Crypto License in Philippines
BSP VASP, SEC CASP & CEZA FTS — Regulated Market Entry for Crypto Businesses
Entering the Philippine crypto market requires more than regulatory awareness. It requires building a supervised financial operation that can withstand continuous oversight by the Bangko Sentral ng Pilipinas, AMLC scrutiny, and real-world operational stress.
We provide full-scope regulatory market entry for crypto exchanges, custodians, and transfer platforms seeking lawful access to the Philippine ecosystem. The service covers BSP VASP licensing strategy, SEC CASP structuring where securities exposure exists, and CEZA offshore frameworks for operators targeting international markets without PHP exposure.
This is not a document service. We design and implement a regulator-defensible operating model: governance authority, AML execution, Travel Rule infrastructure, custody controls, and supervisory readiness. The outcome is a Philippine crypto structure that can obtain approval, maintain banking relationships, survive audits, and scale without regulatory rework.
If your objective is not merely approval, but long-term operation in a high-scrutiny jurisdiction, this page defines how that is built.
Who This Service Is For
This engagement is designed for operators who need supervised, bankable market access — not exploratory experimentation.
Typical clients include:
exchanges offering fiat-to-crypto and crypto-to-fiat involving PHP
custodians and wallet providers holding client keys or assets
remittance-driven models using virtual assets as a transfer rail
broker/dealer-style platforms providing execution or intermediation
token issuers or venues that may trigger SEC “digital securities” treatment
offshore exchanges seeking an Asian base without serving Philippine residents
What You Achieve
Commercial outcomes of a correctly built Philippine structure:
a clear, regulator-aligned service perimeter (what you can do, legally and operationally)
a licensing route that matches your product reality (BSP, SEC, CEZA, or combination)
an AML and Travel Rule operating model that survives audits and escalations
custody and key-control architecture that is inspectable and defensible
a bank-facing compliance narrative aligned to risk committees
a system designed for ongoing supervision, not just initial approval
Philippine Regulatory Routes We Build Around
BSP VASP Certificate of Authority
BSP supervision is decisive for any operator touching PHP rails or behaving like a money service business.
BSP scope typically includes:
exchange between virtual assets and fiat currencies
exchange between virtual assets
transfer of virtual assets (including remittance-like flows)
custody or administration of virtual assets (custodial wallet models)
What the BSP tests in practice:
governance authority that can act locally and under pressure
AML decision-making discipline and escalation pathways
operational controls that match declared policies
IT risk management, resilience, and incident response capability
capital adequacy logic for your model and custody exposure
SEC CASP Registration and Digital Securities Perimeter
SEC involvement arises when the asset or the offering resembles a security, or the venue behaves like a securities market.
Common SEC-trigger patterns:
public offering structures that resemble investment contracts
tokenized securities, fractionalized instruments, revenue-share constructs
trading venues listing assets likely to be treated as securities
marketing claims that create investor-expectation characteristics
We do not “assume” SEC risk away. We classify and structure around it.
CEZA FTS Offshore License
CEZA is a separate track for offshore operations within the economic zone, built for foreign-facing activity.
CEZA route fits operators who:
do not serve Philippine residents
do not run PHP conversions
need a tax-advantaged offshore base and operational presence
This is not a shortcut to onshore access. It is an offshore strategy with strict domestic prohibitions.
The 2025 Reality: Market Entry Under the BSP Moratorium
For 2025 entry planning, the BSP moratorium changes the dominant strategy from “apply” to “acquire or partner.”
Practical entry options we execute:
acquisition of an existing licensed or authorized entity (where change-of-control can be defended)
structured partnership models where licensed activity is performed by the authorized entity and your platform is integrated through controlled boundaries
CEZA-first offshore launch for international activity while building Philippine readiness for future BSP reopening
non-custodial or non-PHP product staging while preparing the full compliance operating system
The commercial point is simple: we build a route that can be executed now, not a theoretical plan that stalls at the gate.
Licensing Architecture: How We Decide “BSP vs SEC vs CEZA”
We start by mapping your real value chain, not your preferred label.
