EMI License in Poland in 2026

A Poland EMI license allows a properly authorized legal entity to issue electronic money and provide permitted payment services under the Polish Payment Services Act, with potential EU passporting after authorization. The key threshold founders usually miss is that a full Electronic Money Institution is not the same as a National Payment Institution or a Small Payment Institution, and the wrong perimeter choice can add months of avoidable licensing work.

A Poland EMI license allows a properly authorized legal entity to issue electronic money and provide permitted payment services under the Polish Payment Services Act, with potential EU passporting after authorization. The key threshold founders usually miss is that a full Electronic Money Institution is not the same as a National Payment Institution or a Small Payment Institution, and the wrong perimeter choice can add months of avoidable licensing work.

This page is an informational legal-compliance guide, not legal, tax, accounting, or investment advice. Regulatory outcomes depend on the applicant’s business model, governance, ownership transparency, safeguarding setup, and the quality of the dossier submitted to the Polish Financial Supervision Authority.

Disclaimer This page is an informational legal-compliance guide, not legal, tax, accounting, or investment advice. Regulatory outcomes depend on the applicant’s business model, governance, ownership transparency, safeguarding setup, and the quality of the dossier submitted to the Polish Financial Supervision Authority.
Updated for 2026

EMI Snapshot

Core authorization thresholds, timeline reality and the practical review lens in one block.

At a Glance

Main regulator
KNF (Komisja Nadzoru Finansowego) is the licensing authority for EMI authorization in Poland. Depending on the operating model, the applicant will also interact with KRS for company registration, GIIF for AML/CFT supervision aspects, UODO for data protection, and banks or safeguarding partners for client funds segregation.
Core legal basis
The Polish regime sits on Directive 2009/110/EC (EMD2), Directive (EU) 2015/2366 (PSD2), the Polish Payment Services Act, the Polish AML Act, GDPR, and Regulation (EU) 2022/2554 (DORA). In 2026, writing an EMI application without DORA-grade ICT governance is a material weakness.
Initial capital benchmark
For a full EMI, the EU benchmark is EUR 350,000 in initial capital. This is only the entry threshold. The institution must also maintain ongoing own funds under the applicable prudential methodology and cannot treat initial capital as a one-off formality.
What the license covers
A full Electronic Money Institution may issue electronic money, redeem it, and provide relevant payment services within the licensed perimeter. It is not a banking license and does not authorize deposit-taking from the public in the credit institution sense.
Realistic timing
Founders should separate company setup from authorization. A well-prepared project may spend 6-12+ weeks on structuring and dossier preparation, while regulatory review commonly runs for several months and may include multiple rounds of KNF questions.
Who should not apply for EMI
If the business does not issue e-money, does not need stored-value functionality, or can operate under a narrower payment perimeter, a National Payment Institution or Small Payment Institution (MIP) may be more proportionate. This is the first strategic question, not the last.

Mini Timeline

Week 1-2
Perimeter and feasibility analysis

Confirm whether the model is actually EMI, PI/NPI, MIP, or a mixed structure requiring separate analysis for crypto, lending, or card acquiring components.

Week 3-10+
Governance and dossier build-out

Prepare the program of operations, financial model, AML/CFT framework, safeguarding design, outsourcing map, ICT controls, fit and proper files, and ownership disclosures.

After filing
KNF review and follow-up

Expect requests for clarifications on safeguarding, source of funds, management experience, outsourcing, incident management, and the realism of financial projections.

Post-authorization
Operational launch and passporting

Launch requires implemented controls, not just approved documents. Cross-border activity into other EEA states follows the passporting notification process.

Quick Assessment

  • Do you issue stored value that qualifies as electronic money rather than only executing payment transactions?
  • Can you evidence EUR 350,000 initial capital from transparent sources and maintain ongoing own funds?
  • Do your board members and key function holders have credible payments, AML, risk, or operations experience?
  • Do you already have a workable safeguarding architecture and a realistic banking or safeguarding-partner path?
  • Can your ICT stack support access control, audit logs, incident response, vendor oversight, and DORA-aligned resilience governance?
  • Is your ownership chain simple enough for KNF to verify UBOs, source of funds, and control relationships without escalation?
Request a licensing feasibility review
Regulated perimeter

What an EMI license in Poland allows you to do

An EMI license in Poland authorizes a legal entity to act as an electronic money institution within the perimeter defined by the Polish Payment Services Act, EMD2, and the relevant PSD2 framework. The practical advantage is that one regulated entity can combine issuance of electronic money with permitted payment services, which is why the EMI model is often used for wallets, prepaid products, merchant settlement structures, and app-based stored-value ecosystems.

The perimeter must still be drawn carefully. A full EMI is not a bank, not a generic fintech label, and not a crypto authorization. If the product includes lending, investment services, deposit-like features, or crypto-asset services, those activities must be analyzed separately. KNF will look at the real operating flow of funds, not just the marketing description of the product.

