EMI License in Europe in 2026

An EMI license in Europe authorizes an electronic money institution to issue electronic money and provide payment services under the EMD2 + PSD2 framework, subject to capital, safeguarding, governance, AML, ICT security, and ongoing supervisory obligations. For a full EMI, the baseline initial capital is €350,000, but the real licensing decision depends on whether the model needs stored value, wallet balances, IBAN accounts, cards, or only payment execution where a PI license may be enough.

An EMI license in Europe authorizes an electronic money institution to issue electronic money and provide payment services under the EMD2 + PSD2 framework, subject to capital, safeguarding, governance, AML, ICT security, and ongoing supervisory obligations. For a full EMI, the baseline initial capital is €350,000, but the real licensing decision depends on whether the model needs stored value, wallet balances, IBAN accounts, cards, or only payment execution where a PI license may be enough.

This page is a legal-practical overview for 2026, not legal, tax, or regulatory advice. Timelines, regulator practice, and fees vary by jurisdiction and by completeness of the application file. UK authorization is separate from EU/EEA authorization after Brexit.

Disclaimer This page is a legal-practical overview for 2026, not legal, tax, or regulatory advice. Timelines, regulator practice, and fees vary by jurisdiction and by completeness of the application file. UK authorization is separate from EU/EEA authorization after Brexit.
Quick facts

EMI Snapshot

Core authorization thresholds, timeline reality and the practical review lens in one block.

At a Glance

Legal basis
Directive 2009/110/EC (EMD2) for electronic money and Directive (EU) 2015/2366 (PSD2) for payment services. In 2026, firms also need to design for DORA and the EU payments reform context around PSD3 / PSR.
Minimum initial capital
€350,000 for an authorized EMI. This is not the same as the operating budget and not the same as safeguarded client funds.
Own funds rule
Own funds must be at least the higher of €350,000 or 2% of average outstanding electronic money. Growth in wallet balances can therefore increase prudential requirements after launch.
What EMI adds over PI
A full EMI may issue electronic money, hold stored value liabilities, redeem e-money at par value, and provide payment services. A PI can provide payment services but cannot issue e-money.
Typical timeline
In practice, many EU EMI projects take 6-18 months end to end, including preparation, regulator questions, remediation, safeguarding setup, and operational readiness. The statutory review clock often matters less than file quality.
Geographic reach
An authorized EU/EEA EMI may expand across the EEA through passporting notifications. This is not automatic market access and does not extend to the UK after Brexit.

Mini Timeline

Month 1-2
Licensing perimeter and jurisdiction screening

The first decision is usually EMI vs PI vs UK EMI vs restricted regime, not simply 'which country is faster'.

Month 2-4
Application file build

Core work includes programme of operations, financial model, AML framework, safeguarding design, governance map, outsourcing register, and ICT controls.

Month 4-12+
Regulator review and Q&A

Multiple rounds of information requests are common. Review usually accelerates only after the file is internally coherent and complete.

Post-approval
Operational launch and passporting

Authorization is not the finish line. Firms still need bank and safeguarding arrangements, scheme access, audit readiness, incident reporting, and ongoing compliance staffing.

Quick Assessment

  • If the model includes wallet balances, stored value, prepaid instruments, or customer funds represented as redeemable e-money, a full EMI route is usually the right starting point.
  • If the model only executes payments without stored value, a payment institution license may be more proportionate.
  • If the target market is UK-only, an EMI UK authorization does not solve EEA market access.
  • If the business plan includes stablecoins qualifying as EMTs under MiCA, EMI status may be necessary but is not by itself sufficient.
Book a jurisdiction screening
Scope of authorization

What an EMI license in Europe allows — and what it does not allow

An electronic money institution license allows a firm to issue electronic money and provide regulated payment services, but it does not turn the firm into a bank. That distinction matters for product design, safeguarding architecture, customer disclosures, and investor expectations. Under EMD2, electronic money is monetary value stored electronically, issued on receipt of funds, and accepted by persons other than the issuer. In business terms, this usually covers wallet balances, prepaid value, certain multicurrency account structures, and settlement value represented as a redeemable liability of the EMI.

An EMI may combine e-money issuance with payment services under PSD2, including transfers, remittance, card-based flows, and in some cases PIS/AIS functionality. What it cannot do is equally important: an EMI cannot accept deposits as a credit institution does, cannot rely on deposit guarantee branding, and cannot use safeguarded client funds as its own balance-sheet funding source. A practical nuance often missed in competitor content is that redemption rights under EMD2 Article 11 shape product wording, fee design, and breakage assumptions for stored-value products.

Can Do

Permitted Activities

  • Issue electronic money against receipt of funds and maintain redeemable stored-value liabilities.
  • Provide payment services listed in PSD2 Annex I, including execution of payment transactions, remittance, card-based payment flows, and payment account operations where the model supports them.
  • Offer wallets, prepaid instruments, multicurrency payment accounts, merchant settlement flows, and IBAN-linked user interfaces, subject to the approved operating model.
  • Redeem electronic money at par value in line with EMD2 and applicable contractual terms.
  • Passport services across the EEA through the home-state notification process.
  • Act as an EMT issuer under MiCA if the firm separately meets the MiCA conditions applicable to electronic money tokens.
Cannot Do

Out-of-Scope Activities

  • Accept deposits or other repayable funds from the public as a credit institution.
  • Use safeguarded client funds for proprietary lending, treasury deployment, or general working-capital financing.
  • Present customer balances as protected by a deposit guarantee scheme.
  • Assume that an EU EMI authorization covers the UK or that a UK EMI authorization covers the EEA.
  • Treat e-money issuance as a substitute for a banking license where the model requires deposit-taking or broader prudential activities.
Decision support

EMI vs PI license vs PSP label vs specialized bank: which route fits the model

The core distinction is simple: a PI license executes payment services, while an EMI license may also issue electronic money. The term PSP license is commercially common but legally imprecise because it can refer to either a PI or an EMI depending on the business perimeter. A specialized bank or credit institution sits in a different prudential category and is designed for deposit-taking and broader balance-sheet activities.