We classify your activities across:
fiat touchpoints and payment rails
custody exposure (who controls keys, who bears loss, who can freeze/restore)
transfer features (remittance-like routing, beneficiary handling, cross-border flows)
market-venue features (matching, order handling, execution, listing governance)
token distribution and offering mechanics
retail marketing posture and consumer exposure
Deliverable from this stage: one coherent licensing architecture with a defensible regulator narrative.
Compliance Operating Model the Philippines Actually Enforces
AMLC Registration and AML Operating Discipline
Philippine supervision treats AML as an operating system.
We build:
risk-based AML program aligned to your customer and transaction profile
KYC and verification flows that do not collapse at scale
suspicious activity governance: thresholds, typologies, escalation, decision logs
STR/CTR readiness with evidence-grade recordkeeping
sanctions and adverse media workflows integrated into onboarding and monitoring
EDD triggers for high-risk profiles and large-value activity
FATF Travel Rule Implementation
Travel Rule is not a policy paragraph. It is a platform capability.
We implement:
data capture logic for originator and beneficiary information
secure transmission and storage model for Travel Rule data
exception handling for counterparty mismatch and incomplete data
rules for unhosted wallet interactions, including enhanced due diligence
audit trails that can be reconstructed months later without narrative gaps
Technology Risk and Security Controls
BSP-grade resilience requires more than generic “security best practices.”
We structure:
IT risk management framework with governance ownership
penetration testing scope, cadence, remediation governance, and evidence packaging
incident response playbooks aligned to regulator expectations
custody and key management controls (HSM, multi-sig policy, access governance)
asset segregation model (legal + operational segregation, not just accounting lines)
business continuity and disaster recovery with realistic crypto-specific scenarios
Deliverables
You receive a complete, commercial-grade regulatory package plus an implementable operating system.
Regulatory Architecture Pack
service perimeter classification and regulator mapping
onshore vs offshore route decision memo (BSP/SEC/CEZA or combination)
moratorium-compliant entry strategy (acquisition/partnership/CEZA-first)
supervisory narrative that aligns governance, AML, custody, and technology into one system
Governance and Substance Pack
governance structure, roles, delegations, and decision authority design
fit-and-proper readiness dossier for directors, officers, and key shareholders
local substance plan: office, staffing model, and accountable control functions
board and management committee framework, minutes templates, escalation logs
AML and Financial Crime Pack
AML/CFT manual with risk-based approach tailored to your product
KYC/CDD/EDD procedures and operational workflows
monitoring rules, typologies, and alert handling SOPs
STR readiness processes and evidence retention structure
Travel Rule implementation plan integrated into onboarding and transfers
Technology and Custody Pack
IT risk management framework and control mapping
cybersecurity and incident response operating procedures
custody model documentation: segregation, wallet policy, key control governance
independent testing coordination pack (pen-test, vulnerability management reporting)
BCP/DR plan with crypto-specific stress scenarios and client notification logic
Submission and Supervisory Management Pack
application assembly, completeness checks, and regulator-ready formatting
Q&A management structure: tracking, evidence linking, version control
readiness for technical demonstrations and on-site inspections
post-approval supervisory reporting discipline design
Process
Discovery and Service Perimeter Definition
We translate your platform into regulated activities and identify your true regulator exposure.
Outputs include the perimeter map, gap analysis, and route selection.
Operating Model Build
We build the “institutional truth” regulators test: governance authority, AML execution, IT resilience, custody control, and record discipline.
Evidence and Dossier Assembly
We package the system into regulator-ready documentation — consistent, auditable, and free of contradictions between policies and actual operations.
Supervisory Engagement Management
We run the interaction cycle: follow-ups, clarifications, evidence production, remediation, and readiness for demonstrations and inspections.
Post-Approval Stabilisation
We convert the approval into a stable supervised business: reporting routines, control testing cadence, and audit readiness.
Timelines and What Drives Them
Timelines depend on route and readiness.
