Call Now
(843) 277-9777


How do I prove elder financial exploitation if local authorities refuse to pursue an investigation?: North Carolina guidance you can use now – South Carolina

Short Answer

In South Carolina, proving elder (or vulnerable adult) financial exploitation usually means building a clear paper trail showing (1) the adult qualifies for protection, (2) money or property was taken or used wrongfully or through undue influence or deception, and (3) who benefited from the transactions. Even if law enforcement does not pursue a case, South Carolina law can still allow reports to Adult Protective Services and, in some situations, a civil case in circuit court to recover losses or stop further exploitation. The most effective proof often comes from bank records, power of attorney documents, witness statements, and a timeline that ties the suspect to specific transactions.

Understanding the Problem

The question is how to prove elder financial exploitation in South Carolina when local authorities decline to investigate. The decision point is not whether a crime occurred, but what proof can be gathered and organized so that another agency, a probate court process, or a civil court case can act on it. The core issue is showing that an older or vulnerable adult’s money or property was taken, withheld, or redirected without proper authority, or through undue influence, deception, intimidation, or similar pressure. Timing matters because financial records can disappear, witnesses’ memories fade, and ongoing access (like a power of attorney or joint account) can allow continued transfers.

Apply the Law

South Carolina addresses exploitation of vulnerable adults through the Omnibus Adult Protection Act and related laws. Separately, South Carolina also defines “financial exploitation” for certain financial-services professionals dealing with an “eligible adult” (often age 55+), and it recognizes that civil lawsuits may be filed even when criminal enforcement does not happen. In practice, proof usually focuses on authority (who had the right to act), capacity and influence (whether the adult could freely choose), and traceable transactions (where the money went).

Key Requirements

  • Protected person status: Evidence that the person is a “vulnerable adult” under South Carolina’s adult protection framework, or an “eligible adult” under the financial exploitation definitions used in certain financial-account contexts.
  • Wrongful taking or misuse: Proof that money, assets, or property were taken, withheld, appropriated, or used without authorization, or obtained through deception, intimidation, undue influence, or a fraudulent scheme.
  • Connection to the suspected exploiter: Records and testimony tying a specific person to the transactions (access, signatures, logins, ATM footage, beneficiary changes, new joint accounts, or use of a power of attorney).

What the Statutes Say

Analysis

Apply the Rule to the Facts: When authorities decline to investigate, the proof burden effectively shifts to building a record that stands on its own: a timeline, documents showing the adult’s vulnerability or susceptibility, and transaction evidence showing unauthorized transfers or pressure-based changes. If the suspected exploiter had formal authority (like a power of attorney), the key proof often becomes whether that authority was used to benefit the agent rather than the adult, or whether the adult’s decisions were driven by undue influence or deception. If the suspected exploiter had informal access (like a joint account or debit card), the key proof often becomes tracing withdrawals and showing the adult did not understand or approve them.

Process & Timing

  1. Who files: A concerned family member, caregiver, or other reporter can make a report; a legally authorized representative (such as a guardian/conservator) may act for the adult. Where: Adult Protective Services (South Carolina Department of Social Services) for non-facility settings; the Long Term Care Ombudsman Program for many facility-related noncriminal reports; and in certain settings SLED’s Vulnerable Adults Investigations Unit coordinates referrals. What: A written or recorded report supported by a document packet (account statements, power of attorney, deeds, contracts, text messages). When: As soon as exploitation is suspected, because records and access can change quickly.
  2. Build a “proof packet” while reporting continues: Create a one-page timeline (date, transaction, amount, account, who initiated it, and why it is suspicious). Attach supporting documents in the same order as the timeline. Include a short witness list (who observed pressure, isolation, sudden changes, or confusion).
  3. Consider court-based protection and recovery: If the adult cannot protect finances, a probate court process may be needed to appoint a decision-maker. If the goal is to recover money or stop ongoing exploitation, a civil action may be filed in circuit court under statutes that allow civil claims in certain exploitation contexts and under other civil theories that fit the facts (for example, claims tied to misuse of authority or improper transfers).

Exceptions & Pitfalls

  • “It was a gift” defenses: A common response is that transfers were gifts or repayment. Proof should focus on the adult’s intent, consistency with prior patterns, and whether pressure, isolation, or deception drove the transfer.
  • Authority documents cut both ways: A power of attorney or joint account can explain access, but it does not automatically prove permission for self-dealing or coercion. The proof packet should separate “had access” from “had authorization and acted for the adult’s benefit.”
  • Missing records and vague allegations: Reports that lack dates, account numbers, and transaction details often stall. A tight timeline with supporting statements, canceled checks, wire details, and beneficiary-change paperwork usually moves the issue forward faster.
  • Witness intimidation and obstruction: South Carolina law addresses intimidation and obstruction in vulnerable adult investigations; documenting threats, sudden isolation, or blocked access can matter both for safety planning and credibility.
  • Bank holds are limited: Financial institutions may be able to delay suspicious transactions in certain situations, but holds can expire and are discretionary. Evidence collection should not rely on a hold alone.

Conclusion

In South Carolina, proving elder or vulnerable adult financial exploitation usually requires clear evidence that a protected adult’s money or property was wrongfully taken or redirected, often through unauthorized use, deception, intimidation, or undue influence, and that a specific person benefited or controlled the transactions. Even if local authorities decline to investigate, documentation can support an APS report and, in appropriate cases, a civil filing in circuit court. The most important next step is to assemble a dated timeline and request key financial records promptly so evidence is preserved.

Talk to a Probate Attorney

If a vulnerable adult’s money appears to be disappearing and authorities are not moving forward, a probate attorney can help organize proof, identify the right reporting path, and evaluate court options to protect assets and pursue recovery. Related reading: guardianship or conservatorship steps in South Carolina and power of attorney vs. guardianship in South Carolina.

Disclaimer: This article provides general information about South Carolina law based on the single question stated above. It is not legal advice for your specific situation and does not create an attorney-client relationship. Laws, procedures, and local practice can change and may vary by county. If you have a deadline, act promptly and speak with a licensed South Carolina attorney.

A button with a phone icon and the text 'Call us now'.

close-link

Discover more from Branch Estate Planning | Probate and Estate Planning Lawyers

Subscribe now to keep reading and get access to the full archive.

Continue reading