The wrong perimeter creates avoidable cost and delay. Founders often over-specify an EMI when a PI is enough, or under-specify a PI when the product in fact holds stored value. A useful rule is this: if the customer sees a balance that represents value issued by the firm and redeemable by the customer, regulators will usually analyze whether that balance is electronic money rather than a mere payment flow in transit.

Parameter PI EMI Specialized Bank
Core authorization logic Payment services only under PSD2. Electronic money issuance under EMD2 plus payment services under PSD2. Banking authorization for deposit-taking and broader regulated banking activity.
Minimum initial capital €20,000 / €50,000 / €125,000 depending on services. €350,000. Common baseline often starts from €5,000,000 under banking rules, subject to jurisdiction and model.
Stored value / wallet balances Not designed to issue e-money or maintain stored-value liabilities as e-money. Yes. This is the central feature of an EMI electronic money institution. Yes, but under a different prudential and supervisory regime.
Deposit-taking No. No. Yes, subject to banking authorization.
Own funds dynamics Calculated under PSD2 methods depending on business profile. At least the higher of €350,000 or 2% of average outstanding electronic money. CRR / CRD prudential framework.
Best fit Payment execution, remittance, acquiring-like flows, payout orchestration without stored value. Wallets, prepaid products, multicurrency balances, IBAN-linked stored value, merchant settlement held as e-money. Models needing deposit-taking, broader lending, or full banking infrastructure.
Commercial use of term PSP May be described as a PSP. May also be described as a PSP. Usually not described this way in licensing discussions.
Parameter
Core authorization logic
PI
Payment services only under PSD2.
EMI
Electronic money issuance under EMD2 plus payment services under PSD2.
Specialized Bank
Banking authorization for deposit-taking and broader regulated banking activity.
Parameter
Minimum initial capital
PI
€20,000 / €50,000 / €125,000 depending on services.
EMI
€350,000.
Specialized Bank
Common baseline often starts from €5,000,000 under banking rules, subject to jurisdiction and model.
Parameter
Stored value / wallet balances
PI
Not designed to issue e-money or maintain stored-value liabilities as e-money.
EMI
Yes. This is the central feature of an EMI electronic money institution.
Specialized Bank
Yes, but under a different prudential and supervisory regime.
Parameter
Deposit-taking
PI
No.
EMI
No.
Specialized Bank
Yes, subject to banking authorization.
Parameter
Own funds dynamics
PI
Calculated under PSD2 methods depending on business profile.
EMI
At least the higher of €350,000 or 2% of average outstanding electronic money.
Specialized Bank
CRR / CRD prudential framework.
Parameter
Best fit
PI
Payment execution, remittance, acquiring-like flows, payout orchestration without stored value.
EMI
Wallets, prepaid products, multicurrency balances, IBAN-linked stored value, merchant settlement held as e-money.
Specialized Bank
Models needing deposit-taking, broader lending, or full banking infrastructure.
Parameter
Commercial use of term PSP
PI
May be described as a PSP.
EMI
May also be described as a PSP.
Specialized Bank
Usually not described this way in licensing discussions.
Primary sources

Regulatory framework for an EMI license in Europe in 2026

An EU electronic money license is still anchored in EMD2 and PSD2 in 2026, but no serious licensing project should ignore the wider compliance stack. Regulators review the file through the lens of authorization rules, internal governance, AML, safeguarding, ICT resilience, outsourcing, and conduct obligations. The result is that a legally correct application can still fail operationally if the control framework is thin.

A second nuance is transition risk. The market is operating in the context of the EU payments reform package around PSD3 and the proposed Payment Services Regulation, while DORA already applies to financial entities from 17 January 2025. That means a 2026 EMI file should not be drafted as if only legacy PSD2 wording matters. It should show future-proof governance, incident handling, outsourcing discipline, and customer authentication architecture.

Primary-source review should include EUR-Lex, EBA materials, national regulator guidance such as the Bank of Lithuania, Central Bank of Cyprus, and FCA for UK comparisons. Regulator practice often matters as much as black-letter law.