Typical planning ranges:
perimeter mapping and route decision: a few weeks, depending on complexity
operating model build and dossier assembly: varies by custody scope and platform maturity
acquisition-led entry: timeline driven by due diligence depth, change-of-control approval handling, and remediation needs
CEZA offshore setup: driven by substance build and zone registration execution
What usually extends timelines:
weak local decision authority (remote-control governance)
incomplete ownership transparency or fit-and-proper gaps
Travel Rule treated as a “vendor checkbox” without exception handling
custody controls that are not independently testable
missing evidence trails for controls claimed in policies
Key Commercial Decisions We Help You Get Right
whether you should be custodial in the Philippines, or stage custody later
how to structure PHP exposure without creating uncontrolled risk
how to handle unhosted wallets without breaking the client experience
how to design compliance so it scales with remittance-like growth
how to build a bank-facing narrative that risk committees accept
how to approach the BSP moratorium with an executable entry plan
Engagement Format
We run this as a managed regulatory project, not a document delivery.
You will have:
a structured workplan with clear milestones
weekly execution cadence and issue tracking
a single coherent documentation set with controlled versioning
a supervisor-ready operating system, not isolated policy fragments
Request a Crypto Licensing Assessment
Supervisory Reality After Approval
How BSP, SEC, and AMLC Actually Supervise a Live Crypto Business
Approval in the Philippines is not an endpoint. It is the beginning of a permanent supervisory relationship where regulators evaluate behaviour, not documents. This section explains what happens after authorisation, how supervision is exercised in practice, and what distinguishes VASPs that remain stable under scrutiny from those that drift into regulatory risk.
Philippine supervisors do not treat crypto businesses as technology platforms. They treat them as financial institutions operating high-risk transfer infrastructure. Every supervisory interaction is framed around one question: does the organisation behave as declared when pressure appears?
Supervision as an Ongoing Operating Condition
Supervision in the Philippines is continuous, not episodic. Regulators assume that crypto businesses are exposed to volatility, fraud, cyber risk, and rapid scale. As a result, they test whether controls operate consistently over time.
Key characteristics of ongoing supervision include:
-
repeated information requests tied to transaction behaviour
-
thematic reviews focused on AML, Travel Rule execution, and custody controls
-
ad-hoc inquiries triggered by market events or user complaints
-
retrospective reconstruction of past decisions and incidents
Supervisors are less interested in whether a policy exists and more interested in whether the organisation can prove how it acted in a specific situation months later.
What Regulators Monitor Continuously
Governance Behaviour Under Stress
Governance is tested during moments of friction, not during routine operations.
Supervisors observe:
-
who actually makes risk decisions when alerts escalate
-
whether board and senior management involvement is real or symbolic
-
how conflicts between commercial objectives and compliance controls are resolved
-
whether delegations of authority are respected in practice
Weak governance patterns include delayed decisions, informal overrides, undocumented approvals, and reliance on offshore parent instructions without local accountability.
AML Execution and Decision Discipline
AML supervision focuses on execution quality, not policy language.
Regulators assess:
-
alert volumes versus resolution capacity
-
quality of investigation narratives
-
consistency of STR filing thresholds
-
escalation discipline for complex or borderline cases
-
evidence that alerts are closed based on analysis, not pressure
A common failure pattern is “alert fatigue”, where monitoring rules exist but teams lack the authority or capacity to act decisively.
Travel Rule Operational Integrity
Travel Rule compliance is reviewed as a transactional process, not a compliance checkbox.
Supervisory attention includes:
-
accuracy and completeness of transmitted data
-
handling of counterparties with incompatible Travel Rule standards
-
treatment of failed or partial data transfers
-
controls around unhosted wallet interactions
-
reconciliation between blockchain data and internal records
Breakdowns usually occur at scale, when transaction volumes rise and exception handling is underdeveloped.
Custody and Asset Protection Behaviour
Custody supervision focuses on control, not technology branding.
Regulators test:
-
who can access private keys and under what conditions
-
how emergency access is governed
-
segregation between client and proprietary assets
-
procedures for loss events, forks, or protocol failures
-
reconciliation frequency and discrepancy handling
Any ambiguity around key control or asset ownership is treated as a material supervisory concern.
