The first decision is usually EMI vs PI vs UK EMI vs restricted regime, not simply 'which country is faster'.
An EMI license in Europe authorizes an electronic money institution to issue electronic money and provide payment services under the EMD2 + PSD2 framework, subject to capital, safeguarding, governance, AML, ICT security, and ongoing supervisory obligations. For a full EMI, the baseline initial capital is €350,000, but the real licensing decision depends on whether the model needs stored value, wallet balances, IBAN accounts, cards, or only payment execution where a PI license may be enough.
An EMI license in Europe authorizes an electronic money institution to issue electronic money and provide payment services under the EMD2 + PSD2 framework, subject to capital, safeguarding, governance, AML, ICT security, and ongoing supervisory obligations. For a full EMI, the baseline initial capital is €350,000, but the real licensing decision depends on whether the model needs stored value, wallet balances, IBAN accounts, cards, or only payment execution where a PI license may be enough.
This page is a legal-practical overview for 2026, not legal, tax, or regulatory advice. Timelines, regulator practice, and fees vary by jurisdiction and by completeness of the application file. UK authorization is separate from EU/EEA authorization after Brexit.
Core authorization thresholds, timeline reality and the practical review lens in one block.
The first decision is usually EMI vs PI vs UK EMI vs restricted regime, not simply 'which country is faster'.
Core work includes programme of operations, financial model, AML framework, safeguarding design, governance map, outsourcing register, and ICT controls.
Multiple rounds of information requests are common. Review usually accelerates only after the file is internally coherent and complete.
Authorization is not the finish line. Firms still need bank and safeguarding arrangements, scheme access, audit readiness, incident reporting, and ongoing compliance staffing.
An electronic money institution license allows a firm to issue electronic money and provide regulated payment services, but it does not turn the firm into a bank. That distinction matters for product design, safeguarding architecture, customer disclosures, and investor expectations. Under EMD2, electronic money is monetary value stored electronically, issued on receipt of funds, and accepted by persons other than the issuer. In business terms, this usually covers wallet balances, prepaid value, certain multicurrency account structures, and settlement value represented as a redeemable liability of the EMI.
An EMI may combine e-money issuance with payment services under PSD2, including transfers, remittance, card-based flows, and in some cases PIS/AIS functionality. What it cannot do is equally important: an EMI cannot accept deposits as a credit institution does, cannot rely on deposit guarantee branding, and cannot use safeguarded client funds as its own balance-sheet funding source. A practical nuance often missed in competitor content is that redemption rights under EMD2 Article 11 shape product wording, fee design, and breakage assumptions for stored-value products.
The core distinction is simple: a PI license executes payment services, while an EMI license may also issue electronic money. The term PSP license is commercially common but legally imprecise because it can refer to either a PI or an EMI depending on the business perimeter. A specialized bank or credit institution sits in a different prudential category and is designed for deposit-taking and broader balance-sheet activities.
The wrong perimeter creates avoidable cost and delay. Founders often over-specify an EMI when a PI is enough, or under-specify a PI when the product in fact holds stored value. A useful rule is this: if the customer sees a balance that represents value issued by the firm and redeemable by the customer, regulators will usually analyze whether that balance is electronic money rather than a mere payment flow in transit.
