How do I prove elder financial exploitation if local authorities refuse to pursue an investigation?: North Carolina guidance you can use now – South Carolina
Short Answer
In South Carolina, proving elder (or vulnerable adult) financial exploitation usually means building a clear paper trail showing (1) the adult qualifies for protection, (2) money or property was taken or used wrongfully or through undue influence or deception, and (3) who benefited from the transactions. Even if law enforcement does not pursue a case, South Carolina law can still allow reports to Adult Protective Services and, in some situations, a civil case in circuit court to recover losses or stop further exploitation. The most effective proof often comes from bank records, power of attorney documents, witness statements, and a timeline that ties the suspect to specific transactions.
Understanding the Problem
The question is how to prove elder financial exploitation in South Carolina when local authorities decline to investigate. The decision point is not whether a crime occurred, but what proof can be gathered and organized so that another agency, a probate court process, or a civil court case can act on it. The core issue is showing that an older or vulnerable adult’s money or property was taken, withheld, or redirected without proper authority, or through undue influence, deception, intimidation, or similar pressure. Timing matters because financial records can disappear, witnesses’ memories fade, and ongoing access (like a power of attorney or joint account) can allow continued transfers.
Apply the Law
South Carolina addresses exploitation of vulnerable adults through the Omnibus Adult Protection Act and related laws. Separately, South Carolina also defines “financial exploitation” for certain financial-services professionals dealing with an “eligible adult” (often age 55+), and it recognizes that civil lawsuits may be filed even when criminal enforcement does not happen. In practice, proof usually focuses on authority (who had the right to act), capacity and influence (whether the adult could freely choose), and traceable transactions (where the money went).
Key Requirements
- Protected person status: Evidence that the person is a “vulnerable adult” under South Carolina’s adult protection framework, or an “eligible adult” under the financial exploitation definitions used in certain financial-account contexts.
- Wrongful taking or misuse: Proof that money, assets, or property were taken, withheld, appropriated, or used without authorization, or obtained through deception, intimidation, undue influence, or a fraudulent scheme.
- Connection to the suspected exploiter: Records and testimony tying a specific person to the transactions (access, signatures, logins, ATM footage, beneficiary changes, new joint accounts, or use of a power of attorney).
What the Statutes Say
- S.C. Code Ann. § 35-1-800 (Definitions for “eligible adult” and “financial exploitation”) – Defines financial exploitation broadly, including misuse through a power of attorney, guardianship, or conservatorship, and exploitation by undue influence or deception.
- S.C. Code Ann. § 43-35-15 (How reports are investigated/referrals made) – Describes which agencies investigate or receive referrals for reports of abuse, neglect, or exploitation of vulnerable adults, including Adult Protective Services and SLED’s Vulnerable Adults Investigations Unit in certain settings.
- S.C. Code Ann. § 43-35-85 (Penalties for exploitation and related conduct) – Makes exploitation of a vulnerable adult a felony and also addresses intimidation of witnesses and obstruction of investigations.
- S.C. Code Ann. § 37-6-119 (Trade practices targeting vulnerable adults; civil action) – Prohibits obtaining a vulnerable adult’s money or property by deception, intimidation, or undue influence and authorizes a civil lawsuit by the vulnerable adult, a legally authorized person, or the estate.
- S.C. Code Ann. § 35-1-880 (Civil liability; circuit court) – Clarifies that civil claims may be filed in circuit court against those who participate in or materially aid financial exploitation of an eligible adult in the contexts covered by that article.
- S.C. Code Ann. § 43-35-87 (Financial institutions may delay transactions; reporting; records) – Allows certain holds on transactions when exploitation is suspected and supports reporting and sharing records with investigative entities or law enforcement.
Analysis
Apply the Rule to the Facts: When authorities decline to investigate, the proof burden effectively shifts to building a record that stands on its own: a timeline, documents showing the adult’s vulnerability or susceptibility, and transaction evidence showing unauthorized transfers or pressure-based changes. If the suspected exploiter had formal authority (like a power of attorney), the key proof often becomes whether that authority was used to benefit the agent rather than the adult, or whether the adult’s decisions were driven by undue influence or deception. If the suspected exploiter had informal access (like a joint account or debit card), the key proof often becomes tracing withdrawals and showing the adult did not understand or approve them.
Process & Timing
- Who files: A concerned family member, caregiver, or other reporter can make a report; a legally authorized representative (such as a guardian/conservator) may act for the adult. Where: Adult Protective Services (South Carolina Department of Social Services) for non-facility settings; the Long Term Care Ombudsman Program for many facility-related noncriminal reports; and in certain settings SLED’s Vulnerable Adults Investigations Unit coordinates referrals. What: A written or recorded report supported by a document packet (account statements, power of attorney, deeds, contracts, text messages). When: As soon as exploitation is suspected, because records and access can change quickly.
- Build a “proof packet” while reporting continues: Create a one-page timeline (date, transaction, amount, account, who initiated it, and why it is suspicious). Attach supporting documents in the same order as the timeline. Include a short witness list (who observed pressure, isolation, sudden changes, or confusion).
- Consider court-based protection and recovery: If the adult cannot protect finances, a probate court process may be needed to appoint a decision-maker. If the goal is to recover money or stop ongoing exploitation, a civil action may be filed in circuit court under statutes that allow civil claims in certain exploitation contexts and under other civil theories that fit the facts (for example, claims tied to misuse of authority or improper transfers).
Exceptions & Pitfalls
- “It was a gift” defenses: A common response is that transfers were gifts or repayment. Proof should focus on the adult’s intent, consistency with prior patterns, and whether pressure, isolation, or deception drove the transfer.
- Authority documents cut both ways: A power of attorney or joint account can explain access, but it does not automatically prove permission for self-dealing or coercion. The proof packet should separate “had access” from “had authorization and acted for the adult’s benefit.”
- Missing records and vague allegations: Reports that lack dates, account numbers, and transaction details often stall. A tight timeline with supporting statements, canceled checks, wire details, and beneficiary-change paperwork usually moves the issue forward faster.
- Witness intimidation and obstruction: South Carolina law addresses intimidation and obstruction in vulnerable adult investigations; documenting threats, sudden isolation, or blocked access can matter both for safety planning and credibility.
- Bank holds are limited: Financial institutions may be able to delay suspicious transactions in certain situations, but holds can expire and are discretionary. Evidence collection should not rely on a hold alone.
Conclusion
In South Carolina, proving elder or vulnerable adult financial exploitation usually requires clear evidence that a protected adult’s money or property was wrongfully taken or redirected, often through unauthorized use, deception, intimidation, or undue influence, and that a specific person benefited or controlled the transactions. Even if local authorities decline to investigate, documentation can support an APS report and, in appropriate cases, a civil filing in circuit court. The most important next step is to assemble a dated timeline and request key financial records promptly so evidence is preserved.
Talk to a Probate Attorney
If a vulnerable adult’s money appears to be disappearing and authorities are not moving forward, a probate attorney can help organize proof, identify the right reporting path, and evaluate court options to protect assets and pursue recovery. Related reading: guardianship or conservatorship steps in South Carolina and power of attorney vs. guardianship in South Carolina.
Disclaimer: This article provides general information about South Carolina law based on the single question stated above. It is not legal advice for your specific situation and does not create an attorney-client relationship. Laws, procedures, and local practice can change and may vary by county. If you have a deadline, act promptly and speak with a licensed South Carolina attorney.


