Skip to content

Crypto Regulation in Netherlands

The Netherlands applies crypto regulation through a combined framework of MiCA, the Dutch Wwft AML/CFT regime, the EU Transfer of Funds Regulation, sanctions controls, and national supervision by DNB and AFM. Whether a firm needs a Netherlands crypto license depends on the exact service, token type, custody model, and target market.

The Netherlands applies crypto regulation through a combined framework of MiCA, the Dutch Wwft AML/CFT regime, the EU Transfer of Funds Regulation, sanctions controls, and national supervision by DNB and AFM. Whether a firm needs a Netherlands crypto license depends on the exact service, token type, custody model, and target market.

This page is for general informational purposes only and does not constitute legal, tax, or regulatory advice.

Disclaimer This page is for general informational purposes only and does not constitute legal, tax, or regulatory advice.
Quick answer

Executive Snapshot

Key regulatory facts, timeline markers, and practical next steps for a fast initial read.

At a Glance

Core rulebook
MiCA is the main EU framework for crypto-asset services and certain token issuers, while the Dutch Wwft and EU TFR add AML/CFT, KYC, sanctions, and Travel Rule obligations.
Main regulators
De Nederlandsche Bank (DNB) and the Autoriteit Financiële Markten (AFM) are the key Dutch authorities, with ESMA, EBA, and the European Commission shaping the EU-level rule set and technical standards.
License trigger
A Netherlands crypto license or authorization question is activity-based. Custody, exchange, trading platform operation, transfer services, order handling, advice, and portfolio management usually require a regulated analysis under MiCA.
Legacy vs current regime
A historic Dutch AML registration position is not the same as a full MiCA CASP authorization. Firms must map old status against current EU authorization requirements.
Daily compliance
Operating legally in the Netherlands requires more than filing an application. Firms need CDD/KYC, UBO identification, sanctions screening, transaction monitoring, suspicious transaction reporting, recordkeeping, and Travel Rule workflows.

Mini Timeline

2020
Dutch AML registration regime became operational for certain crypto service providers under the Wwft framework.

This was primarily an AML/CFT entry regime, not a full conduct-and-prudential crypto licensing system.

2024
EU MiCA started phasing in, including earlier application for stablecoin-related parts.

The token type became as important as the service type.

2025-2026
Practical transition from fragmented national crypto treatment toward the EU-wide MiCA model for CASPs.

Implementation details depend on supervisory guidance, filings, and transitional arrangements.

Quick Assessment

  • If your firm controls client private keys, assume a high probability of authorization analysis.
  • If your platform matches or routes client crypto orders, treat it as potentially regulated even without fiat rails.
  • If you issue a token, classify it first: ART, EMT, or another crypto-asset.
  • If you market into the Netherlands from another EU state, check passporting, local conduct expectations, and sanctions controls.
  • If you rely on a non-custodial narrative, test actual control, intermediation, and fee model before assuming you are out of scope.
Request a scope analysis
Executive brief

Crypto regulation in the Netherlands in 2026: the short answer

Crypto regulation in Netherlands in 2026 is not a single domestic statute. It is a layered system combining MiCA for crypto-asset services and certain issuers, the Dutch Wwft for AML/CFT controls, the EU Transfer of Funds Regulation for the Travel Rule, Dutch and EU sanctions obligations, and supervision by DNB and AFM within the broader EU architecture led by ESMA, EBA, and the European Commission. In practice, many firms asking about a Netherlands crypto license are really asking two separate questions: (1) does the business model fall within a regulated crypto-asset service perimeter, and (2) what operational controls must exist before launch. The answer depends on the exact activity. A custody provider, exchange, broker-like intermediary, trading platform, transfer service provider, adviser, or portfolio manager is far more likely to require formal authorization analysis than a pure software developer with no control over client assets. The critical compliance distinction in 2026 is between a legacy AML registration logic and the broader MiCA authorization model for CASPs.