Framework Why It Matters Operational Impact
Directive 2009/110/EC (EMD2) Defines electronic money, sets the authorization concept for EMIs, and establishes key prudential and redemption rules. Drives product classification, redemption mechanics, own funds logic tied to average outstanding e-money, and customer disclosures.
Directive (EU) 2015/2366 (PSD2) Sets the payment services framework and service categories used by EMIs when they provide payment services. Shapes payment flows, PIS/AIS perimeter analysis, conduct rules, incident reporting, and security expectations.
RTS on SCA and CSC Operationalizes strong customer authentication and secure communication requirements for relevant payment scenarios. Affects API design, authentication journeys, exemptions logic, fraud controls, and third-party access architecture.
Regulation (EU) 2022/2554 (DORA) Creates a harmonized ICT risk and operational resilience framework for financial entities. Requires ICT governance, incident classification, testing, third-party ICT oversight, and documented resilience controls.
AMLD framework + national AML laws Defines AML/CTF obligations, risk-based controls, customer due diligence, and suspicious activity escalation. Directly affects onboarding, transaction monitoring, sanctions screening, MLRO function design, and correspondent / safeguarding bank acceptance.
MiCA Regulation (EU) 2023/1114 Relevant where the EMI intends to issue an electronic money token (EMT) or interact with crypto-asset business lines. EMI status may be a prerequisite for EMT issuance, but the firm still needs MiCA-specific compliance, governance, reserve, and disclosure arrangements.
GDPR Payment and KYC operations process large volumes of personal data and often special-risk datasets. Impacts retention schedules, access control, processor contracts, cross-border transfers, and breach response.
Framework
Directive 2009/110/EC (EMD2)
Why It Matters
Defines electronic money, sets the authorization concept for EMIs, and establishes key prudential and redemption rules.
Operational Impact
Drives product classification, redemption mechanics, own funds logic tied to average outstanding e-money, and customer disclosures.
Framework
Directive (EU) 2015/2366 (PSD2)
Why It Matters
Sets the payment services framework and service categories used by EMIs when they provide payment services.
Operational Impact
Shapes payment flows, PIS/AIS perimeter analysis, conduct rules, incident reporting, and security expectations.
Framework
RTS on SCA and CSC
Why It Matters
Operationalizes strong customer authentication and secure communication requirements for relevant payment scenarios.
Operational Impact
Affects API design, authentication journeys, exemptions logic, fraud controls, and third-party access architecture.
Framework
Regulation (EU) 2022/2554 (DORA)
Why It Matters
Creates a harmonized ICT risk and operational resilience framework for financial entities.
Operational Impact
Requires ICT governance, incident classification, testing, third-party ICT oversight, and documented resilience controls.
Framework
AMLD framework + national AML laws
Why It Matters
Defines AML/CTF obligations, risk-based controls, customer due diligence, and suspicious activity escalation.
Operational Impact
Directly affects onboarding, transaction monitoring, sanctions screening, MLRO function design, and correspondent / safeguarding bank acceptance.
Framework
MiCA Regulation (EU) 2023/1114
Why It Matters
Relevant where the EMI intends to issue an electronic money token (EMT) or interact with crypto-asset business lines.
Operational Impact
EMI status may be a prerequisite for EMT issuance, but the firm still needs MiCA-specific compliance, governance, reserve, and disclosure arrangements.
Framework
GDPR
Why It Matters
Payment and KYC operations process large volumes of personal data and often special-risk datasets.
Operational Impact
Impacts retention schedules, access control, processor contracts, cross-border transfers, and breach response.
Authorization readiness

EMI license requirements in 2026: capital, governance, substance, AML, and operating readiness

An EMI application is approved on the basis of a credible operating institution, not a paper shell. Regulators test whether the applicant has adequate capital, fit-and-proper owners and managers, a workable safeguarding model, realistic financial projections, defensible outsourcing arrangements, and an ICT environment that can survive incidents. A frequent failure point is mismatch: the business plan promises a lean launch, while the control framework assumes enterprise-grade scale without the staff or vendors to support it.

Substance is especially important. EU supervisors increasingly expect real decision-making capacity, documented lines of responsibility, and local presence proportionate to the risk profile. The exact staffing model varies by jurisdiction and business model, but the common supervisory expectation is that key functions are not merely nominal. A useful practical test is whether the firm could answer a regulator’s question on safeguarding reconciliation, fraud spikes, or sanctions alerts without outsourcing the explanation to a consultant.

A recurring 2026 issue is that safeguarding banks and card / payment infrastructure partners now perform their own compliance diligence. A file that may be technically licensable can still be commercially blocked if AML maturity, fraud controls, or governance depth are weak.