| Parameter | PI | EMI | Specialized Bank |
|---|---|---|---|
| Core authorization logic | Payment services only under PSD2. | Electronic money issuance under EMD2 plus payment services under PSD2. | Banking authorization for deposit-taking and broader regulated banking activity. |
| Minimum initial capital | €20,000 / €50,000 / €125,000 depending on services. | €350,000. | Common baseline often starts from €5,000,000 under banking rules, subject to jurisdiction and model. |
| Stored value / wallet balances | Not designed to issue e-money or maintain stored-value liabilities as e-money. | Yes. This is the central feature of an EMI electronic money institution. | Yes, but under a different prudential and supervisory regime. |
| Deposit-taking | No. | No. | Yes, subject to banking authorization. |
| Own funds dynamics | Calculated under PSD2 methods depending on business profile. | At least the higher of €350,000 or 2% of average outstanding electronic money. | CRR / CRD prudential framework. |
| Best fit | Payment execution, remittance, acquiring-like flows, payout orchestration without stored value. | Wallets, prepaid products, multicurrency balances, IBAN-linked stored value, merchant settlement held as e-money. | Models needing deposit-taking, broader lending, or full banking infrastructure. |
| Commercial use of term PSP | May be described as a PSP. | May also be described as a PSP. | Usually not described this way in licensing discussions. |
An EU electronic money license is still anchored in EMD2 and PSD2 in 2026, but no serious licensing project should ignore the wider compliance stack. Regulators review the file through the lens of authorization rules, internal governance, AML, safeguarding, ICT resilience, outsourcing, and conduct obligations. The result is that a legally correct application can still fail operationally if the control framework is thin.
A second nuance is transition risk. The market is operating in the context of the EU payments reform package around PSD3 and the proposed Payment Services Regulation, while DORA already applies to financial entities from 17 January 2025. That means a 2026 EMI file should not be drafted as if only legacy PSD2 wording matters. It should show future-proof governance, incident handling, outsourcing discipline, and customer authentication architecture.
Primary-source review should include EUR-Lex, EBA materials, national regulator guidance such as the Bank of Lithuania, Central Bank of Cyprus, and FCA for UK comparisons. Regulator practice often matters as much as black-letter law.
| Framework | Why It Matters | Operational Impact |
|---|---|---|
| Directive 2009/110/EC (EMD2) | Defines electronic money, sets the authorization concept for EMIs, and establishes key prudential and redemption rules. | Drives product classification, redemption mechanics, own funds logic tied to average outstanding e-money, and customer disclosures. |
| Directive (EU) 2015/2366 (PSD2) | Sets the payment services framework and service categories used by EMIs when they provide payment services. | Shapes payment flows, PIS/AIS perimeter analysis, conduct rules, incident reporting, and security expectations. |
| RTS on SCA and CSC | Operationalizes strong customer authentication and secure communication requirements for relevant payment scenarios. | Affects API design, authentication journeys, exemptions logic, fraud controls, and third-party access architecture. |
| Regulation (EU) 2022/2554 (DORA) | Creates a harmonized ICT risk and operational resilience framework for financial entities. | Requires ICT governance, incident classification, testing, third-party ICT oversight, and documented resilience controls. |
| AMLD framework + national AML laws | Defines AML/CTF obligations, risk-based controls, customer due diligence, and suspicious activity escalation. | Directly affects onboarding, transaction monitoring, sanctions screening, MLRO function design, and correspondent / safeguarding bank acceptance. |
| MiCA Regulation (EU) 2023/1114 | Relevant where the EMI intends to issue an electronic money token (EMT) or interact with crypto-asset business lines. | EMI status may be a prerequisite for EMT issuance, but the firm still needs MiCA-specific compliance, governance, reserve, and disclosure arrangements. |
| GDPR | Payment and KYC operations process large volumes of personal data and often special-risk datasets. | Impacts retention schedules, access control, processor contracts, cross-border transfers, and breach response. |
An EMI application is approved on the basis of a credible operating institution, not a paper shell. Regulators test whether the applicant has adequate capital, fit-and-proper owners and managers, a workable safeguarding model, realistic financial projections, defensible outsourcing arrangements, and an ICT environment that can survive incidents. A frequent failure point is mismatch: the business plan promises a lean launch, while the control framework assumes enterprise-grade scale without the staff or vendors to support it.
Substance is especially important. EU supervisors increasingly expect real decision-making capacity, documented lines of responsibility, and local presence proportionate to the risk profile. The exact staffing model varies by jurisdiction and business model, but the common supervisory expectation is that key functions are not merely nominal. A useful practical test is whether the firm could answer a regulator’s question on safeguarding reconciliation, fraud spikes, or sanctions alerts without outsourcing the explanation to a consultant.