Recent changes

What changed recently

The main change is structural. The Netherlands moved from a narrower national AML-focused treatment for certain crypto firms toward the broader EU-wide MiCA framework for crypto-asset service providers and relevant issuers. That means the question is no longer only whether a firm is visible for AML supervision under Dutch law. The question in 2026 is whether the firm falls within a defined CASP service category, whether a token triggers issuer obligations, and how the business satisfies daily control expectations under Wwft, TFR, sanctions rules, and governance standards. A second practical change is that firms can no longer treat the Travel Rule as a side issue. Under the EU Transfer of Funds Regulation, originator and beneficiary information handling is an operational requirement, not a policy footnote.

Topic Legacy Approach Current Approach
Entry regime Dutch AML registration logic for certain crypto exchange and custodian wallet activities under the Wwft. EU MiCA authorization analysis for CASPs, combined with AML/CFT and Travel Rule obligations.
Regulatory focus Primary emphasis on AML/CFT onboarding and monitoring. AML/CFT remains critical, but firms must also address governance, conduct, disclosures, complaints handling, safeguarding, outsourcing, and ICT controls.
Geographic strategy National-by-national treatment created fragmented market entry planning. MiCA creates a clearer EU passporting pathway, subject to proper authorization and compliance.
Token analysis Token type often received less structured legal treatment outside specific sectors. Token classification matters directly, especially for asset-referenced tokens and e-money tokens.
Topic
Entry regime
Legacy Approach
Dutch AML registration logic for certain crypto exchange and custodian wallet activities under the Wwft.
Current Approach
EU MiCA authorization analysis for CASPs, combined with AML/CFT and Travel Rule obligations.
Topic
Regulatory focus
Legacy Approach
Primary emphasis on AML/CFT onboarding and monitoring.
Current Approach
AML/CFT remains critical, but firms must also address governance, conduct, disclosures, complaints handling, safeguarding, outsourcing, and ICT controls.
Topic
Geographic strategy
Legacy Approach
National-by-national treatment created fragmented market entry planning.
Current Approach
MiCA creates a clearer EU passporting pathway, subject to proper authorization and compliance.
Topic
Token analysis
Legacy Approach
Token type often received less structured legal treatment outside specific sectors.
Current Approach
Token classification matters directly, especially for asset-referenced tokens and e-money tokens.
Supervisory map

Who regulates crypto in the Netherlands: DNB, AFM and EU authorities

The Dutch supervisory map is split by function. DNB and AFM are the key national authorities, but the Netherlands cannot be analyzed in isolation because MiCA is an EU regulation and supervisory expectations are shaped by ESMA, EBA, and the European Commission. In practical terms, firms usually interact with national authorities for authorization, supervision, and local compliance expectations, while EU authorities drive technical standards, convergence, and interpretive direction. A founder asking who the Netherlands crypto regulator is should expect a multi-authority answer, not a single-agency answer. That matters because the same firm may face AML/CFT scrutiny, conduct obligations, governance review, and token disclosure requirements under different supervisory lenses.

01 Authority

De Nederlandsche Bank (DNB)

Role

Key Dutch authority for AML/CFT supervision touchpoints and an important supervisory actor in the Dutch crypto compliance landscape, depending on the applicable regime and activity.

Typical trigger

A firm provides in-scope crypto services, needs supervisory engagement, or must evidence AML/CFT, sanctions, governance, or operational controls.

02 Authority

Autoriteit Financiële Markten (AFM)

Role

Dutch conduct and market-facing authority relevant to investor protection, disclosures, market behavior, and other conduct-related aspects where applicable.

Typical trigger

A firm markets to clients, provides investor-facing services, or operates in areas where conduct and disclosure obligations become central.

03 Authority

European Securities and Markets Authority (ESMA)

Role

EU-level authority driving supervisory convergence, technical standards, and interpretive guidance under MiCA, especially around market conduct and CASP obligations.

Typical trigger

A firm relies on MiCA authorization logic, follows EU technical standards, or assesses cross-border service models.