Can Do

Permitted Activities

  • Issue electronic money in exchange for funds received from users or distributors.
  • Redeem electronic money at par value in line with the applicable legal framework and contractual terms.
  • Provide permitted payment services linked to the authorized business model, including execution of payment transactions within the licensed scope.
  • Operate payment accounts or wallet-like structures where the product design fits the e-money and payment-services perimeter.
  • Use agents, distributors, or outsourcing arrangements where legally structured, documented, and controlled.
  • Passport authorized services into other EEA states after the relevant home-state notification process.
Cannot Do

Out-of-Scope Activities

  • Accept deposits or other repayable funds from the public as a credit institution would under a banking license.
  • Present safeguarded client funds as the institution’s own operational liquidity.
  • Provide investment services, custody of financial instruments, or other regulated capital-markets activities without separate authorization.
  • Assume that a crypto, CASP, or MiCA-related business model is automatically covered by an EMI license.
  • Rely on a paper-only local presence with no credible substance, governance, or control over outsourced operations.
Decision framework

EMI vs National Payment Institution vs banking route: which perimeter fits the business model

The first licensing question in Poland is not how to file with KNF. It is whether the business actually needs a full Electronic Money Institution. Many founders search for an emi license in poland when their product is closer to a payment institution model. Others need a banking route because the economics depend on lending from repayable funds or deposit-taking features that an EMI cannot lawfully replicate.

The matrix below is a strategic simplification for founders and CFOs. It does not replace a formal legal perimeter analysis, but it helps avoid the most common error in this market: applying for a heavier license than the product actually requires.

Parameter PI EMI Specialized Bank
Core activity Provides payment services without issuing electronic money. Suitable where the product is transaction execution rather than stored-value issuance. Issues electronic money and may provide related payment services. Suitable for wallets, prepaid ecosystems, stored-value apps, and settlement models built around e-money. Used where the business model requires banking functions beyond EMI scope, especially deposit-taking or broader balance-sheet activity.
Initial capital logic Depends on the specific payment services provided; lower than a full EMI in some cases, but still subject to regulatory capital logic. Initial capital benchmark is EUR 350,000 for a full EMI under the EU framework. Capitalization is materially heavier and linked to banking prudential rules, not the EMI/PI regime.
Can issue e-money No. Yes. This is the defining feature. Not the core reason to choose the banking route; the bank model is broader.
Client funds treatment Client funds protection still matters, but the structure differs because no e-money is issued. Safeguarding is central. Relevant funds must be protected, segregated, reconciled, and operationally controlled. Banking prudential framework applies; this is not the same safeguarding model used by EMIs.
Best fit Payment processors, payment initiation models, acquiring-like flows, or narrower payment services without stored value. Wallets, prepaid cards, stored-value apps, marketplace settlement layers, and multi-country payment products needing e-money functionality. Projects needing a broader balance-sheet model, banking products, or prudential capabilities beyond the EMI perimeter.
Common founder mistake Underestimating AML, safeguarding-adjacent controls, and operational governance because the model seems lighter than EMI. Assuming the license is just a bigger PI. KNF will assess governance, safeguarding, ICT resilience, and ownership transparency in much greater depth. Trying to replicate banking economics through an EMI structure when the legal perimeter does not support it.
Parameter
Core activity
PI
Provides payment services without issuing electronic money. Suitable where the product is transaction execution rather than stored-value issuance.
EMI
Issues electronic money and may provide related payment services. Suitable for wallets, prepaid ecosystems, stored-value apps, and settlement models built around e-money.
Specialized Bank
Used where the business model requires banking functions beyond EMI scope, especially deposit-taking or broader balance-sheet activity.
Parameter
Initial capital logic
PI
Depends on the specific payment services provided; lower than a full EMI in some cases, but still subject to regulatory capital logic.
EMI
Initial capital benchmark is EUR 350,000 for a full EMI under the EU framework.
Specialized Bank
Capitalization is materially heavier and linked to banking prudential rules, not the EMI/PI regime.
Parameter
Can issue e-money
PI
No.
EMI
Yes. This is the defining feature.
Specialized Bank
Not the core reason to choose the banking route; the bank model is broader.
Parameter
Client funds treatment
PI
Client funds protection still matters, but the structure differs because no e-money is issued.
EMI
Safeguarding is central. Relevant funds must be protected, segregated, reconciled, and operationally controlled.
Specialized Bank
Banking prudential framework applies; this is not the same safeguarding model used by EMIs.
Parameter
Best fit
PI
Payment processors, payment initiation models, acquiring-like flows, or narrower payment services without stored value.
EMI
Wallets, prepaid cards, stored-value apps, marketplace settlement layers, and multi-country payment products needing e-money functionality.
Specialized Bank
Projects needing a broader balance-sheet model, banking products, or prudential capabilities beyond the EMI perimeter.
Parameter
Common founder mistake
PI
Underestimating AML, safeguarding-adjacent controls, and operational governance because the model seems lighter than EMI.
EMI
Assuming the license is just a bigger PI. KNF will assess governance, safeguarding, ICT resilience, and ownership transparency in much greater depth.
Specialized Bank
Trying to replicate banking economics through an EMI structure when the legal perimeter does not support it.
Primary sources

Legal framework for an EMI license in Poland

A Poland EMI license is governed by a layered framework rather than a single statute. At EU level, the core pillars are Directive 2009/110/EC (EMD2) for electronic money and Directive (EU) 2015/2366 (PSD2) for payment services. In Poland, these rules are implemented through the Payment Services Act, while AML/CFT, data protection, and operational resilience are governed through separate but equally relevant instruments.