A recurring 2026 issue is that safeguarding banks and card / payment infrastructure partners now perform their own compliance diligence. A file that may be technically licensable can still be commercially blocked if AML maturity, fraud controls, or governance depth are weak.
| Area | Regulatory Expectation | Evidence Pack |
|---|---|---|
| Initial capital and prudential base | The applicant must evidence at least €350,000 initial capital and show how own funds will remain compliant as e-money liabilities grow. | Bank confirmation, capital structure documents, opening balance sheet, prudential model, and sensitivity analysis based on projected average outstanding e-money. |
| Business model and programme of operations | The model must clearly describe products, customer types, geographies, payment flows, outsourcing, and whether balances qualify as e-money. | Programme of operations, customer journey maps, funds-flow diagrams, product terms, and perimeter analysis. |
| Governance and effective management | Managers, directors, and qualifying shareholders must be fit and proper, with clear allocation of responsibilities and credible oversight. | CVs, criminal record extracts where required, questionnaires, governance map, committee structure, and conflict-of-interest controls. |
| Local substance | The firm should show real operational presence proportionate to its risk, not only a registered office and outsourced vendors. | Office arrangements, local staff plan, decision-making matrix, employment or service contracts, and evidence of local control over regulated activities. |
| AML / CTF framework | The applicant must present a risk-based AML system covering onboarding, monitoring, sanctions, escalation, and reporting. | Business-wide risk assessment, AML policy suite, KYC/KYB standards, sanctions procedures, MLRO role description, and alert-handling workflow. |
| Safeguarding model | Client funds must be segregated or otherwise safeguarded in line with law and regulator expectations, with reconciliation discipline and insolvency protection logic. | Safeguarding policy, funds segregation diagrams, reconciliation procedure, draft safeguarding account arrangements, and insolvency legal analysis where relevant. |
| ICT, security, and outsourcing | The firm must show secure architecture, access control, logging, incident response, vendor governance, and resilience planning. | ICT risk assessment, system architecture, outsourcing register, security policies, BCP/DR documents, incident workflow, and DORA-aligned governance records. |
| Financial forecasts | Three-year projections must be internally consistent and linked to the business model, not generic hockey-stick growth assumptions. | P&L, balance sheet, cash flow forecast, capital adequacy model, stress cases, and assumptions paper. |
The application pack for an EMI license in Europe is document-heavy because supervisors assess both legal perimeter and operational readiness. The strongest files are internally cross-referenced: the financial model matches the programme of operations, the AML risk assessment matches customer types, and the safeguarding policy matches the actual money flows. Incomplete or inconsistent packs are the most common cause of avoidable delay.
| Document | Purpose | Owner |
|---|---|---|
| Programme of operations | Defines services, product logic, customer segments, jurisdictions, channels, and operational perimeter. | Founders + legal / regulatory lead |
| Business plan with 3-year financial projections | Shows commercial viability, prudential sustainability, and capital planning. | Finance lead |
| AML / CTF policy suite and business-wide risk assessment | Demonstrates risk-based onboarding, monitoring, sanctions, and escalation controls. | MLRO / compliance |
| Safeguarding policy and funds-flow mapping | Explains how client funds are protected, segregated, reconciled, and redeemed. | Operations + finance + legal |
| Governance framework | Shows management structure, allocation of responsibilities, internal controls, and fit-and-proper arrangements. | Board / corporate secretary / legal |
| ICT architecture and security documentation | Supports DORA readiness, access control, incident handling, authentication, and vendor governance. | CTO / security lead |
| Outsourcing register and vendor agreements | Identifies critical providers, concentration risk, oversight mechanisms, and exit planning. | Operations + legal + procurement |
| Ownership and source-of-funds file | Supports review of UBOs, qualifying holdings, and funding legitimacy. | Shareholders + legal |
| Policies on complaints, fraud, incidents, and data protection | Shows conduct readiness and operational control maturity. | Compliance + operations + DPO |
The practical route to an EMI license starts with perimeter analysis and ends only when the institution is operationally ready to launch. In most cases, the total journey is measured in months, not weeks, because the regulator reviews not just legal forms but the real institution behind them. The statutory review period can be misleading if the file is not complete; in practice, the clock matters less than the quality of the submission and the speed of remediation.
