-person control structures are unacceptable.


Loss Scenarios and Recovery

Supervisors expect realistic planning.

This includes:

  • protocol failure scenarios

  • internal fraud scenarios

  • operational error scenarios

  • client communication plans

Optimistic assumptions undermine credibility.


Operational Substance and Staffing

Staffing as a Risk Metric

Staffing levels are monitored continuously.

Regulators consider:

  • workload per compliance officer

  • turnover rates

  • training frequency

  • reliance on external consultants

Chronic understaffing is treated as structural non-compliance.


Training and Institutional Knowledge

Training is expected to be ongoing.

Effective programmes include:

  • onboarding for new hires

  • scenario-based AML training

  • incident response drills

  • governance awareness for executives

Generic online courses are insufficient.


Outsourcing and Third-Party Risk

Vendor Dependency

Outsourcing does not transfer responsibility.

Supervisors assess:

  • due diligence on vendors

  • contractual control rights

  • contingency plans for vendor failure

  • monitoring of vendor performance

Critical functions without fallback plans are flagged.


Group Structures and Intragroup Services

Intragroup arrangements are examined closely.

Regulators expect:

  • arm’s-length documentation

  • clear accountability lines

  • independence of local control functions

Group dominance without safeguards is challenged.


Product Design and Consumer Protection

Product Risk Awareness

Product design is treated as a compliance matter.

Supervisors review:

  • fee transparency

  • risk disclosures

  • suitability for target users

  • marketing alignment with actual risk

Aggressive marketing unsupported by controls attracts scrutiny.


Complaint Handling

Complaints are regulatory signals.

Expected practices include:

  • structured intake and classification

  • root-cause analysis

  • timely resolution

  • escalation of systemic issues

Ignored complaints often trigger thematic reviews.


Scaling Without Regulatory Drift

Growth Controls

Growth must be governed.

Supervisors look for:

  • growth triggers tied to control expansion

  • staffing thresholds linked to volume

  • recalibration of monitoring systems

Unmanaged growth is treated as a failure of governance.


Geographic Expansion

Cross-border activity adds complexity.

Expectations include:

  • jurisdictional risk assessment

  • consistency with Philippine licence scope

  • alignment with foreign Travel Rule standards

Uncoordinated expansion creates compliance fragmentation.


Internal Audit and Self-Testing

Independent Assurance

Self-testing is expected.

A robust model includes:

  • periodic internal audits

  • thematic reviews

  • follow-up on findings

  • board oversight of remediation

No self-critique suggests institutional immaturity.


Learning from Findings

Regulators value learning behaviour.

They assess whether:

  • findings lead to real changes

  • repeat issues are eliminated

  • root causes are addressed

Repeated minor findings can escalate into major concerns.


Culture as a Supervisory Factor

Compliance Culture

Culture is inferred from behaviour.

Signals regulators notice:

  • willingness to escalate bad news

  • absence of blame-shifting

  • clarity in decision ownership

  • respect for control functions

Toxic growth culture undermines even strong frameworks.

FAQ

The Philippines uses two primary licenses: VASP and CASP. VASP (Virtual Asset Service Provider) is issued by the central bank (BSP) and primarily focuses on crypto-fiat exchange and remittances (AML/CTF compliance). CASP (Crypto-Asset Service Provider) is a newer registration/license from the Securities and Exchange Commission (SEC). It governs all entities dealing with crypto-asset securities, custody, and platforms that offer crypto services to Filipino investors. 

It depends on your core business model. You will likely need both for comprehensive operations: BSP (VASP): Required for any exchange involving Philippine Pesos (fiat) or cross-border money transfer activities. SEC (CASP): Required for any service involving custody of client assets, token offerings, or platforms dealing with tokens that qualify as securities. 

Yes. The Bangko Sentral ng Pilipinas (BSP) has imposed an indefinite moratorium on accepting new VASP license applications (as of late 2025). This is a move to strengthen regulatory oversight and mitigate risks following the country’s removal from the FATF grey list. 

Since the moratorium only applies to new applications, the most viable path for market entry is through the acquisition (M&A) of an existing, already licensed VASP. This process requires exhaustive due diligence and subsequent formal approval from the BSP for the change of control.

To register as a CASP, the applicant must be incorporated in the Philippines and meet a minimum paid-up capital of ₱100 million Philippine Pesos (excluding crypto-assets). This high threshold is designed to ensure financial resilience and enhanced investor protection.

The capital requirement for a BSP-licensed VASP is tiered based on its classification as a Money Service Business (MSB). This typically ranges from ₱10 million to ₱50 million, depending on the extent and complexity of the services offered (e.g., simple exchange vs. complex transfers). 

Yes. Both the BSP (VASP) and SEC (CASP) frameworks explicitly mandate that the applicant must establish a registered local corporation and maintain a physical office presence within the Philippines.

The VASP must implement a robust compliance program that includes: Strict KYC/CDD (Know Your Customer/Customer Due Diligence) procedures. Continuous transaction monitoring and suspicious activity reporting (SARs). Full technical compliance with the FATF Travel Rule. Ongoing Enterprise-Wide Risk Assessment. 

Absolutely. The BSP strictly enforces the Travel Rule compliance Philippines, which requires VASPs to securely transmit verifiable originator and beneficiary information for all crypto transactions exceeding the established threshold (generally 50,000). 

No. The CEZA (Cagayan Economic Zone Authority) Crypto License is strictly an offshore license. It is designed for businesses serving international clients. Licensees must implement geofencing controls and are expressly forbidden from marketing to or transacting with Philippine residents or using the domestic financial system.

While the official timeline for BSP approval was previously around 2 months, the overall process—including corporate setup, IT Audit for Crypto Exchanges, development of AML manuals, and regulatory interviews—usually takes 6 to 12 months (excluding the current VASP moratorium period). 

Both BSP and SEC require a mandatory, independent IT Audit to confirm the security architecture. This includes system resilience, key custody procedures, internal controls, and regular Penetration Testing (Pen-testing) to prove the VASP's ability to protect customer funds and data. 

DATO (Digital Asset Token Offering) regulations are issued by CEZA and govern the issuance of digital tokens within the economic zone. If a token targets the domestic market or is classified as a security, it falls under the more stringent SEC CASP rules regarding registration and disclosure.

Get in touch with our experts