In 2026, the regulatory map must also include DORA. An EMI application that treats ICT governance as a post-license issue is structurally weak. KNF reviews not only legal entitlement to perform the activity, but also whether the institution can operate it safely, with controlled outsourcing, incident escalation, access management, and continuity planning.

MiCA should be mentioned only to draw a boundary. If the product includes crypto-asset services or electronic money tokens, the analysis may touch MiCA, but an EMI authorization and a CASP authorization are not interchangeable regimes.

Regulatory mapping should also identify whether the business touches card-scheme rules, PCI DSS exposure, open-banking interfaces, outsourcing concentration risk, or cross-border consumer-law issues. These are not separate licenses by themselves, but they materially affect KNF readiness.

Framework Why It Matters Operational Impact
Directive 2009/110/EC (EMD2) Defines electronic money, redemption logic, and the core prudential architecture for electronic money institutions. Determines whether the product is truly e-money, what capital benchmark applies, and how redemption and issuance must be structured.
Directive (EU) 2015/2366 (PSD2) Sets the EU framework for payment services, conduct rules, security requirements, and access-to-account concepts where relevant. Shapes the payment-services perimeter, security expectations, SCA-related architecture where applicable, and customer-facing transaction controls.
Polish Payment Services Act This is the national legal basis KNF applies when authorizing and supervising EMIs in Poland. Controls local authorization mechanics, institution categories, notifications, governance expectations, and the Polish regulatory perimeter.
Polish AML Act and GIIF supervision architecture EMIs are exposed to money-laundering, fraud, sanctions, and terrorist-financing risks through onboarding and transaction flows. Requires risk assessment, CDD/EDD, transaction monitoring, suspicious activity escalation, sanctions screening, staff training, and documented governance.
GDPR and Polish data-protection oversight EMIs process large volumes of personal and transactional data, often across multiple channels and vendors. Requires lawful processing, data minimization, processor oversight, breach handling, role allocation, and security controls reviewable by UODO.
Regulation (EU) 2022/2554 (DORA) DORA applies from 17 January 2025 and is fully relevant to EMI operations in 2026. Requires ICT risk governance, incident management, third-party ICT oversight, resilience testing logic, and a board-level view of operational resilience.
Framework
Directive 2009/110/EC (EMD2)
Why It Matters
Defines electronic money, redemption logic, and the core prudential architecture for electronic money institutions.
Operational Impact
Determines whether the product is truly e-money, what capital benchmark applies, and how redemption and issuance must be structured.
Framework
Directive (EU) 2015/2366 (PSD2)
Why It Matters
Sets the EU framework for payment services, conduct rules, security requirements, and access-to-account concepts where relevant.
Operational Impact
Shapes the payment-services perimeter, security expectations, SCA-related architecture where applicable, and customer-facing transaction controls.
Framework
Polish Payment Services Act
Why It Matters
This is the national legal basis KNF applies when authorizing and supervising EMIs in Poland.
Operational Impact
Controls local authorization mechanics, institution categories, notifications, governance expectations, and the Polish regulatory perimeter.
Framework
Polish AML Act and GIIF supervision architecture
Why It Matters
EMIs are exposed to money-laundering, fraud, sanctions, and terrorist-financing risks through onboarding and transaction flows.
Operational Impact
Requires risk assessment, CDD/EDD, transaction monitoring, suspicious activity escalation, sanctions screening, staff training, and documented governance.
Framework
GDPR and Polish data-protection oversight
Why It Matters
EMIs process large volumes of personal and transactional data, often across multiple channels and vendors.
Operational Impact
Requires lawful processing, data minimization, processor oversight, breach handling, role allocation, and security controls reviewable by UODO.
Framework
Regulation (EU) 2022/2554 (DORA)
Why It Matters
DORA applies from 17 January 2025 and is fully relevant to EMI operations in 2026.
Operational Impact
Requires ICT risk governance, incident management, third-party ICT oversight, resilience testing logic, and a board-level view of operational resilience.
KNF expectations

Key eligibility requirements and substance expectations

KNF expects an EMI applicant to be a real operating institution, not a shelf company with outsourced paperwork. The licensing test is cumulative: the applicant must show lawful corporate setup, transparent ownership, adequate capital, competent management, workable safeguarding, a credible AML/CFT framework, and an ICT environment capable of supporting regulated payment operations.

The practical point founders underestimate is substance. A Polish EMI is not approved because the articles of association mention payment services. It is approved when the authority can see who controls the institution, how decisions are made, where operational responsibility sits, how client funds are protected, and how risks are managed day to day.