04 Authority

European Banking Authority (EBA)

Role

EU-level authority with special relevance for prudential and stablecoin-related areas, including parts of the framework affecting ARTs and EMTs.

Typical trigger

A business issues or services stablecoin-like products or must track prudential and safeguarding expectations under EU rules.

05 Authority

European Commission

Role

Primary EU legislative actor behind MiCA and the TFR framework.

Typical trigger

A firm needs the binding text, delegated acts context, or EU policy direction.

06 Authority

FIU-Nederland

Role

Dutch financial intelligence unit receiving suspicious transaction reports and forming part of the AML/CFT control chain.

Typical trigger

A firm detects unusual or suspicious activity requiring escalation and reporting.

Authorization test

Do you need a Netherlands crypto license in 2026?

The short answer is activity-driven. A firm usually needs authorization analysis where it provides a defined crypto-asset service such as custody and administration, operation of a trading platform, exchange of crypto-assets for funds, exchange of crypto-assets for other crypto-assets, execution of orders, placing, reception and transmission of orders, advice, portfolio management, or transfer services. By contrast, some software-only or non-custodial models may fall outside the licensing perimeter, but only if the facts support that conclusion. The decisive test is not branding. It is whether the firm intermediates, controls client assets or transaction flow, earns fees from a regulated service, or performs a function reserved to a CASP. In 2026, the safest approach is to treat the Netherlands crypto license question as a perimeter exercise tied to actual functionality, not website wording.

Custody and administration of crypto-assets on behalf of clients

Usually requires authorisation

Operation of a crypto-asset trading platform

Usually requires authorisation

Exchange of crypto-assets for funds

Usually requires authorisation

Exchange of crypto-assets for other crypto-assets

Usually requires authorisation

Execution of orders for crypto-assets on behalf of clients

Usually requires authorisation

Reception and transmission of orders for crypto-assets on behalf of clients

Usually requires authorisation

Providing advice on crypto-assets

Usually requires authorisation

Portfolio management of crypto-assets

Usually requires authorisation

Pure software development with no custody, intermediation, or client order handling

Needs case-by-case analysis

Non-custodial interface with no practical control over assets or transfers

Needs case-by-case analysis

Business Model MiCA Relevance Adjacent Regimes Practical Answer
Centralized exchange serving Dutch clients High; likely within multiple CASP service categories. Wwft, TFR, sanctions, consumer-facing conduct controls. Usually requires authorization analysis and a full compliance buildout.
Custodian wallet provider holding client keys High; custody is a core regulated function. Wwft, TFR, sanctions, safeguarding, ICT security. Usually regulated; key-control architecture is a central fact.
OTC broker arranging crypto trades Often high; broking and order handling can fall within CASP services. Wwft, sanctions, transaction monitoring, conduct controls. Do not assume OTC is outside scope; it often is not.
Token issuer Depends on token classification and issuance structure. White paper obligations, ART/EMT rules, possible adjacent payment or securities analysis. Classify the token first; issuer obligations differ from CASP obligations.
Non-custodial wallet software Potentially low, but facts matter. Consumer law, data protection, sanctions risk management at the edges. May fall outside licensing perimeter if there is truly no custody or intermediation.
DeFi front-end with fee capture and routing logic Fact-specific and sensitive. AML perimeter analysis, sanctions, conduct risk, governance review. Requires careful functional analysis; decentralization claims do not end the inquiry.
Business Model
Centralized exchange serving Dutch clients
MiCA Relevance
High; likely within multiple CASP service categories.
Adjacent Regimes
Wwft, TFR, sanctions, consumer-facing conduct controls.
Practical Answer
Usually requires authorization analysis and a full compliance buildout.
Business Model
Custodian wallet provider holding client keys
MiCA Relevance
High; custody is a core regulated function.
Adjacent Regimes
Wwft, TFR, sanctions, safeguarding, ICT security.
Practical Answer
Usually regulated; key-control architecture is a central fact.
Business Model
OTC broker arranging crypto trades
MiCA Relevance
Often high; broking and order handling can fall within CASP services.
Adjacent Regimes
Wwft, sanctions, transaction monitoring, conduct controls.
Practical Answer
Do not assume OTC is outside scope; it often is not.
Business Model
Token issuer
MiCA Relevance
Depends on token classification and issuance structure.
Adjacent Regimes
White paper obligations, ART/EMT rules, possible adjacent payment or securities analysis.
Practical Answer
Classify the token first; issuer obligations differ from CASP obligations.
Business Model
Non-custodial wallet software
MiCA Relevance
Potentially low, but facts matter.
Adjacent Regimes
Consumer law, data protection, sanctions risk management at the edges.
Practical Answer
May fall outside licensing perimeter if there is truly no custody or intermediation.
Business Model
DeFi front-end with fee capture and routing logic
MiCA Relevance
Fact-specific and sensitive.
Adjacent Regimes
AML perimeter analysis, sanctions, conduct risk, governance review.
Practical Answer
Requires careful functional analysis; decentralization claims do not end the inquiry.
Token taxonomy