Area Regulatory Expectation Evidence Pack
Initial capital and prudential base The applicant must evidence at least €350,000 initial capital and show how own funds will remain compliant as e-money liabilities grow. Bank confirmation, capital structure documents, opening balance sheet, prudential model, and sensitivity analysis based on projected average outstanding e-money.
Business model and programme of operations The model must clearly describe products, customer types, geographies, payment flows, outsourcing, and whether balances qualify as e-money. Programme of operations, customer journey maps, funds-flow diagrams, product terms, and perimeter analysis.
Governance and effective management Managers, directors, and qualifying shareholders must be fit and proper, with clear allocation of responsibilities and credible oversight. CVs, criminal record extracts where required, questionnaires, governance map, committee structure, and conflict-of-interest controls.
Local substance The firm should show real operational presence proportionate to its risk, not only a registered office and outsourced vendors. Office arrangements, local staff plan, decision-making matrix, employment or service contracts, and evidence of local control over regulated activities.
AML / CTF framework The applicant must present a risk-based AML system covering onboarding, monitoring, sanctions, escalation, and reporting. Business-wide risk assessment, AML policy suite, KYC/KYB standards, sanctions procedures, MLRO role description, and alert-handling workflow.
Safeguarding model Client funds must be segregated or otherwise safeguarded in line with law and regulator expectations, with reconciliation discipline and insolvency protection logic. Safeguarding policy, funds segregation diagrams, reconciliation procedure, draft safeguarding account arrangements, and insolvency legal analysis where relevant.
ICT, security, and outsourcing The firm must show secure architecture, access control, logging, incident response, vendor governance, and resilience planning. ICT risk assessment, system architecture, outsourcing register, security policies, BCP/DR documents, incident workflow, and DORA-aligned governance records.
Financial forecasts Three-year projections must be internally consistent and linked to the business model, not generic hockey-stick growth assumptions. P&L, balance sheet, cash flow forecast, capital adequacy model, stress cases, and assumptions paper.
Area
Initial capital and prudential base
Regulatory Expectation
The applicant must evidence at least €350,000 initial capital and show how own funds will remain compliant as e-money liabilities grow.
Evidence Pack
Bank confirmation, capital structure documents, opening balance sheet, prudential model, and sensitivity analysis based on projected average outstanding e-money.
Area
Business model and programme of operations
Regulatory Expectation
The model must clearly describe products, customer types, geographies, payment flows, outsourcing, and whether balances qualify as e-money.
Evidence Pack
Programme of operations, customer journey maps, funds-flow diagrams, product terms, and perimeter analysis.
Area
Governance and effective management
Regulatory Expectation
Managers, directors, and qualifying shareholders must be fit and proper, with clear allocation of responsibilities and credible oversight.
Evidence Pack
CVs, criminal record extracts where required, questionnaires, governance map, committee structure, and conflict-of-interest controls.
Area
Local substance
Regulatory Expectation
The firm should show real operational presence proportionate to its risk, not only a registered office and outsourced vendors.
Evidence Pack
Office arrangements, local staff plan, decision-making matrix, employment or service contracts, and evidence of local control over regulated activities.
Area
AML / CTF framework
Regulatory Expectation
The applicant must present a risk-based AML system covering onboarding, monitoring, sanctions, escalation, and reporting.
Evidence Pack
Business-wide risk assessment, AML policy suite, KYC/KYB standards, sanctions procedures, MLRO role description, and alert-handling workflow.
Area
Safeguarding model
Regulatory Expectation
Client funds must be segregated or otherwise safeguarded in line with law and regulator expectations, with reconciliation discipline and insolvency protection logic.
Evidence Pack
Safeguarding policy, funds segregation diagrams, reconciliation procedure, draft safeguarding account arrangements, and insolvency legal analysis where relevant.
Area
ICT, security, and outsourcing
Regulatory Expectation
The firm must show secure architecture, access control, logging, incident response, vendor governance, and resilience planning.
Evidence Pack
ICT risk assessment, system architecture, outsourcing register, security policies, BCP/DR documents, incident workflow, and DORA-aligned governance records.
Area
Financial forecasts
Regulatory Expectation
Three-year projections must be internally consistent and linked to the business model, not generic hockey-stick growth assumptions.
Evidence Pack
P&L, balance sheet, cash flow forecast, capital adequacy model, stress cases, and assumptions paper.
Application file

Core documents for an electronic money institution license application

The application pack for an EMI license in Europe is document-heavy because supervisors assess both legal perimeter and operational readiness. The strongest files are internally cross-referenced: the financial model matches the programme of operations, the AML risk assessment matches customer types, and the safeguarding policy matches the actual money flows. Incomplete or inconsistent packs are the most common cause of avoidable delay.

Document Purpose Owner
Programme of operations Defines services, product logic, customer segments, jurisdictions, channels, and operational perimeter. Founders + legal / regulatory lead
Business plan with 3-year financial projections Shows commercial viability, prudential sustainability, and capital planning. Finance lead
AML / CTF policy suite and business-wide risk assessment Demonstrates risk-based onboarding, monitoring, sanctions, and escalation controls. MLRO / compliance
Safeguarding policy and funds-flow mapping Explains how client funds are protected, segregated, reconciled, and redeemed. Operations + finance + legal
Governance framework Shows management structure, allocation of responsibilities, internal controls, and fit-and-proper arrangements. Board / corporate secretary / legal
ICT architecture and security documentation Supports DORA readiness, access control, incident handling, authentication, and vendor governance. CTO / security lead
Outsourcing register and vendor agreements Identifies critical providers, concentration risk, oversight mechanisms, and exit planning. Operations + legal + procurement
Ownership and source-of-funds file Supports review of UBOs, qualifying holdings, and funding legitimacy. Shareholders + legal
Policies on complaints, fraud, incidents, and data protection Shows conduct readiness and operational control maturity. Compliance + operations + DPO
Document
Programme of operations
Purpose
Defines services, product logic, customer segments, jurisdictions, channels, and operational perimeter.
Owner
Founders + legal / regulatory lead
Document
Business plan with 3-year financial projections
Purpose
Shows commercial viability, prudential sustainability, and capital planning.
Owner
Finance lead
Document
AML / CTF policy suite and business-wide risk assessment
Purpose
Demonstrates risk-based onboarding, monitoring, sanctions, and escalation controls.
Owner
MLRO / compliance
Document
Safeguarding policy and funds-flow mapping
Purpose
Explains how client funds are protected, segregated, reconciled, and redeemed.
Owner
Operations + finance + legal
Document
Governance framework
Purpose
Shows management structure, allocation of responsibilities, internal controls, and fit-and-proper arrangements.
Owner
Board / corporate secretary / legal
Document
ICT architecture and security documentation
Purpose
Supports DORA readiness, access control, incident handling, authentication, and vendor governance.
Owner
CTO / security lead
Document
Outsourcing register and vendor agreements
Purpose
Identifies critical providers, concentration risk, oversight mechanisms, and exit planning.
Owner
Operations + legal + procurement
Document
Ownership and source-of-funds file
Purpose
Supports review of UBOs, qualifying holdings, and funding legitimacy.
Owner
Shareholders + legal
Document
Policies on complaints, fraud, incidents, and data protection
Purpose
Shows conduct readiness and operational control maturity.
Owner
Compliance + operations + DPO
Step-by-step

How to obtain an EMI license in Europe step by step

The practical route to an EMI license starts with perimeter analysis and ends only when the institution is operationally ready to launch. In most cases, the total journey is measured in months, not weeks, because the regulator reviews not just legal forms but the real institution behind them. The statutory review period can be misleading if the file is not complete; in practice, the clock matters less than the quality of the submission and the speed of remediation.