A common hidden blocker is mismatch between the declared business model and the actual operating stack. If the application says core processes are internal but onboarding, ledgering, fraud controls, and customer support are all outsourced without documented oversight, KNF will usually focus on governance credibility before anything else.

Area Regulatory Expectation Evidence Pack
Corporate form and registered office The applicant must use an appropriate Polish legal entity structure, be properly registered, and maintain a credible registered office and operational presence in Poland. KRS registration data, constitutional documents, lease or office-use arrangements, governance chart, and evidence that core management and control functions are not purely nominal.
Shareholders and UBO transparency KNF must be able to identify direct and indirect owners, assess control links, and understand the origin of capital and the source of funds used for the project. Shareholding charts, UBO disclosures, group structure documents, source-of-funds support, corporate registry extracts, and where relevant notarized or legalized foreign documents.
Fit and proper management Board members and key function holders must demonstrate good repute, relevant experience, and the ability to manage a regulated payment institution. CVs, criminal record certificates where required, references, role descriptions, conflict-of-interest disclosures, and evidence of prior payments, AML, risk, operations, or technology leadership.
Initial capital and own funds A full EMI must meet the EUR 350,000 initial capital benchmark and maintain ongoing own funds under the applicable prudential logic. Capital contribution records, banking evidence, audited or supportable financial inputs, prudential calculations, and assumptions tied to the actual business model.
AML/CFT and sanctions controls The institution must operate a risk-based AML framework, not a generic policy library copied from another sector or jurisdiction. Enterprise-wide AML risk assessment, CDD and EDD procedures, transaction monitoring scenarios, sanctions-screening logic, escalation paths, training plan, and MLRO or equivalent function setup.
Safeguarding architecture Client funds relevant for safeguarding must be identified, segregated, reconciled, and protected from operational misuse. Safeguarding policy, account structure, reconciliation methodology, funds-flow mapping, partner discussions, insolvency-remoteness logic, and internal control ownership.
ICT governance and outsourcing The applicant must show control over systems, vendors, security, resilience, and incident response in line with DORA-era supervisory expectations. ICT architecture, access-control matrix, outsourcing register, critical-provider mapping, incident playbooks, business continuity and disaster recovery materials, and board oversight structure.
Area
Corporate form and registered office
Regulatory Expectation
The applicant must use an appropriate Polish legal entity structure, be properly registered, and maintain a credible registered office and operational presence in Poland.
Evidence Pack
KRS registration data, constitutional documents, lease or office-use arrangements, governance chart, and evidence that core management and control functions are not purely nominal.
Area
Shareholders and UBO transparency
Regulatory Expectation
KNF must be able to identify direct and indirect owners, assess control links, and understand the origin of capital and the source of funds used for the project.
Evidence Pack
Shareholding charts, UBO disclosures, group structure documents, source-of-funds support, corporate registry extracts, and where relevant notarized or legalized foreign documents.
Area
Fit and proper management
Regulatory Expectation
Board members and key function holders must demonstrate good repute, relevant experience, and the ability to manage a regulated payment institution.
Evidence Pack
CVs, criminal record certificates where required, references, role descriptions, conflict-of-interest disclosures, and evidence of prior payments, AML, risk, operations, or technology leadership.
Area
Initial capital and own funds
Regulatory Expectation
A full EMI must meet the EUR 350,000 initial capital benchmark and maintain ongoing own funds under the applicable prudential logic.
Evidence Pack
Capital contribution records, banking evidence, audited or supportable financial inputs, prudential calculations, and assumptions tied to the actual business model.
Area
AML/CFT and sanctions controls
Regulatory Expectation
The institution must operate a risk-based AML framework, not a generic policy library copied from another sector or jurisdiction.
Evidence Pack
Enterprise-wide AML risk assessment, CDD and EDD procedures, transaction monitoring scenarios, sanctions-screening logic, escalation paths, training plan, and MLRO or equivalent function setup.
Area
Safeguarding architecture
Regulatory Expectation
Client funds relevant for safeguarding must be identified, segregated, reconciled, and protected from operational misuse.
Evidence Pack
Safeguarding policy, account structure, reconciliation methodology, funds-flow mapping, partner discussions, insolvency-remoteness logic, and internal control ownership.
Area
ICT governance and outsourcing
Regulatory Expectation
The applicant must show control over systems, vendors, security, resilience, and incident response in line with DORA-era supervisory expectations.
Evidence Pack
ICT architecture, access-control matrix, outsourcing register, critical-provider mapping, incident playbooks, business continuity and disaster recovery materials, and board oversight structure.
Application pack

Documents required for a Poland EMI license application

A Poland EMI application is a dossier, not a form. KNF typically expects a coherent package covering legal identity, ownership, management suitability, business operations, prudential assumptions, safeguarding, AML/CFT, internal control, outsourcing, and ICT governance. The quality of cross-references between these documents matters almost as much as the documents themselves.