Token classification matters as much as service classification

A crypto business can be regulated because of what it does, what it issues, or both. Under the Netherlands crypto regulation analysis for 2026, token classification is essential because MiCA distinguishes between asset-referenced tokens (ARTs), e-money tokens (EMTs), and other crypto-assets. That distinction affects white paper obligations, issuer requirements, prudential expectations, and the involvement of different supervisory actors. A common structuring error is to describe a token as a utility token while giving it redemption, stabilization, or payment-like features that push it toward another category. Another overlooked point is that some NFTs may still attract scrutiny if they are issued in a way that makes them economically interchangeable or functionally similar to regulated crypto-assets.

Category Core Feature Typical Trigger
Asset-referenced token (ART) Purports to maintain stable value by referencing another value, right, or combination, other than a single official currency. Stability mechanism or economic design references baskets, assets, or multiple values.
E-money token (EMT) Purports to maintain stable value by referencing a single official currency. Single-currency stabilization or payment-like design.
Other crypto-asset Falls within MiCA but is not an ART or EMT. Transferable digital representation of value or rights using distributed ledger or similar technology without stablecoin classification.
Potentially out-of-scope NFT or unique digital item Claims uniqueness and non-fungibility. Requires factual review; fractionalization, series issuance, or uniform economic rights can undermine the out-of-scope claim.
Category
Asset-referenced token (ART)
Core Feature
Purports to maintain stable value by referencing another value, right, or combination, other than a single official currency.
Typical Trigger
Stability mechanism or economic design references baskets, assets, or multiple values.
Category
E-money token (EMT)
Core Feature
Purports to maintain stable value by referencing a single official currency.
Typical Trigger
Single-currency stabilization or payment-like design.
Category
Other crypto-asset
Core Feature
Falls within MiCA but is not an ART or EMT.
Typical Trigger
Transferable digital representation of value or rights using distributed ledger or similar technology without stablecoin classification.
Category
Potentially out-of-scope NFT or unique digital item
Core Feature
Claims uniqueness and non-fungibility.
Typical Trigger
Requires factual review; fractionalization, series issuance, or uniform economic rights can undermine the out-of-scope claim.
Legacy transition

Transitional arrangements and legacy registrations

The key transition point is that a legacy Dutch AML registration status does not automatically equal a full MiCA authorization status. Firms that historically entered the Dutch market through the Wwft registration route must reassess their position under the CASP framework in 2026. The practical issue is not only legal continuity but operational readiness. A firm that was acceptable under an AML-focused review may still need substantial work on governance, complaints handling, outsourcing, safeguarding, ICT security, market-facing controls, and documentation depth before it is ready for MiCA authorization. Transitional arrangements can exist, but they are not a substitute for a gap analysis. Founders should treat the transition as a repapering and control-upgrade exercise, not as a mere filing update.

Pre-MiCA Dutch regime

Crypto oversight focused more narrowly on AML/CFT registration logic for certain service providers.