1
2-4 weeks

Step 1 — Define the licensing perimeter and choose the jurisdiction

Decide whether the model requires a full EMI, a PI, a restricted / small regime where available, or a separate UK authorization. Compare Lithuania, Cyprus, the UK, and other jurisdictions by product fit, regulator style, local substance, banking access, SEPA strategy, and expansion plan.

2
2-6 weeks

Step 2 — Incorporate the company and structure ownership

Set up the legal entity, document UBOs and qualifying holdings, and prepare source-of-funds evidence. Whether the route is greenfield or acquisition, ownership transparency is non-negotiable.

3
6-12+ weeks

Step 3 — Build the application file

Prepare the programme of operations, financial model, AML framework, safeguarding design, governance map, outsourcing register, ICT controls, and supporting forms for managers and shareholders. This is usually the most work-intensive stage.

4
3-9+ months after a complete file, depending on jurisdiction

Step 4 — Submit and manage regulator Q&A

After filing, expect completeness checks, information requests, clarifications, and sometimes interviews. The most efficient responses are evidence-based and consistent across legal, finance, AML, and technology workstreams.

5
1-3 months

Step 5 — Final authorization and operational launch

Authorization should be followed by final bank and safeguarding setup, scheme or sponsor arrangements, internal training, audit planning, incident reporting readiness, and where relevant passporting notifications into other EEA states.

Budget planning

How much an EMI license in Europe costs in 2026

The minimum legal capital for a full EMI is €350,000, but the real first-year budget is materially higher. Founders often underestimate the difference between locked-in prudential capital, spendable operating cash, and safeguarded client funds that cannot be used as working capital. A realistic budget must include legal and regulatory preparation, local substance, compliance staffing, technology, audit, insurance where relevant, and the cost of reaching operational readiness after authorization.

Cost also depends on the model. A simple wallet with outsourced processing is cheaper than a multicurrency account product with card issuing, open banking APIs, fraud tooling, and multiple vendor layers. Another often-missed cost driver is remediation: weak files are not merely delayed; they become more expensive because policies, forecasts, and governance documents must be rewritten under time pressure.

Cost Bucket Low Estimate High Estimate What Drives Cost
Initial capital €350,000 Higher if own funds planning requires more headroom This is the prudential baseline for a full EMI, not the total project budget.
Legal and regulatory preparation €30,000 €80,000+ Varies by jurisdiction, complexity, documentation depth, and whether the file includes cross-border, card, or crypto-adjacent elements.
Regulator and filing fees Jurisdiction-specific Jurisdiction-specific Official fees should always be verified with the relevant authority before filing.
Local substance and staffing €120,000 €300,000+ Includes management, compliance, MLRO support, finance, operations, and local presence proportionate to the model.
ICT, security, and vendor stack €50,000 €250,000+ Can include core ledger, KYC/KYB, sanctions screening, transaction monitoring, fraud tools, API security, logging, and resilience controls.
Audit, legal maintenance, and recurring compliance €20,000 €100,000+ Annual audit, policy maintenance, training, board support, and external legal / regulatory advice.
First-year total operating budget excluding growth capital €500,000 €750,000+ A common practical range for many projects, but complex models can exceed it materially.
Cost Bucket
Initial capital
Low Estimate
€350,000
High Estimate
Higher if own funds planning requires more headroom
What Drives Cost
This is the prudential baseline for a full EMI, not the total project budget.
Cost Bucket
Legal and regulatory preparation
Low Estimate
€30,000
High Estimate
€80,000+
What Drives Cost
Varies by jurisdiction, complexity, documentation depth, and whether the file includes cross-border, card, or crypto-adjacent elements.
Cost Bucket
Regulator and filing fees
Low Estimate
Jurisdiction-specific
High Estimate
Jurisdiction-specific
What Drives Cost
Official fees should always be verified with the relevant authority before filing.
Cost Bucket
Local substance and staffing
Low Estimate
€120,000
High Estimate
€300,000+
What Drives Cost
Includes management, compliance, MLRO support, finance, operations, and local presence proportionate to the model.
Cost Bucket
ICT, security, and vendor stack
Low Estimate
€50,000
High Estimate
€250,000+
What Drives Cost
Can include core ledger, KYC/KYB, sanctions screening, transaction monitoring, fraud tools, API security, logging, and resilience controls.
Cost Bucket
Audit, legal maintenance, and recurring compliance
Low Estimate
€20,000
High Estimate
€100,000+
What Drives Cost
Annual audit, policy maintenance, training, board support, and external legal / regulatory advice.
Cost Bucket
First-year total operating budget excluding growth capital
Low Estimate
€500,000
High Estimate
€750,000+
What Drives Cost
A common practical range for many projects, but complex models can exceed it materially.
The phrase 'cheap EMI license' is usually misleading. Low quotes often exclude local substance, compliance staffing, safeguarding setup, vendor due diligence, audit, remediation, and post-authorization readiness. The cheapest file is often the most expensive route to an actual launch.
Client funds protection

Safeguarding requirements: how client funds are protected in an EMI structure

Safeguarding is the legal and operational mechanism that protects customer funds received in exchange for electronic money or for payment services. It is not the same as regulatory capital. Capital protects the institution’s solvency profile; safeguarding protects customer money from being mixed with the firm’s own assets and supports insolvency ring-fencing. That distinction is central to both licensing and ongoing supervision.