The strongest applications read as one controlled system. The business plan matches the financial model, the financial model matches the capital plan, the capital plan matches the ownership disclosures, and the safeguarding and AML controls match the actual product flow. Where documents contradict each other, review time usually expands.

Document Purpose Owner
Constitutional and corporate documents Establish the legal identity of the applicant, its corporate purpose, governance basis, and registration status in Poland. Corporate legal
KRS extract and shareholder structure pack Allow KNF to verify the current legal status, shareholders, control chain, and beneficial ownership structure. Corporate legal / shareholders
UBO disclosures and source-of-funds evidence Support transparency of ownership and the lawful origin of capital committed to the project. Shareholders / compliance
Program of operations Explain exactly which services will be provided, through which channels, to which customer segments, in which jurisdictions, and with which operational dependencies. Management / legal / compliance
Business plan and financial model Demonstrate commercial logic, prudential sustainability, forecast transaction volumes, revenue assumptions, cost base, and capital adequacy planning. Finance / founders
Fit and proper files for board and key persons Allow assessment of reputation, competence, independence, and role suitability of management and control-function holders. HR / legal / individual appointees
AML/CFT framework Show how the institution will identify, assess, monitor, escalate, and report ML/TF and sanctions risks. Compliance / MLRO
Safeguarding policy and funds-flow map Demonstrate how relevant client funds are identified, segregated, reconciled, and protected from misuse. Finance / operations / compliance
Risk management and internal control framework Evidence governance over operational, compliance, fraud, liquidity, outsourcing, and conduct risks. Risk / management
ICT architecture and security documentation Show system design, access controls, logging, incident handling, business continuity, vendor dependencies, and DORA-relevant governance. CTO / security / operations
Outsourcing register and provider oversight materials Identify critical and important outsourced functions, contractual controls, monitoring rights, and exit planning. Operations / legal / vendor management
Complaint handling and customer terms framework Evidence consumer-facing governance, complaint escalation, disclosures, and operational accountability. Legal / operations / customer support
Document
Constitutional and corporate documents
Purpose
Establish the legal identity of the applicant, its corporate purpose, governance basis, and registration status in Poland.
Owner
Corporate legal
Document
KRS extract and shareholder structure pack
Purpose
Allow KNF to verify the current legal status, shareholders, control chain, and beneficial ownership structure.
Owner
Corporate legal / shareholders
Document
UBO disclosures and source-of-funds evidence
Purpose
Support transparency of ownership and the lawful origin of capital committed to the project.
Owner
Shareholders / compliance
Document
Program of operations
Purpose
Explain exactly which services will be provided, through which channels, to which customer segments, in which jurisdictions, and with which operational dependencies.
Owner
Management / legal / compliance
Document
Business plan and financial model
Purpose
Demonstrate commercial logic, prudential sustainability, forecast transaction volumes, revenue assumptions, cost base, and capital adequacy planning.
Owner
Finance / founders
Document
Fit and proper files for board and key persons
Purpose
Allow assessment of reputation, competence, independence, and role suitability of management and control-function holders.
Owner
HR / legal / individual appointees
Document
AML/CFT framework
Purpose
Show how the institution will identify, assess, monitor, escalate, and report ML/TF and sanctions risks.
Owner
Compliance / MLRO
Document
Safeguarding policy and funds-flow map
Purpose
Demonstrate how relevant client funds are identified, segregated, reconciled, and protected from misuse.
Owner
Finance / operations / compliance
Document
Risk management and internal control framework
Purpose
Evidence governance over operational, compliance, fraud, liquidity, outsourcing, and conduct risks.
Owner
Risk / management
Document
ICT architecture and security documentation
Purpose
Show system design, access controls, logging, incident handling, business continuity, vendor dependencies, and DORA-relevant governance.
Owner
CTO / security / operations
Document
Outsourcing register and provider oversight materials
Purpose
Identify critical and important outsourced functions, contractual controls, monitoring rights, and exit planning.
Owner
Operations / legal / vendor management
Document
Complaint handling and customer terms framework
Purpose
Evidence consumer-facing governance, complaint escalation, disclosures, and operational accountability.
Owner
Legal / operations / customer support
Step-by-step

Step-by-step process to obtain an EMI license in Poland

The licensing path starts with perimeter analysis, not incorporation. A company can be registered quickly in Poland, but a company registration is not a regulatory authorization. The real work is building a regulator-grade institution on paper and in operating design before KNF begins its substantive review.

1
Usually 1-2 weeks for a prepared project

Phase 1 — Regulatory scoping and feasibility

Confirm whether the model is genuinely EMI, a payment institution model, a small payment institution model, or a structure that also requires separate analysis for banking, lending, card acquiring, or crypto activities. This phase should map the product flow, customer journey, funds flow, redemption logic, outsourcing dependencies, and target jurisdictions. It is also the right moment to identify whether the project can support the EUR 350,000 initial capital benchmark and the governance depth expected from a full EMI.