Decide whether the model requires a full EMI, a PI, a restricted / small regime where available, or a separate UK authorization. Compare Lithuania, Cyprus, the UK, and other jurisdictions by product fit, regulator style, local substance, banking access, SEPA strategy, and expansion plan.
Set up the legal entity, document UBOs and qualifying holdings, and prepare source-of-funds evidence. Whether the route is greenfield or acquisition, ownership transparency is non-negotiable.
Prepare the programme of operations, financial model, AML framework, safeguarding design, governance map, outsourcing register, ICT controls, and supporting forms for managers and shareholders. This is usually the most work-intensive stage.
After filing, expect completeness checks, information requests, clarifications, and sometimes interviews. The most efficient responses are evidence-based and consistent across legal, finance, AML, and technology workstreams.
Authorization should be followed by final bank and safeguarding setup, scheme or sponsor arrangements, internal training, audit planning, incident reporting readiness, and where relevant passporting notifications into other EEA states.
The file should read like one operating model, not like disconnected policy appendices.
| Document | Purpose | Owner |
|---|---|---|
| Programme of operations | Core description of the regulated business model. | Legal / founders |
| Financial projections and prudential model | Supports viability and capital adequacy review. | Finance |
| AML framework | Supports ML/TF risk assessment and control design. | Compliance / MLRO |
| Safeguarding framework | Supports client funds protection review. | Operations / finance / legal |
| ICT and outsourcing pack | Supports DORA, security, and vendor oversight review. | Technology / operations |
The minimum legal capital for a full EMI is €350,000, but the real first-year budget is materially higher. Founders often underestimate the difference between locked-in prudential capital, spendable operating cash, and safeguarded client funds that cannot be used as working capital. A realistic budget must include legal and regulatory preparation, local substance, compliance staffing, technology, audit, insurance where relevant, and the cost of reaching operational readiness after authorization.
Cost also depends on the model. A simple wallet with outsourced processing is cheaper than a multicurrency account product with card issuing, open banking APIs, fraud tooling, and multiple vendor layers. Another often-missed cost driver is remediation: weak files are not merely delayed; they become more expensive because policies, forecasts, and governance documents must be rewritten under time pressure.
| Cost Bucket | Low Estimate | High Estimate | What Drives Cost |
|---|---|---|---|
| Initial capital | €350,000 | Higher if own funds planning requires more headroom | This is the prudential baseline for a full EMI, not the total project budget. |
| Legal and regulatory preparation | €30,000 | €80,000+ | Varies by jurisdiction, complexity, documentation depth, and whether the file includes cross-border, card, or crypto-adjacent elements. |
| Regulator and filing fees | Jurisdiction-specific | Jurisdiction-specific | Official fees should always be verified with the relevant authority before filing. |
| Local substance and staffing | €120,000 | €300,000+ | Includes management, compliance, MLRO support, finance, operations, and local presence proportionate to the model. |
| ICT, security, and vendor stack | €50,000 | €250,000+ | Can include core ledger, KYC/KYB, sanctions screening, transaction monitoring, fraud tools, API security, logging, and resilience controls. |
| Audit, legal maintenance, and recurring compliance | €20,000 | €100,000+ | Annual audit, policy maintenance, training, board support, and external legal / regulatory advice. |
| First-year total operating budget excluding growth capital | €500,000 | €750,000+ | A common practical range for many projects, but complex models can exceed it materially. |
Safeguarding is the legal and operational mechanism that protects customer funds received in exchange for electronic money or for payment services. It is not the same as regulatory capital. Capital protects the institution’s solvency profile; safeguarding protects customer money from being mixed with the firm’s own assets and supports insolvency ring-fencing. That distinction is central to both licensing and ongoing supervision.