Firms often built compliance around onboarding, monitoring, and reporting, with less emphasis on full CASP-style governance architecture.

MiCA phase-in period

EU-wide crypto regulation began replacing fragmented national approaches for in-scope services and issuers.

Service mapping, token classification, and cross-border strategy became central to legal analysis.

2026 operating environment

Firms must reconcile legacy Dutch status with current MiCA authorization expectations and TFR operations.

Gap assessments, remediation plans, and revised documentation are usually required.

A historic DNB registration position under the Dutch AML framework should be treated as a separate status from a MiCA CASP authorization. It may be relevant for transition planning, but it should not be assumed to provide the same scope of permission, passporting value, or supervisory outcome.

Application path

How to prepare for authorization: step-by-step roadmap

The licensing path starts with perimeter analysis, not form-filling. In the Netherlands, a strong application is built by first defining the exact services, token types, custody model, target clients, and jurisdictions involved. Only then should the firm design its governance, AML/CFT, Travel Rule, sanctions, safeguarding, outsourcing, and ICT framework. In practice, the application process is iterative. Firms should expect questions, clarifications, and remediation rounds rather than a single-pass approval. The most common reason for delay is not the complexity of the law; it is inconsistency between the business model, policies, and actual operating model.

1
Often 2-4 weeks for a clean initial scoping exercise.

Perimeter and business-model scoping

Identify each service line, the client journey, custody architecture, token types, fee mechanics, and whether the firm acts as principal, agent, intermediary, or software provider.

2
Often 1-3 weeks, depending on complexity and number of edge cases.

Regulatory mapping

Map the model against MiCA, Wwft, TFR, sanctions requirements, and adjacent regimes such as e-money, payments, or securities where relevant.

3
Often 4-10 weeks.

Governance and control framework design

Build board governance, three-lines-style control ownership where appropriate, AML/CFT controls, complaints handling, outsourcing oversight, safeguarding logic, incident management, and ICT security controls.

4
Often 4-8 weeks.

Documentation buildout

Prepare the business plan, ownership chart, UBO disclosures, fit-and-proper files, risk assessment, AML policy, sanctions policy, Travel Rule workflow, outsourcing register, security documentation, and operational manuals.

5
Often 1-2 weeks.

Pre-submission quality review

Test whether the written file matches reality, whether vendors and outsourcing chains are documented, and whether control owners can explain the framework in supervisory dialogue.

6
Regulator review timing varies and depends heavily on completeness and follow-up rounds.

Submission and supervisory Q&A

File the application and respond to requests for clarification, missing evidence, process detail, or remediation commitments.

Cost ranges

Compliance cost ranges for a Netherlands crypto launch

There is no universal price for a Netherlands crypto license project because cost depends on service scope, token complexity, internal readiness, and how much of the control framework already exists. The useful way to budget is by workstream, not by headline number. A custody-heavy or exchange model usually costs more than a pure software model because governance, security, safeguarding, transaction monitoring, and Travel Rule implementation are deeper. The largest hidden cost is remediation after a weak initial build.