2
Often 2-6+ weeks, depending on ownership complexity and document availability

Phase 2 — Company setup and governance build-out

Incorporate the Polish entity, complete KRS formalities, define the board structure, allocate key functions, and establish the operating footprint. Parallel work usually includes office arrangements, bank-account strategy, safeguarding-partner discussions, ownership-document collection, and the first draft of the governance map. A useful discipline here is role realism: KNF will notice if one person is nominally assigned to incompatible control and business functions without credible capacity.

3
Commonly 4-8+ weeks

Phase 3 — Drafting the application pack

Prepare the program of operations, business plan, financial model, AML/CFT framework, safeguarding policy, internal controls, complaint handling, outsourcing pack, and ICT documentation. This is where most delays are created or prevented. Generic templates usually fail because they do not match the actual product, transaction typologies, fraud vectors, or vendor stack. A mock regulator review before filing often saves significant time later.

4
Often several months; case-specific

Phase 4 — Filing and KNF review

After submission, KNF reviews completeness and substance. Follow-up questions are normal. The authority may ask for clarifications on shareholder transparency, source of funds, management experience, safeguarding mechanics, outsourcing control, financial assumptions, fraud prevention, or the institution’s ability to handle incidents and complaints. The speed of this phase depends heavily on how internally consistent the original dossier is and how quickly the applicant answers.

5
Launch readiness varies by product and vendor dependencies

Phase 5 — Operational readiness and post-license launch

Authorization is not the end of the project. Before launch, the institution must ensure that safeguarding accounts or equivalent arrangements are operational, AML monitoring is live, complaint handling works, incident escalation is tested, and outsourced providers are under documented oversight. If the business plans EEA expansion, passporting preparation should begin only after the home-state authorization basis is secure.

Capital and budget

How much an EMI license in Poland costs and how founders should budget

The cost of a Poland EMI project is a stack, not a single invoice. Founders should separate regulatory capital from setup and advisory costs, and both from ongoing operating compliance. The mandatory capital benchmark for a full EMI is EUR 350,000, but that amount does not cover legal drafting, AML tooling, local substance, audit, ICT security, or the cost of building a regulator-ready control environment.

The second budgeting error is to ignore timing costs. A delayed application means more months of payroll, office, compliance maintenance, and vendor retainers before revenue starts. In practice, weak preparation is often more expensive than strong preparation.

Cost Bucket Low Estimate High Estimate What Drives Cost
Initial capital At least EUR 350,000 Case-specific above the benchmark This is the prudential entry threshold for a full EMI, not a service fee. The institution must also maintain ongoing own funds after authorization.
Company setup and corporate documentation Varies Varies Includes incorporation, registry work, corporate drafting, foreign-document legalization or translation where needed, and governance documentation.
Legal and licensing advisory Varies materially by scope Varies materially by scope Depends on whether advisors only prepare forms or build the full licensing architecture, including perimeter analysis, policy drafting, and regulator Q&A support.
AML/CFT and sanctions tooling Varies Varies Often underestimated. Includes screening, monitoring, case management, onboarding workflows, and periodic tuning as transaction volumes grow.
ICT, security, and DORA readiness Varies Varies Can include logging, access management, incident response tooling, vendor due diligence, resilience testing, and security governance support.
Local substance and staffing Varies Varies Includes directors, compliance function, operations support, office costs, and the practical cost of having accountable people rather than nominee-only structures.
Audit, accounting, and ongoing reporting Varies Varies Post-license obligations continue annually. Related support may include accounting, statutory reporting, audit coordination, and regulator notifications. See also accounting services in Poland.
Cost Bucket
Initial capital
Low Estimate
At least EUR 350,000
High Estimate
Case-specific above the benchmark
What Drives Cost
This is the prudential entry threshold for a full EMI, not a service fee. The institution must also maintain ongoing own funds after authorization.
Cost Bucket
Company setup and corporate documentation
Low Estimate
Varies
High Estimate
Varies
What Drives Cost
Includes incorporation, registry work, corporate drafting, foreign-document legalization or translation where needed, and governance documentation.
Cost Bucket
Legal and licensing advisory
Low Estimate
Varies materially by scope
High Estimate
Varies materially by scope
What Drives Cost
Depends on whether advisors only prepare forms or build the full licensing architecture, including perimeter analysis, policy drafting, and regulator Q&A support.
Cost Bucket
AML/CFT and sanctions tooling
Low Estimate
Varies
High Estimate
Varies
What Drives Cost
Often underestimated. Includes screening, monitoring, case management, onboarding workflows, and periodic tuning as transaction volumes grow.
Cost Bucket
ICT, security, and DORA readiness
Low Estimate
Varies
High Estimate
Varies
What Drives Cost
Can include logging, access management, incident response tooling, vendor due diligence, resilience testing, and security governance support.
Cost Bucket
Local substance and staffing
Low Estimate
Varies
High Estimate
Varies
What Drives Cost
Includes directors, compliance function, operations support, office costs, and the practical cost of having accountable people rather than nominee-only structures.
Cost Bucket
Audit, accounting, and ongoing reporting
Low Estimate
Varies
High Estimate
Varies
What Drives Cost
Post-license obligations continue annually. Related support may include accounting, statutory reporting, audit coordination, and regulator notifications. See also accounting services in Poland.
The most common misconception is that the EMI budget equals the capital threshold. It does not. A realistic founder budget should model capital, pre-license build costs, ongoing compliance headcount, safeguarding operations, banking friction, and a delay buffer for regulator questions.
Client funds protection