In practice, supervisors expect a safeguarding model that works daily, not only conceptually. That means clear account architecture, reconciliation logic, timing controls, escalation rules for breaks, and governance over the safeguarding bank relationship. A technical nuance often overlooked is that safeguarding failures can arise from ledger design as much as from bank account misuse: if the internal ledger cannot identify safeguarded liabilities accurately and promptly, the policy is not operationally credible.
| Workflow Step | Control | Owner |
|---|---|---|
| Receipt of customer funds | Classify whether funds relate to e-money issuance or payment services and trigger safeguarding workflow without delay. | Operations / finance |
| Ledger recognition | Record the customer liability accurately in the internal ledger with audit trail and timestamp integrity. | Finance / product / engineering |
| Segregation / safeguarding placement | Move or maintain relevant funds in the safeguarding structure in line with policy and legal timing requirements. | Treasury / finance |
| Reconciliation | Reconcile bank balances, safeguarding accounts, and customer liabilities; investigate breaks immediately. | Finance control |
| Exception handling | Escalate shortfalls, stale items, failed transfers, or classification errors to compliance and management. | Finance + compliance |
| Redemption / payout | Process redemption or payment execution in a way that preserves customer rights and ledger accuracy. | Operations |
A 2026 EMI application must show that the institution can operate securely under both payments regulation and financial-sector resilience standards. For firms handling online payments, APIs, or account access, this usually means a documented approach to SCA, secure communication, fraud controls, logging, incident response, and change management. For firms with cards, PCI DSS and 3-D Secure 2 become part of the practical control environment even where they are not the licensing statute itself.
Under DORA, ICT governance is no longer a side annex. Regulators increasingly expect a mapped inventory of critical systems and providers, clear ownership of incidents, resilience testing, and evidence that outsourcing does not hollow out the institution’s control function. A useful rule is that any vendor doing something the EMI cannot explain to its regulator is already a governance problem.
A frequent blind spot is dependency mapping. Regulators increasingly expect firms to identify not just direct vendors but also critical sub-outsourcing chains, especially for cloud hosting, KYC utilities, ledger infrastructure, and card processing.
| Area | Control | Owner |
|---|---|---|
| API and authentication security | Use a documented authentication and authorization architecture appropriate to the service model; where relevant, align with SCA, secure communication, OAuth 2.0, OpenID Connect, and certificate-based controls such as mTLS. | CTO / security lead |
| Payments messaging and rails | Design payment operations around applicable standards such as IBAN, BIC, and ISO 20022 for SEPA-related flows. | Payments operations / engineering |
| Logging and monitoring | Maintain tamper-resistant audit logs, privileged access monitoring, alerting, and evidence retention proportionate to financial-sector expectations. | Security operations |
| Incident management | Define incident classification, escalation, regulator notification paths, root-cause analysis, and lessons-learned governance under DORA-style discipline. | CISO / operations / compliance |
| Business continuity and disaster recovery | Document BCP/DR, backup integrity, recovery priorities, and target recovery assumptions such as RTO / RPO where relevant to the service model. | CTO / operations |
| Outsourcing governance | Maintain an outsourcing register, classify critical providers, preserve audit rights, monitor concentration risk, and document exit plans. | Operations / legal / board |
| Card environment | Where cards are involved, align the operating model with PCI DSS, tokenization logic, fraud controls, and 3DS2 journey design. | Card product lead / security |
An EU/EEA EMI may scale cross-border through the passporting framework, but passporting is a notification mechanism, not a magic market-entry switch. The home-state regulator remains the primary supervisor, while host-state conduct rules can still matter depending on the activity, local consumer interface, and whether the firm uses a branch, agents, or distributors. The practical question is not only ‘can we passport?’ but ‘what operating model will survive host-state scrutiny and partner due diligence?’
Infrastructure access matters just as much as licensing. A firm may hold an EMI authorization and still depend on sponsor or partner arrangements for IBAN issuance, card settlement, or payment rails. In Lithuania, CENTROLINK is often part of the market discussion, while across Europe firms also evaluate indirect versus direct access to SEPA, SEPA Instant, and SWIFT-connected services. The strategic mistake is to treat passporting and payments infrastructure as the same thing; they are related, but not interchangeable.