In practice, supervisors expect a safeguarding model that works daily, not only conceptually. That means clear account architecture, reconciliation logic, timing controls, escalation rules for breaks, and governance over the safeguarding bank relationship. A technical nuance often overlooked is that safeguarding failures can arise from ledger design as much as from bank account misuse: if the internal ledger cannot identify safeguarded liabilities accurately and promptly, the policy is not operationally credible.

Control Stack

Operational Controls That Must Exist Before Launch

Segregate relevant client funds from the firm's own money using a legally and operationally workable structure.
Define the trigger point for safeguarding and document timing from receipt of funds to segregation.
Run regular reconciliations between bank balances, internal ledgers, and customer liabilities; daily reconciliation is common market practice.
Maintain documented break management, escalation thresholds, and remediation timelines.
Ensure redemption mechanics are consistent with product terms and ledger treatment.
Document insolvency treatment and the legal basis for ring-fencing in the chosen jurisdiction.
Control access rights so operations cannot move safeguarded funds outside approved workflows without traceability.
Review safeguarding bank concentration risk and contingency options.
Security and resilience

ICT, PSD2 security, DORA, and outsourcing controls for a 2026 EMI

A 2026 EMI application must show that the institution can operate securely under both payments regulation and financial-sector resilience standards. For firms handling online payments, APIs, or account access, this usually means a documented approach to SCA, secure communication, fraud controls, logging, incident response, and change management. For firms with cards, PCI DSS and 3-D Secure 2 become part of the practical control environment even where they are not the licensing statute itself.

Under DORA, ICT governance is no longer a side annex. Regulators increasingly expect a mapped inventory of critical systems and providers, clear ownership of incidents, resilience testing, and evidence that outsourcing does not hollow out the institution’s control function. A useful rule is that any vendor doing something the EMI cannot explain to its regulator is already a governance problem.

A frequent blind spot is dependency mapping. Regulators increasingly expect firms to identify not just direct vendors but also critical sub-outsourcing chains, especially for cloud hosting, KYC utilities, ledger infrastructure, and card processing.

Area Control Owner
API and authentication security Use a documented authentication and authorization architecture appropriate to the service model; where relevant, align with SCA, secure communication, OAuth 2.0, OpenID Connect, and certificate-based controls such as mTLS. CTO / security lead
Payments messaging and rails Design payment operations around applicable standards such as IBAN, BIC, and ISO 20022 for SEPA-related flows. Payments operations / engineering
Logging and monitoring Maintain tamper-resistant audit logs, privileged access monitoring, alerting, and evidence retention proportionate to financial-sector expectations. Security operations
Incident management Define incident classification, escalation, regulator notification paths, root-cause analysis, and lessons-learned governance under DORA-style discipline. CISO / operations / compliance
Business continuity and disaster recovery Document BCP/DR, backup integrity, recovery priorities, and target recovery assumptions such as RTO / RPO where relevant to the service model. CTO / operations
Outsourcing governance Maintain an outsourcing register, classify critical providers, preserve audit rights, monitor concentration risk, and document exit plans. Operations / legal / board
Card environment Where cards are involved, align the operating model with PCI DSS, tokenization logic, fraud controls, and 3DS2 journey design. Card product lead / security
Area
API and authentication security
Control
Use a documented authentication and authorization architecture appropriate to the service model; where relevant, align with SCA, secure communication, OAuth 2.0, OpenID Connect, and certificate-based controls such as mTLS.
Owner
CTO / security lead
Area
Payments messaging and rails
Control
Design payment operations around applicable standards such as IBAN, BIC, and ISO 20022 for SEPA-related flows.
Owner
Payments operations / engineering
Area
Logging and monitoring
Control
Maintain tamper-resistant audit logs, privileged access monitoring, alerting, and evidence retention proportionate to financial-sector expectations.
Owner
Security operations
Area
Incident management
Control
Define incident classification, escalation, regulator notification paths, root-cause analysis, and lessons-learned governance under DORA-style discipline.
Owner
CISO / operations / compliance
Area
Business continuity and disaster recovery
Control
Document BCP/DR, backup integrity, recovery priorities, and target recovery assumptions such as RTO / RPO where relevant to the service model.
Owner
CTO / operations
Area
Outsourcing governance
Control
Maintain an outsourcing register, classify critical providers, preserve audit rights, monitor concentration risk, and document exit plans.
Owner
Operations / legal / board
Area
Card environment
Control
Where cards are involved, align the operating model with PCI DSS, tokenization logic, fraud controls, and 3DS2 journey design.
Owner
Card product lead / security
EEA scaling

Passporting, SEPA access, and EEA expansion after authorization

An EU/EEA EMI may scale cross-border through the passporting framework, but passporting is a notification mechanism, not a magic market-entry switch. The home-state regulator remains the primary supervisor, while host-state conduct rules can still matter depending on the activity, local consumer interface, and whether the firm uses a branch, agents, or distributors. The practical question is not only ‘can we passport?’ but ‘what operating model will survive host-state scrutiny and partner due diligence?’

Infrastructure access matters just as much as licensing. A firm may hold an EMI authorization and still depend on sponsor or partner arrangements for IBAN issuance, card settlement, or payment rails. In Lithuania, CENTROLINK is often part of the market discussion, while across Europe firms also evaluate indirect versus direct access to SEPA, SEPA Instant, and SWIFT-connected services. The strategic mistake is to treat passporting and payments infrastructure as the same thing; they are related, but not interchangeable.

For jurisdiction-specific paths, see related pages on EMI license in Lithuania, EMI license in Cyprus, and EMI license in the UK.