Supervisory Interaction Patterns
Routine Reporting
Licensed VASPs are required to submit regular reports covering:
-
transaction volumes and values
-
user metrics and activity segmentation
-
AML indicators and STR statistics
-
operational incidents and remediation actions
-
financial condition and capital position
Reports are not passive filings. Supervisors use them to build behavioural profiles and identify anomalies over time.
Thematic Reviews
Regulators periodically launch focused reviews across the sector.
Typical themes include:
-
AML effectiveness in high-risk corridors
-
Travel Rule implementation consistency
-
cybersecurity resilience and incident handling
-
custody and asset segregation controls
-
outsourcing and third-party risk management
Thematic reviews often result in follow-up actions, even for compliant firms.
Event-Driven Inquiries
Certain events automatically attract supervisory attention:
-
security breaches or attempted intrusions
-
abnormal transaction spikes
-
significant customer complaints
-
media exposure involving fraud or losses
-
rapid growth without corresponding control expansion
In these situations, regulators expect immediate transparency and structured responses.
Recordkeeping and Regulatory Memory
Retrospective Accountability
Philippine supervisors operate with long institutional memory.
VASPs must be able to reconstruct:
-
why a customer was onboarded
-
why a transaction was allowed or blocked
-
who approved an exception
-
what information was available at the time
-
how risks were assessed then, not later
Poor recordkeeping is treated as a governance failure, not an administrative lapse.
Evidence Expectations
Evidence must be:
-
contemporaneous, not recreated
-
internally consistent across systems
-
attributable to specific decision-makers
-
preserved for regulatory inspection
Email chains, chat messages, and informal approvals often become part of supervisory reviews.
Operational Substance and Local Authority
Why Local Presence Is Actively Tested
Local presence is not symbolic. Regulators test whether:
-
key officers are physically accessible
-
decisions can be made without offshore approval delays
-
compliance teams can act independently
-
escalation paths remain functional during crises
Remote-control models are systematically challenged.
Staffing and Capacity Monitoring
Supervisors observe:
-
staffing ratios relative to transaction volumes
-
turnover in compliance and risk roles
-
training effectiveness and continuity
-
reliance on contractors versus internal staff
Under-resourced teams are viewed as structural risk indicators.
Banking Relationships and Supervisory Alignment
How Banking Access Is Evaluated
Banks in the Philippines rely heavily on regulatory signals.
They assess:
-
quality of BSP supervision
-
history of regulatory findings
-
AML execution credibility
-
transparency of ownership and governance
A VASP’s ability to maintain banking relationships is directly linked to its supervisory reputation.
Managing Bank-Driven Reviews
Banks routinely conduct their own reviews, which often mirror regulatory concerns.
Successful VASPs:
-
maintain regulator-aligned documentation
-
can explain control logic clearly
-
provide timely, structured responses
-
avoid contradictions between bank and regulator narratives
Scaling Under Supervision
Growth as a Supervisory Test
Rapid growth is not viewed positively by default.
Regulators evaluate:
-
whether controls scale with volumes
-
whether monitoring thresholds are recalibrated
-
whether staffing expands proportionally
-
whether governance keeps pace with complexity
Uncontrolled growth is treated as a risk event.
Product Expansion Controls
Adding new features or services requires internal discipline.
Supervisors expect:
-
documented change management
-
risk assessments for new products
-
AML and Travel Rule impact analysis
-
governance approvals before launch
Silent feature creep is a common supervisory red flag.
Incident Management Expectations
Security and Operational Incidents
When incidents occur, regulators expect:
-
immediate containment actions
-
clear internal escalation
-
accurate impact assessment
-
timely regulator notification
-
structured remediation plans
Minimisation or delayed disclosure significantly worsens outcomes.
Customer Impact and Communication
Supervisors evaluate:
-
how clients are informed
-
whether communications are accurate and timely
-
whether compensation or remediation is handled fairly
-
whether complaint handling remains functional
Poor client communication often triggers deeper reviews.