For jurisdiction-specific paths, see related pages on EMI license in Lithuania, EMI license in Cyprus, and EMI license in the UK.
| Topic | Details | Risk Note |
|---|---|---|
| Freedom to provide services vs right of establishment | Passporting can support cross-border services without a branch or can support establishment through a branch or other notified structure, depending on the model. | The compliance burden increases when local presence, agents, or customer-facing operations deepen in host states. |
| Branch, agent, and distributor distinctions | The legal role used for expansion affects oversight, reporting, and operational accountability. The correct structure depends on the service mix and local execution model. | Using the wrong distribution model can create unauthorized activity risk or remediation demands. |
| SEPA and payment rails | EEA scaling often depends on access to SEPA Credit Transfer, SEPA Instant, IBAN capabilities, sponsor-bank arrangements, or infrastructure such as CENTROLINK in Lithuania. | Licensing does not guarantee infrastructure access; banks and scheme partners apply their own risk filters. |
| UK boundary after Brexit | An EU EMI passport does not extend into the UK. A separate FCA authorization is generally needed for UK e-money or payment services activity. | Cross-border marketing into the UK without the correct perimeter analysis can create regulatory exposure. |
| MiCA-related expansion | If the EMI also plans EMT issuance, cross-border strategy must account for MiCA disclosures, reserve management, governance, and supervisory expectations beyond the base EMI license. | EMI authorization alone does not complete the crypto-regulatory perimeter. |
Most EMI files fail because the institution is under-designed, not because the law is unclear. Supervisors usually react negatively to incomplete perimeter analysis, weak safeguarding mechanics, thin management substance, and financial projections that do not match the real launch plan. A second pattern is over-outsourcing: the firm delegates core regulated functions to vendors but cannot evidence oversight, fallback, or internal competence.
The highest-risk files are those that look polished at policy level but collapse under operational questioning. If the applicant cannot explain how a failed top-up is reconciled, how a sanctions false positive is cleared, or how an incident is escalated under DORA-style governance, the regulator will usually conclude that the control environment is not mature enough.
Legal risk: The file does not clearly distinguish e-money issuance from payment funds in transit, or mixes PI and EMI logic inconsistently.
Mitigation: Prepare a transaction-by-transaction perimeter memo with customer journey maps and ledger treatment.
Legal risk: Policies mention segregation but do not show timing, reconciliation, break management, or insolvency logic.
Mitigation: Document the full safeguarding workflow, account structure, reconciliation cadence, and escalation process.
Legal risk: Managers appear nominal, responsibilities are unclear, or local decision-making is not credible.
Mitigation: Strengthen management appointments, allocate responsibilities formally, and evidence real operational control.
Legal risk: The AML risk assessment is generic and does not reflect customer types, geographies, channels, or transaction patterns.
Mitigation: Rewrite the AML stack around actual risk drivers, onboarding flows, and alert-handling logic.
Legal risk: Projected growth, revenue, fraud losses, staffing, or own-funds planning are not credible.
Mitigation: Use conservative assumptions, stress scenarios, and prudential headroom linked to average outstanding e-money.
Legal risk: Critical functions are outsourced without adequate oversight, audit rights, resilience testing, or exit planning.
Mitigation: Create a critical outsourcing framework, dependency map, and DORA-aligned governance pack.
In legal terms, there is no standalone commodity called an ‘EMI license for sale‘. What the market usually means is the acquisition of a company that already holds an EMI or PI authorization. That transaction is regulated. The buyer typically needs approval for a change in control or qualifying holding, and the regulator may reassess ownership, governance, source of funds, and the post-acquisition operating model. The same principle applies to searches such as lithuania emi license for sale, psp license for sale, or uk emi license for sale.