Topic Details Risk Note
Freedom to provide services vs right of establishment Passporting can support cross-border services without a branch or can support establishment through a branch or other notified structure, depending on the model. The compliance burden increases when local presence, agents, or customer-facing operations deepen in host states.
Branch, agent, and distributor distinctions The legal role used for expansion affects oversight, reporting, and operational accountability. The correct structure depends on the service mix and local execution model. Using the wrong distribution model can create unauthorized activity risk or remediation demands.
SEPA and payment rails EEA scaling often depends on access to SEPA Credit Transfer, SEPA Instant, IBAN capabilities, sponsor-bank arrangements, or infrastructure such as CENTROLINK in Lithuania. Licensing does not guarantee infrastructure access; banks and scheme partners apply their own risk filters.
UK boundary after Brexit An EU EMI passport does not extend into the UK. A separate FCA authorization is generally needed for UK e-money or payment services activity. Cross-border marketing into the UK without the correct perimeter analysis can create regulatory exposure.
MiCA-related expansion If the EMI also plans EMT issuance, cross-border strategy must account for MiCA disclosures, reserve management, governance, and supervisory expectations beyond the base EMI license. EMI authorization alone does not complete the crypto-regulatory perimeter.
Topic
Freedom to provide services vs right of establishment
Details
Passporting can support cross-border services without a branch or can support establishment through a branch or other notified structure, depending on the model.
Risk Note
The compliance burden increases when local presence, agents, or customer-facing operations deepen in host states.
Topic
Branch, agent, and distributor distinctions
Details
The legal role used for expansion affects oversight, reporting, and operational accountability. The correct structure depends on the service mix and local execution model.
Risk Note
Using the wrong distribution model can create unauthorized activity risk or remediation demands.
Topic
SEPA and payment rails
Details
EEA scaling often depends on access to SEPA Credit Transfer, SEPA Instant, IBAN capabilities, sponsor-bank arrangements, or infrastructure such as CENTROLINK in Lithuania.
Risk Note
Licensing does not guarantee infrastructure access; banks and scheme partners apply their own risk filters.
Topic
UK boundary after Brexit
Details
An EU EMI passport does not extend into the UK. A separate FCA authorization is generally needed for UK e-money or payment services activity.
Risk Note
Cross-border marketing into the UK without the correct perimeter analysis can create regulatory exposure.
Topic
MiCA-related expansion
Details
If the EMI also plans EMT issuance, cross-border strategy must account for MiCA disclosures, reserve management, governance, and supervisory expectations beyond the base EMI license.
Risk Note
EMI authorization alone does not complete the crypto-regulatory perimeter.
Why files fail

Common reasons EMI applications are delayed or refused

Most EMI files fail because the institution is under-designed, not because the law is unclear. Supervisors usually react negatively to incomplete perimeter analysis, weak safeguarding mechanics, thin management substance, and financial projections that do not match the real launch plan. A second pattern is over-outsourcing: the firm delegates core regulated functions to vendors but cannot evidence oversight, fallback, or internal competence.

The highest-risk files are those that look polished at policy level but collapse under operational questioning. If the applicant cannot explain how a failed top-up is reconciled, how a sanctions false positive is cleared, or how an incident is escalated under DORA-style governance, the regulator will usually conclude that the control environment is not mature enough.

Unclear product perimeter

High risk

Legal risk: The file does not clearly distinguish e-money issuance from payment funds in transit, or mixes PI and EMI logic inconsistently.

Mitigation: Prepare a transaction-by-transaction perimeter memo with customer journey maps and ledger treatment.

Weak safeguarding design

High risk

Legal risk: Policies mention segregation but do not show timing, reconciliation, break management, or insolvency logic.

Mitigation: Document the full safeguarding workflow, account structure, reconciliation cadence, and escalation process.

Insufficient governance substance

High risk

Legal risk: Managers appear nominal, responsibilities are unclear, or local decision-making is not credible.

Mitigation: Strengthen management appointments, allocate responsibilities formally, and evidence real operational control.

AML framework not aligned to business model

High risk

Legal risk: The AML risk assessment is generic and does not reflect customer types, geographies, channels, or transaction patterns.

Mitigation: Rewrite the AML stack around actual risk drivers, onboarding flows, and alert-handling logic.

Financial model is unrealistic

Medium risk

Legal risk: Projected growth, revenue, fraud losses, staffing, or own-funds planning are not credible.

Mitigation: Use conservative assumptions, stress scenarios, and prudential headroom linked to average outstanding e-money.

Outsourcing concentration and ICT weakness

Medium risk

Legal risk: Critical functions are outsourced without adequate oversight, audit rights, resilience testing, or exit planning.

Mitigation: Create a critical outsourcing framework, dependency map, and DORA-aligned governance pack.

Acquisition vs greenfield

EMI license for sale, PSP license for sale, UK EMI license for sale: acquisition vs greenfield build

In legal terms, there is no standalone commodity called an ‘EMI license for sale‘. What the market usually means is the acquisition of a company that already holds an EMI or PI authorization. That transaction is regulated. The buyer typically needs approval for a change in control or qualifying holding, and the regulator may reassess ownership, governance, source of funds, and the post-acquisition operating model. The same principle applies to searches such as lithuania emi license for sale, psp license for sale, or uk emi license for sale.

An acquisition can shorten market entry, but it also imports legacy risk. Hidden safeguarding deficits, AML remediation backlogs, unresolved complaints, audit qualifications, or vendor lock-in can make a licensed target more dangerous than a greenfield application. The correct comparison is therefore not speed alone, but speed adjusted for remediation risk and regulator approval risk.