Enforcement Philosophy
Progressive Intervention
Philippine regulators typically escalate gradually:
-
observations and guidance
-
formal findings and remediation timelines
-
activity restrictions
-
penalties or licence suspension
Early transparency and cooperation materially influence outcomes.
What Triggers Severe Action
Severe intervention is usually linked to:
-
misrepresentation of operations
-
repeated AML failures
-
asset protection breaches
-
obstruction or non-cooperation
-
governance collapse
Documentation alone cannot compensate for behavioural failures.
How We Build for Supervisory Longevity
Our approach is designed around survivability under supervision, not just approval.
We structure:
-
decision frameworks that work during crises
-
AML processes that scale and remain defensible
-
Travel Rule execution that handles exceptions gracefully
-
custody controls that withstand forensic review
-
governance that can explain itself years later
The objective is a Philippine crypto operation that regulators, banks, and partners trust over time — even as the market evolves and pressure increases.
Institutional Operating Model
How a Philippine Crypto Business Must Actually Be Built to Survive Supervision
A Philippine crypto licence is only defensible if the business is constructed as a single, internally coherent operating system. Regulators do not evaluate compliance functions, technology, governance, and finance separately. They evaluate whether these components reinforce each other under pressure.
This section explains how a Philippine crypto operation must be architected, not described. It focuses on operating logic, internal discipline, and structural decisions that determine whether the licence remains stable over time.
One Operating System, Not a Collection of Policies
The dominant supervisory assumption in the Philippines is that fragmented systems fail. A VASP built as disconnected silos will eventually contradict itself under scrutiny.
A viable institutional model demonstrates:
-
alignment between governance authority and operational execution
-
consistency between AML risk appetite and product design
-
coherence between custody controls and financial planning
-
traceability between decisions, actions, and records
Supervisors actively test for contradictions between declared intent and operational reality.
Governance Architecture That Regulators Trust
Board and Senior Management Function
The board is not symbolic. It is a control organ.
Supervisors expect boards to:
-
understand the crypto-specific risks of the business
-
actively approve risk appetite and material changes
-
receive and question compliance and incident reports
-
document dissent and challenge, not just approval
A board that only ratifies management proposals is treated as weak governance.
Executive Authority and Local Decision-Making
Local authority is a core requirement.
Effective structures ensure:
-
executives can suspend activity without offshore approval
-
compliance heads have independent escalation rights
-
local management controls budgets for risk mitigation
-
crisis decisions are not delayed by parent company politics
Remote-control governance models are systematically rejected in practice.
Committees and Control Functions
Committees are expected to function, not exist.
Common supervisory focus areas include:
-
risk committees that actively review exposure metrics
-
AML committees that resolve high-risk cases formally
-
IT or security committees that oversee resilience and incidents
Minutes are examined for substance, not formatting.
Financial Logic and Capital Discipline
Capital as a Risk Buffer, Not a Number
Paid-in capital is evaluated in relation to operational risk.
Supervisors assess:
-
custody exposure versus capital adequacy
-
liquidity under stress scenarios
-
ability to absorb operational losses
-
dependence on parent funding
Capital planning that ignores volatility or custody risk is considered superficial.
Treasury and Asset Segregation
Financial controls must be explicit and enforceable.
A defensible model includes:
-
legally segregated client accounts
-
operational separation between client and house wallets
-
reconciliation routines with escalation thresholds
-
clear loss-allocation logic
Any ambiguity around asset ownership invites regulatory intervention.
AML as an Operating Capability
Risk-Based Approach in Practice
Risk-based AML means the system adapts.
Supervisors expect:
-
differentiated treatment of customer segments
-
dynamic monitoring thresholds
-
periodic reassessment of risk profiles
-
documented rationale for risk decisions
Static risk matrices are quickly identified and criticised.
Alert Handling and Escalation
AML effectiveness is measured at the alert level.
Regulators review:
-
alert quality versus volume
-
investigation depth and reasoning
-
escalation timelines
-
senior management involvement in sensitive cases
Closing alerts without analytical narrative is a common failure point.
STR Discipline
STRs are judged on credibility.