Cost Bucket Low Estimate High Estimate What Drives Cost
Perimeter analysis and legal mapping Project-specific Project-specific Cost rises where the model includes hybrid tokens, OTC, staking-related features, or non-custodial claims requiring detailed fact analysis.
Policy and document buildout Project-specific Project-specific A serious file usually includes 10+ document families rather than one AML policy.
AML/KYC and sanctions tooling Vendor-dependent Vendor-dependent Includes onboarding, screening, transaction monitoring, case management, and blockchain analytics.
Travel Rule implementation Vendor-dependent Vendor-dependent Costs depend on interoperability choice, data model, and transaction volume.
Security and custody controls Architecture-dependent Architecture-dependent Key management, segregation, logging, and incident response are major cost drivers.
Post-filing remediation Moderate High Often avoidable if the initial submission is evidence-based and internally consistent.
Cost Bucket
Perimeter analysis and legal mapping
Low Estimate
Project-specific
High Estimate
Project-specific
What Drives Cost
Cost rises where the model includes hybrid tokens, OTC, staking-related features, or non-custodial claims requiring detailed fact analysis.
Cost Bucket
Policy and document buildout
Low Estimate
Project-specific
High Estimate
Project-specific
What Drives Cost
A serious file usually includes 10+ document families rather than one AML policy.
Cost Bucket
AML/KYC and sanctions tooling
Low Estimate
Vendor-dependent
High Estimate
Vendor-dependent
What Drives Cost
Includes onboarding, screening, transaction monitoring, case management, and blockchain analytics.
Cost Bucket
Travel Rule implementation
Low Estimate
Vendor-dependent
High Estimate
Vendor-dependent
What Drives Cost
Costs depend on interoperability choice, data model, and transaction volume.
Cost Bucket
Security and custody controls
Low Estimate
Architecture-dependent
High Estimate
Architecture-dependent
What Drives Cost
Key management, segregation, logging, and incident response are major cost drivers.
Cost Bucket
Post-filing remediation
Low Estimate
Moderate
High Estimate
High
What Drives Cost
Often avoidable if the initial submission is evidence-based and internally consistent.

The common misconception is that the main cost is the application itself. In practice, the main cost is building a defensible operating model with real controls, trained owners, tested workflows, and auditable evidence.

Operational AML

AML, KYC and Travel Rule requirements in the Netherlands

AML/CFT is a daily operating obligation, not a one-time licensing attachment. In the Netherlands, crypto firms must structure compliance around the Dutch Wwft, suspicious transaction reporting to FIU-Nederland, sanctions screening, and the EU Transfer of Funds Regulation for Travel Rule compliance. The practical expectation is risk-based control design. That means customer due diligence at onboarding, ongoing monitoring after onboarding, source-of-funds or source-of-wealth escalation where risk justifies it, wallet and counterparty screening, and case management for unusual activity. A mature control framework also distinguishes between customer risk, product risk, geographic risk, delivery channel risk, and transaction-pattern risk. One operational nuance often missed by founders is that Travel Rule compliance is partly a data-governance problem: the firm must capture, validate, transmit, reconcile, and retain originator and beneficiary information in a way that is consistent across counterparties. Standards such as IVMS101 matter because they improve interoperability between CASPs. Another nuance is that unhosted-wallet scenarios do not remove AML obligations; they usually increase the need for risk-based controls and evidence of how the firm assesses ownership, exposure, and sanctions risk.

Control Stack

Operational Controls That Must Exist Before Launch

Customer due diligence calibrated to customer type, geography, and service risk.
UBO identification and ownership transparency checks.
PEP, sanctions, and adverse-media screening at onboarding and on an ongoing basis.
Transaction monitoring combining fiat and on-chain signals.
Suspicious transaction escalation and reporting to FIU-Nederland.
Travel Rule data collection, validation, transmission, and exception handling.
Wallet screening and blockchain analytics for exposure to illicit typologies.
Recordkeeping, audit trail retention, and evidence of control performance.
EU access

Cross-border activity: passporting and market access

The Netherlands should be analyzed as part of the EU single market. Under MiCA, an authorized CASP may be able to passport services across the EU, which is one of the main strategic reasons firms seek authorization in an EU Member State rather than operating through fragmented local setups. That said, passporting is not a free pass. The firm still needs a valid authorization scope, functioning controls, compliant marketing, and operational readiness for cross-border onboarding, sanctions screening, complaints handling, and Travel Rule data exchange. Conversely, a non-EU firm targeting Dutch clients cannot assume that a foreign license outside the EU solves the Netherlands question. The key legal issues are solicitation model, client location, service delivery facts, and whether the firm is actively targeting the Dutch market.

Usually Allowed Scenarios

  • A firm authorized in an EU Member State under the relevant MiCA framework seeks to serve clients in the Netherlands through passporting.
  • A Netherlands-authorized CASP expands into other EU Member States within the scope of its authorization and passporting process.
  • A firm provides services only after confirming that its actual activity fits the authorized service categories and operational controls are in place.