Option Advantages Limitations Best For
Greenfield EMI application Clean perimeter design, fresh governance build, tailored safeguarding model, and no inherited compliance debt. Usually better for founders with a specific product architecture and patient launch plan. Longer path to authorization, heavier documentation burden, and no immediate operating history. New fintechs building wallets, stored-value products, or multicurrency payment accounts from first principles.
Acquisition of an existing licensed EMI Potentially faster route to market, existing authorization perimeter, and sometimes existing bank, scheme, or operational infrastructure. Requires change-of-control approval, deep due diligence, and often post-deal remediation. Legacy AML, safeguarding, complaints, or outsourcing issues can materially reduce deal value. Buyers with strong M&A discipline, compliance integration capacity, and a willingness to remediate inherited control weaknesses.
PI first, EMI later Lower initial threshold where the model does not yet require stored value. Can validate product-market fit before upgrading perimeter. If the product later shifts to wallet balances or redeemable stored value, a second licensing project may be needed. Payment execution businesses, remittance models, and payout platforms not yet issuing e-money.
Option
Greenfield EMI application
Advantages
Clean perimeter design, fresh governance build, tailored safeguarding model, and no inherited compliance debt. Usually better for founders with a specific product architecture and patient launch plan.
Limitations
Longer path to authorization, heavier documentation burden, and no immediate operating history.
Best For
New fintechs building wallets, stored-value products, or multicurrency payment accounts from first principles.
Option
Acquisition of an existing licensed EMI
Advantages
Potentially faster route to market, existing authorization perimeter, and sometimes existing bank, scheme, or operational infrastructure.
Limitations
Requires change-of-control approval, deep due diligence, and often post-deal remediation. Legacy AML, safeguarding, complaints, or outsourcing issues can materially reduce deal value.
Best For
Buyers with strong M&A discipline, compliance integration capacity, and a willingness to remediate inherited control weaknesses.
Option
PI first, EMI later
Advantages
Lower initial threshold where the model does not yet require stored value. Can validate product-market fit before upgrading perimeter.
Limitations
If the product later shifts to wallet balances or redeemable stored value, a second licensing project may be needed.
Best For
Payment execution businesses, remittance models, and payout platforms not yet issuing e-money.
FAQ

FAQ about EMI license in Europe, Lithuania, Cyprus, and the UK

These answers address the most common legal and strategic questions behind searches such as emi license europe, electronic money license, emi license lithuania, emi license cyprus, emi uk, and emi license for sale.

What is an EMI license in Europe? +

An EMI license is an authorization for an electronic money institution to issue electronic money and provide payment services in line with EMD2 and PSD2. It is typically used for wallet balances, prepaid value, multicurrency payment accounts, and similar stored-value fintech models.

How much capital is required for a full EMI license? +

The baseline initial capital for an authorized EMI is €350,000. Separately, own funds must remain at least the higher of €350,000 or 2% of average outstanding electronic money.

How long does it take to get an EMI license in Europe? +

A practical end-to-end range is often 6-18 months, depending on the jurisdiction, the completeness of the file, the complexity of the model, and how quickly the applicant answers regulator questions.

What is the difference between an EMI and a PI license? +

A payment institution license allows payment services but not e-money issuance. An electronic money institution license adds the ability to issue electronic money and maintain stored-value liabilities.

Can an EMI accept deposits like a bank? +

No. An EMI cannot accept deposits as a credit institution does. Customer funds must be safeguarded, and e-money must generally be redeemable at par value under the legal framework.

Is passporting automatic once the EMI is licensed? +

No. EEA expansion uses a notification-based passporting process through the home-state regulator. It is simpler than relicensing in each state, but it is not the same as automatic operational readiness in every market.

Is Lithuania still a strong EMI jurisdiction in 2026? +

Lithuania remains strategically relevant for many fintechs because of its fintech ecosystem and infrastructure discussions around SEPA and CENTROLINK, but it is not universally the best option. The right answer depends on product fit, substance, governance, and expansion strategy.

When is Cyprus a better fit than Lithuania? +

Cyprus can be a better fit where the group structure, governance setup, regional strategy, or supervisory style aligns better with the applicant's operating model. The comparison should be made on substance, documentation burden, partner access, and management footprint, not on marketing claims about speed.

What is the difference between an EU EMI and a UK EMI? +

A UK EMI is authorized under the UK regime, including the Electronic Money Regulations 2011, and does not provide EEA passporting after Brexit. An EU EMI serves the EEA framework and does not by itself authorize UK activity.

Can I buy an EMI license? +

Not as a standalone transferable asset. In practice, these searches usually mean buying a company that already holds an EMI authorization. That transaction normally requires regulatory approval for a change in control or qualifying holding and should be preceded by deep legal, AML, safeguarding, and operational due diligence.

Can an EMI issue stablecoins in Europe? +

If the stablecoin qualifies as an electronic money token (EMT) under MiCA, the issuer generally must be an authorized EMI or credit institution. However, EMI status alone is not enough; the issuer must also satisfy the relevant MiCA requirements.

What are the ongoing obligations after authorization? +

An authorized EMI must maintain capital and safeguarding compliance, AML controls, governance, audit readiness, incident reporting, outsourcing oversight, customer complaint handling, and ICT resilience. In 2026, DORA readiness is part of that ongoing operating burden.

Need a Practical Readout?

Need a legal-practical view on EMI licensing in Europe?

A workable EMI license Europe strategy starts with the right perimeter, the right jurisdiction, and a file that matches the real operating model. If the project involves wallets, stored value, IBANs, cards, safeguarding, or an EMT / MiCA angle, the fastest route is usually a structured assessment before drafting the application pack.

Phone +372 56 966 260 Email info@rue.ee Hours Mon-Fri, 9:00-18:00 CET
Confidential - No obligation - Response within 24 hours