Effective practices include:
-
clear articulation of suspicion
-
linkage to transaction patterns
-
internal approval records
-
consistency with prior risk assessments
Over-reporting and under-reporting are both treated as weaknesses.
Travel Rule as Transaction Infrastructure
Embedded, Not Layered
Travel Rule compliance must be embedded in transaction flows.
Supervisors assess:
-
how data is captured at initiation
-
how it is transmitted and verified
-
how failures are handled
-
how exceptions are escalated
Manual workarounds collapse under volume.
Unhosted Wallet Treatment
Unhosted wallets are not prohibited, but they are scrutinised.
Expected controls include:
-
enhanced due diligence triggers
-
transaction limits or monitoring intensification
-
behavioural pattern analysis
-
management sign-off for elevated risk
Treating unhosted wallets as “normal” is a regulatory red flag.
Technology as a Supervisory Topic
IT Risk Governance
Technology is supervised as infrastructure.
Regulators evaluate:
-
ownership of IT risk
-
incident response authority
-
testing and remediation discipline
-
dependency on third-party providers
Lack of internal technical understanding at management level is viewed negatively.
Cybersecurity and Incident Handling
Incident handling defines credibility.
Supervisors expect:
-
predefined incident classification
-
immediate containment actions
-
forensic capability or access
-
clear communication lines
Delayed disclosure erodes trust rapidly.
Change Management
Every platform change is a risk event.
Strong controls include:
-
documented change approval
-
risk assessment for new features
-
testing before deployment
-
rollback procedures
Silent releases are routinely uncovered during reviews.
Custody and Key Control Reality
Control Over Keys
Custody is evaluated through control, not custody labels.
Regulators test:
-
who can initiate key access
-
how approvals are granted
-
how emergency access is handled
-
how keys are backed up and recovered
Single-person control structures are unacceptable.
Loss Scenarios and Recovery
Supervisors expect realistic planning.
This includes:
-
protocol failure scenarios
-
internal fraud scenarios
-
operational error scenarios
-
client communication plans
Optimistic assumptions undermine credibility.
Operational Substance and Staffing
Staffing as a Risk Metric
Staffing levels are monitored continuously.
Regulators consider:
-
workload per compliance officer
-
turnover rates
-
training frequency
-
reliance on external consultants
Chronic understaffing is treated as structural non-compliance.
Training and Institutional Knowledge
Training is expected to be ongoing.
Effective programmes include:
-
onboarding for new hires
-
scenario-based AML training
-
incident response drills
-
governance awareness for executives
Generic online courses are insufficient.
Outsourcing and Third-Party Risk
Vendor Dependency
Outsourcing does not transfer responsibility.
Supervisors assess:
-
due diligence on vendors
-
contractual control rights
-
contingency plans for vendor failure
-
monitoring of vendor performance
Critical functions without fallback plans are flagged.
Group Structures and Intragroup Services
Intragroup arrangements are examined closely.
Regulators expect:
-
arm’s-length documentation
-
clear accountability lines
-
independence of local control functions
Group dominance without safeguards is challenged.
Product Design and Consumer Protection
Product Risk Awareness
Product design is treated as a compliance matter.
Supervisors review:
-
fee transparency
-
risk disclosures
-
suitability for target users
-
marketing alignment with actual risk
Aggressive marketing unsupported by controls attracts scrutiny.
Complaint Handling
Complaints are regulatory signals.
Expected practices include:
-
structured intake and classification
-
root-cause analysis
-
timely resolution
-
escalation of systemic issues
Ignored complaints often trigger thematic reviews.
Scaling Without Regulatory Drift
Growth Controls
Growth must be governed.
Supervisors look for:
-
growth triggers tied to control expansion
-
staffing thresholds linked to volume
-
recalibration of monitoring systems
Unmanaged growth is treated as a failure of governance.
Geographic Expansion
Cross-border activity adds complexity.
Expectations include:
-
jurisdictional risk assessment
-
consistency with Philippine licence scope
-
alignment with foreign Travel Rule standards
Uncoordinated expansion creates compliance fragmentation.