Restricted or High-Risk Scenarios

  • A non-EU firm actively markets into the Netherlands without a valid EU legal basis, assuming offshore status is sufficient.
  • A business relies on reverse solicitation language while conducting sustained Dutch-language marketing, local targeting, or direct sales outreach.
  • A firm passports a narrow authorization but operationally performs broader services than the permission covers.

Reverse solicitation is a narrow fact pattern, not a scalable market-entry strategy. If a firm actively targets Dutch or EU clients through campaigns, local funnels, affiliate channels, or tailored outreach, it should assume regulators will look at substance over disclaimers.

Enforcement risk

Enforcement risks for crypto firms in the Netherlands

The main enforcement risk is operating a regulated crypto business without the right authorization or without a functioning control framework. In practice, supervisory attention also focuses on weak AML files, sanctions failures, misleading marketing, poor outsourcing oversight, and a mismatch between the declared model and the real operating model. Crypto firms often underestimate evidence risk: a policy may exist on paper, but if screening logs, escalation records, vendor oversight files, or board minutes are missing, the control may be treated as ineffective.

Providing in-scope exchange or custody services without the required authorization analysis or permission.

High risk

Legal risk: Unauthorized regulated activity, supervisory intervention, and business interruption risk.

Mitigation: Run a documented perimeter assessment before launch and align the service stack with the correct authorization route.

Claiming a non-custodial model while retaining practical control over keys, approvals, or omnibus arrangements.

High risk

Legal risk: Misclassification of the business model and inaccurate regulatory disclosures.

Mitigation: Test actual control points, recovery flows, and operational authority rather than relying on product labels.

Weak customer due diligence, poor UBO verification, or incomplete suspicious transaction escalation.

High risk

Legal risk: AML/CFT breaches under the Wwft and reporting failures.

Mitigation: Implement risk-based CDD, documented escalation, and auditable case management.

Travel Rule process exists in policy only and fails in real transfers.

Medium risk

Legal risk: TFR non-compliance and operational control breakdown.

Mitigation: Use tested workflows, defined exception handling, and interoperable data standards such as IVMS101 where appropriate.

Critical outsourcing to KYC, custody, cloud, or analytics vendors without oversight or fallback planning.

Medium risk

Legal risk: Governance failure and inability to evidence control over critical functions.

Mitigation: Maintain an outsourcing register, due diligence pack, contractual controls, and periodic oversight reviews.

Tax touchpoints

Tax and reporting touchpoints crypto firms should not ignore

Tax is separate from licensing, but it affects launch readiness. A crypto firm operating in the Netherlands should align legal, finance, and operations early because tax treatment, accounting classification, transaction recordkeeping, and client reporting can all influence product design and auditability. The right approach is to treat tax and regulatory reporting as connected data problems.

Topic Why It Matters Responsible Team
Transaction recordkeeping Accurate records support tax analysis, audit trails, AML reviews, and client reporting. Finance / operations / data
Token classification and accounting treatment The economic nature of the token can affect balance-sheet treatment, revenue recognition, and disclosures. Finance / legal
Cross-border client reporting Serving clients across jurisdictions can create reporting complexity beyond the Netherlands alone. Tax / finance / compliance
Governance over reconciliations Reconciliations between on-chain, platform, and fiat records are often essential for both tax and compliance defensibility. Finance / operations / compliance
Topic
Transaction recordkeeping
Why It Matters
Accurate records support tax analysis, audit trails, AML reviews, and client reporting.
Responsible Team
Finance / operations / data
Topic
Token classification and accounting treatment
Why It Matters
The economic nature of the token can affect balance-sheet treatment, revenue recognition, and disclosures.
Responsible Team
Finance / legal
Topic
Cross-border client reporting
Why It Matters
Serving clients across jurisdictions can create reporting complexity beyond the Netherlands alone.
Responsible Team
Tax / finance / compliance
Topic
Governance over reconciliations
Why It Matters
Reconciliations between on-chain, platform, and fiat records are often essential for both tax and compliance defensibility.
Responsible Team
Finance / operations / compliance
Launch checklist

Netherlands crypto launch checklist

Pre-launch priorities

Medium-Priority Workstream

Medium-Priority Workstream

Sequence these after the core perimeter, governance, and launch-control decisions are stable.