Safeguarding requirements for client funds in a Poland EMI structure

Safeguarding is one of the most scrutinized parts of an EMI application because it protects customer funds from operational misuse and insolvency risk. The core principle is separation: relevant client funds must be identified and protected in a way that keeps them distinct from the institution’s own money. In practice, KNF will want to see not only a policy, but also the operational mechanics of how funds enter, where they sit, how they are reconciled, who approves movements, and how exceptions are escalated.

A strong safeguarding design usually includes a clear funds-flow map, a segregated account logic, reconciliation procedures, restricted access rights, and documented treatment of breaks, returns, chargebacks, and dormant balances. A weak design usually fails on timing: the applicant cannot explain when funds become relevant for safeguarding, how often reconciliation is performed, or how discrepancies are resolved before they become prudential problems.

Control Stack

Operational Controls That Must Exist Before Launch

Documented identification of which incoming funds are subject to safeguarding and at what point in the transaction lifecycle.
Segregation of relevant client funds from the institution’s own operational funds.
Reconciliation methodology aligned to actual transaction flows, ledger design, and settlement timing.
Restricted authorization matrix for movements involving safeguarded funds.
Exception management for breaks, unmatched items, returns, chargebacks, and failed settlements.
Operational evidence that safeguarded funds are not used for payroll, vendor payments, treasury, or proprietary purposes.
Board-level oversight and periodic review of safeguarding effectiveness.
Alignment between safeguarding records, accounting records, and customer ledger balances.
Operational resilience

ICT governance, DORA readiness, and outsourcing control

In 2026, an EMI application without a serious ICT governance section looks incomplete. Payment institutions and EMIs are operationally dependent on technology: onboarding, ledgering, fraud monitoring, customer authentication, API connectivity, sanctions screening, reconciliation, and complaint handling all sit inside the ICT control environment. Under DORA, the institution must show that technology risk is governed, not merely outsourced.

The practical test is control. If customer onboarding is handled by one vendor, ledgering by another, card processing by a third, and cloud infrastructure by a fourth, the EMI must still know who is responsible for access rights, incident classification, service continuity, data integrity, audit logs, and exit planning. Outsourcing does not outsource accountability.

A frequent supervisory concern is hidden critical outsourcing. If the applicant claims to run its own platform but core ledger logic, fraud rules, KYC orchestration, card processing, and customer communication are all vendor-controlled, KNF will focus on whether the institution can actually govern the service chain.

Area Control Owner
ICT governance Board-approved ICT risk framework, role allocation, reporting lines, and documented ownership of critical systems and controls. Board / CTO / risk
Access management Role-based access, privileged-access governance, joiner-mover-leaver controls, and periodic access recertification. IT / security
Incident management Classification, escalation, logging, root-cause analysis, remediation tracking, and regulator-notification decision logic where required. Security / operations / compliance
Business continuity and disaster recovery Recovery objectives, backup logic, failover planning, testing cadence, and dependency mapping for critical services. IT / operations
Outsourcing register Central inventory of outsourced functions, provider criticality, contractual rights, audit rights, concentration risk, and exit planning. Vendor management / legal / operations
Third-party ICT risk Due diligence, ongoing monitoring, SLA oversight, subcontracting visibility, and contingency measures for critical providers. CTO / procurement / risk
Security monitoring and logging Audit logs, anomaly monitoring, alert handling, evidence retention, and integrity controls around payment and customer-data systems. Security / IT
Data protection alignment Processor oversight, data-mapping, breach response coordination, and alignment between security controls and GDPR obligations. Security / legal / privacy
Area
ICT governance
Control
Board-approved ICT risk framework, role allocation, reporting lines, and documented ownership of critical systems and controls.
Owner
Board / CTO / risk
Area
Access management
Control
Role-based access, privileged-access governance, joiner-mover-leaver controls, and periodic access recertification.
Owner
IT / security
Area
Incident management
Control
Classification, escalation, logging, root-cause analysis, remediation tracking, and regulator-notification decision logic where required.
Owner
Security / operations / compliance
Area
Business continuity and disaster recovery
Control
Recovery objectives, backup logic, failover planning, testing cadence, and dependency mapping for critical services.
Owner
IT / operations
Area
Outsourcing register
Control
Central inventory of outsourced functions, provider criticality, contractual rights, audit rights, concentration risk, and exit planning.
Owner
Vendor management / legal / operations
Area
Third-party ICT risk
Control
Due diligence, ongoing monitoring, SLA oversight, subcontracting visibility, and contingency measures for critical providers.
Owner
CTO / procurement / risk
Area
Security monitoring and logging
Control
Audit logs, anomaly monitoring, alert handling, evidence retention, and integrity controls around payment and customer-data systems.
Owner
Security / IT
Area
Data protection alignment
Control
Processor oversight, data-mapping, breach response coordination, and alignment between security controls and GDPR obligations.
Owner
Security / legal / privacy
EU market access

EU passporting from Poland and cross-border expansion logic

A Poland EMI license can support cross-border activity across the EEA through the passporting framework, but passporting is a legal process, not a marketing slogan. The institution must first be authorized in its home state, then follow the relevant notification route for cross-border services or branch activity into host states. The scope passported must match the services actually covered by the home-state authorization.