Internal Audit and Self-Testing
Independent Assurance
Self-testing is expected.
A robust model includes:
-
periodic internal audits
-
thematic reviews
-
follow-up on findings
-
board oversight of remediation
No self-critique suggests institutional immaturity.
Learning from Findings
Regulators value learning behaviour.
They assess whether:
-
findings lead to real changes
-
repeat issues are eliminated
-
root causes are addressed
Repeated minor findings can escalate into major concerns.
Culture as a Supervisory Factor
Compliance Culture
Culture is inferred from behaviour.
Signals regulators notice:
-
willingness to escalate bad news
-
absence of blame-shifting
-
clarity in decision ownership
-
respect for control functions
Toxic growth culture undermines even strong frameworks.
FAQ
The Philippines uses two primary licenses: VASP and CASP. VASP (Virtual Asset Service Provider) is issued by the central bank (BSP) and primarily focuses on crypto-fiat exchange and remittances (AML/CTF compliance). CASP (Crypto-Asset Service Provider) is a newer registration/license from the Securities and Exchange Commission (SEC). It governs all entities dealing with crypto-asset securities, custody, and platforms that offer crypto services to Filipino investors.
It depends on your core business model. You will likely need both for comprehensive operations: BSP (VASP): Required for any exchange involving Philippine Pesos (fiat) or cross-border money transfer activities. SEC (CASP): Required for any service involving custody of client assets, token offerings, or platforms dealing with tokens that qualify as securities.
Yes. The Bangko Sentral ng Pilipinas (BSP) has imposed an indefinite moratorium on accepting new VASP license applications (as of late 2025). This is a move to strengthen regulatory oversight and mitigate risks following the country’s removal from the FATF grey list.
Since the moratorium only applies to new applications, the most viable path for market entry is through the acquisition (M&A) of an existing, already licensed VASP. This process requires exhaustive due diligence and subsequent formal approval from the BSP for the change of control.
To register as a CASP, the applicant must be incorporated in the Philippines and meet a minimum paid-up capital of ₱100 million Philippine Pesos (excluding crypto-assets). This high threshold is designed to ensure financial resilience and enhanced investor protection.
The capital requirement for a BSP-licensed VASP is tiered based on its classification as a Money Service Business (MSB). This typically ranges from ₱10 million to ₱50 million, depending on the extent and complexity of the services offered (e.g., simple exchange vs. complex transfers).
Yes. Both the BSP (VASP) and SEC (CASP) frameworks explicitly mandate that the applicant must establish a registered local corporation and maintain a physical office presence within the Philippines.
The VASP must implement a robust compliance program that includes: Strict KYC/CDD (Know Your Customer/Customer Due Diligence) procedures. Continuous transaction monitoring and suspicious activity reporting (SARs). Full technical compliance with the FATF Travel Rule. Ongoing Enterprise-Wide Risk Assessment.
Absolutely. The BSP strictly enforces the Travel Rule compliance Philippines, which requires VASPs to securely transmit verifiable originator and beneficiary information for all crypto transactions exceeding the established threshold (generally ₱50,000).
No. The CEZA (Cagayan Economic Zone Authority) Crypto License is strictly an offshore license. It is designed for businesses serving international clients. Licensees must implement geofencing controls and are expressly forbidden from marketing to or transacting with Philippine residents or using the domestic financial system.
While the official timeline for BSP approval was previously around 2 months, the overall process—including corporate setup, IT Audit for Crypto Exchanges, development of AML manuals, and regulatory interviews—usually takes 6 to 12 months (excluding the current VASP moratorium period).
Both BSP and SEC require a mandatory, independent IT Audit to confirm the security architecture. This includes system resilience, key custody procedures, internal controls, and regular Penetration Testing (Pen-testing) to prove the VASP's ability to protect customer funds and data.
DATO (Digital Asset Token Offering) regulations are issued by CEZA and govern the issuance of digital tokens within the economic zone. If a token targets the domestic market or is classified as a security, it falls under the more stringent SEC CASP rules regarding registration and disclosure.