Define each service line in functional terms, not marketing terms.

Critical priority Owner: Founders / legal

Classify all tokens involved, including potential ART and EMT exposure.

Critical priority Owner: Legal / product

Map the model against MiCA, Wwft, TFR, and sanctions obligations.

Critical priority Owner: Legal / compliance

Document custody architecture, key control, and safeguarding logic.

High priority Owner: CTO / security / legal

Build AML/CFT, sanctions, and Travel Rule workflows with named control owners.

Critical priority Owner: Compliance / operations

Prepare ownership, UBO, and fit-and-proper documentation.

High priority Owner: Corporate / HR / legal

Review outsourcing, cloud, KYC, custody, and analytics vendor dependencies.

High priority Owner: Operations / risk / legal

Check whether Netherlands authorization, another EU authorization, or passporting is the correct route.

Critical priority Owner: Founders / legal

Align tax, accounting, and reporting data architecture before launch.

Medium priority Owner: Finance / tax
Answers

Frequently Asked Questions

Open the key issues founders, compliance teams and legal leads usually need to confirm before launch.

Is crypto legal in the Netherlands? +

Yes. Crypto is legal in the Netherlands, but legal does not mean unregulated. In 2026, crypto activity is assessed through MiCA, the Dutch Wwft, the EU TFR, sanctions rules, and any adjacent financial-services regimes that fit the facts.

Do I need a license to run a crypto exchange in the Netherlands? +

Usually, yes or at least a formal authorization analysis is required. A crypto exchange serving Dutch clients will often fall within one or more CASP service categories under MiCA, especially where it exchanges crypto for funds or other crypto-assets or handles client orders.

Who regulates crypto in the Netherlands? +

The main Dutch authorities are DNB and AFM, but the framework is heavily shaped by EU law and EU authorities, especially ESMA, EBA, and the European Commission. The exact authority touchpoint depends on the service, token type, and regulatory issue.

What is the difference between DNB registration and MiCA authorization? +

DNB registration under the older Dutch AML-focused framework and MiCA authorization are not the same thing. The former was primarily an AML/CFT entry mechanism for certain crypto firms. The latter is a broader EU authorization model for CASPs with wider conduct, governance, and cross-border implications.

Does the Travel Rule apply to crypto firms in the Netherlands? +

Yes, where the firm is within scope of the EU Transfer of Funds Regulation. In practice, this means relevant crypto transfers must be accompanied by required originator and beneficiary information, supported by operational controls, data validation, and recordkeeping. Standards such as IVMS101 are often relevant operationally.

Can a Netherlands-authorized CASP serve clients across the EU? +

Potentially, yes. One of the main advantages of MiCA is passporting across the EU single market. However, the firm must have the correct authorization scope, follow the passporting process, and maintain compliant operations in each market it serves.

Are non-custodial crypto businesses unregulated in the Netherlands? +

Not automatically. A non-custodial label does not end the analysis. Regulators will look at actual control, intermediation, order routing, fee model, governance, and customer-facing functionality. Some pure software models may fall outside the licensing perimeter, but many edge cases require detailed review.

Need a Practical Readout?

Assess your Netherlands crypto licensing path before launch

The correct route in the Netherlands starts with a perimeter analysis, not assumptions. If your firm is planning exchange, custody, brokerage, token issuance, or EU expansion, the key questions are whether MiCA applies, which authority touchpoints matter, how legacy Dutch AML status maps to current rules, and whether your AML, sanctions, Travel Rule, governance, and outsourcing controls are ready for scrutiny.

Phone +372 56 966 260 Email info@rue.ee Hours Mon-Fri, 9:00-18:00 CET
Confidential - No obligation - Response within 24 hours