An acquisition can shorten market entry, but it also imports legacy risk. Hidden safeguarding deficits, AML remediation backlogs, unresolved complaints, audit qualifications, or vendor lock-in can make a licensed target more dangerous than a greenfield application. The correct comparison is therefore not speed alone, but speed adjusted for remediation risk and regulator approval risk.
| Option | Advantages | Limitations | Best For |
|---|---|---|---|
| Greenfield EMI application | Clean perimeter design, fresh governance build, tailored safeguarding model, and no inherited compliance debt. Usually better for founders with a specific product architecture and patient launch plan. | Longer path to authorization, heavier documentation burden, and no immediate operating history. | New fintechs building wallets, stored-value products, or multicurrency payment accounts from first principles. |
| Acquisition of an existing licensed EMI | Potentially faster route to market, existing authorization perimeter, and sometimes existing bank, scheme, or operational infrastructure. | Requires change-of-control approval, deep due diligence, and often post-deal remediation. Legacy AML, safeguarding, complaints, or outsourcing issues can materially reduce deal value. | Buyers with strong M&A discipline, compliance integration capacity, and a willingness to remediate inherited control weaknesses. |
| PI first, EMI later | Lower initial threshold where the model does not yet require stored value. Can validate product-market fit before upgrading perimeter. | If the product later shifts to wallet balances or redeemable stored value, a second licensing project may be needed. | Payment execution businesses, remittance models, and payout platforms not yet issuing e-money. |
These answers address the most common legal and strategic questions behind searches such as emi license europe, electronic money license, emi license lithuania, emi license cyprus, emi uk, and emi license for sale.
An EMI license is an authorization for an electronic money institution to issue electronic money and provide payment services in line with EMD2 and PSD2. It is typically used for wallet balances, prepaid value, multicurrency payment accounts, and similar stored-value fintech models.
The baseline initial capital for an authorized EMI is €350,000. Separately, own funds must remain at least the higher of €350,000 or 2% of average outstanding electronic money.
A practical end-to-end range is often 6-18 months, depending on the jurisdiction, the completeness of the file, the complexity of the model, and how quickly the applicant answers regulator questions.
A payment institution license allows payment services but not e-money issuance. An electronic money institution license adds the ability to issue electronic money and maintain stored-value liabilities.
No. An EMI cannot accept deposits as a credit institution does. Customer funds must be safeguarded, and e-money must generally be redeemable at par value under the legal framework.
No. EEA expansion uses a notification-based passporting process through the home-state regulator. It is simpler than relicensing in each state, but it is not the same as automatic operational readiness in every market.
Lithuania remains strategically relevant for many fintechs because of its fintech ecosystem and infrastructure discussions around SEPA and CENTROLINK, but it is not universally the best option. The right answer depends on product fit, substance, governance, and expansion strategy.
Cyprus can be a better fit where the group structure, governance setup, regional strategy, or supervisory style aligns better with the applicant's operating model. The comparison should be made on substance, documentation burden, partner access, and management footprint, not on marketing claims about speed.
A UK EMI is authorized under the UK regime, including the Electronic Money Regulations 2011, and does not provide EEA passporting after Brexit. An EU EMI serves the EEA framework and does not by itself authorize UK activity.
Not as a standalone transferable asset. In practice, these searches usually mean buying a company that already holds an EMI authorization. That transaction normally requires regulatory approval for a change in control or qualifying holding and should be preceded by deep legal, AML, safeguarding, and operational due diligence.
If the stablecoin qualifies as an electronic money token (EMT) under MiCA, the issuer generally must be an authorized EMI or credit institution. However, EMI status alone is not enough; the issuer must also satisfy the relevant MiCA requirements.
An authorized EMI must maintain capital and safeguarding compliance, AML controls, governance, audit readiness, incident reporting, outsourcing oversight, customer complaint handling, and ICT resilience. In 2026, DORA readiness is part of that ongoing operating burden.
A workable EMI license Europe strategy starts with the right perimeter, the right jurisdiction, and a file that matches the real operating model. If the project involves wallets, stored value, IBANs, cards, safeguarding, or an EMT / MiCA angle, the fastest route is usually a structured assessment before drafting the application pack.