Operationally, passporting works best when the institution already knows which countries it will target, whether it will operate through services or a branch, what customer-support languages are needed, how complaints will be handled, and whether local consumer-law or marketing rules require adaptation. Expansion planning should start during the licensing design phase, even though the formal passporting step comes later.

For founders comparing jurisdictions, Poland is often a better fit where the business wants a real CEE operating base rather than a license-only footprint. For a broader comparison, see EMI license in Lithuania and electronic money license in Europe.

Topic Details Risk Note
Home-state authorization first The institution must first obtain authorization in Poland from KNF before using the EEA passporting mechanism. A launch plan that assumes day-one multi-country activity before the authorization and notification sequence is complete is structurally weak.
Services vs branch model The passporting route differs depending on whether the EMI provides cross-border services directly or establishes a branch in another EEA state. The branch model may trigger more operational and governance complexity, including local staffing, complaints handling, and oversight expectations.
Scope matching Only services within the authorized perimeter can be passported. The passport does not expand the underlying license. If the product evolves after authorization, perimeter drift can create unauthorized activity risk in multiple jurisdictions at once.
Agent and distributor strategy Where the operating model uses agents or distributors, the institution must assess how those relationships fit the home-state and host-state framework. Poor control over third-party sales or onboarding channels can create AML, conduct, and complaints risk across borders.
Consumer and data governance Cross-border growth requires consistent complaint handling, disclosures, and data-protection controls across languages and jurisdictions. Passporting does not remove the need to adapt customer-facing operations to local legal and operational realities.
Topic
Home-state authorization first
Details
The institution must first obtain authorization in Poland from KNF before using the EEA passporting mechanism.
Risk Note
A launch plan that assumes day-one multi-country activity before the authorization and notification sequence is complete is structurally weak.
Topic
Services vs branch model
Details
The passporting route differs depending on whether the EMI provides cross-border services directly or establishes a branch in another EEA state.
Risk Note
The branch model may trigger more operational and governance complexity, including local staffing, complaints handling, and oversight expectations.
Topic
Scope matching
Details
Only services within the authorized perimeter can be passported. The passport does not expand the underlying license.
Risk Note
If the product evolves after authorization, perimeter drift can create unauthorized activity risk in multiple jurisdictions at once.
Topic
Agent and distributor strategy
Details
Where the operating model uses agents or distributors, the institution must assess how those relationships fit the home-state and host-state framework.
Risk Note
Poor control over third-party sales or onboarding channels can create AML, conduct, and complaints risk across borders.
Topic
Consumer and data governance
Details
Cross-border growth requires consistent complaint handling, disclosures, and data-protection controls across languages and jurisdictions.
Risk Note
Passporting does not remove the need to adapt customer-facing operations to local legal and operational realities.
Delay and refusal triggers

Common reasons KNF EMI applications get delayed or rejected

KNF delays are usually caused by credibility gaps, not by one missing attachment. The authority wants to see a controlled institution with transparent owners, competent management, coherent documents, workable safeguarding, and an operating model that can survive real-world fraud, complaints, incidents, and outsourcing failures.

The highest-risk applications are those where the documents are polished but the operating logic is weak. A generic AML policy, an unrealistic financial model, or an outsourced technology stack with no real oversight are not drafting issues. They are governance issues.

The product is described as EMI, but the funds flow does not clearly show issuance and redemption of electronic money.

High risk

Legal risk: Perimeter uncertainty can lead to prolonged review, requests for restructuring, or refusal if the activity is misclassified.

Mitigation: Prepare a transaction-by-transaction funds-flow map and legal analysis distinguishing e-money issuance from ordinary payment execution.

Ownership chain is opaque or the source of capital is weakly documented.

High risk

Legal risk: KNF may be unable to complete fit and proper and ownership assessment, creating a direct authorization risk.

Mitigation: Simplify the structure where possible and prepare complete UBO, control-chain, and source-of-funds evidence before filing.

Board members or key managers lack relevant payments, compliance, or operational experience.

High risk

Legal risk: Management suitability concerns can undermine confidence in the institution’s ability to operate safely after licensing.

Mitigation: Appoint credible managers with directly relevant experience and define role allocation clearly, including control functions.

Safeguarding is described at policy level only, without operational account logic or reconciliation ownership.

High risk

Legal risk: Client-funds protection is a core prudential issue; weak safeguarding design is a major supervisory red flag.

Mitigation: Build a detailed safeguarding architecture, including account structure, reconciliation cadence, exception handling, and management reporting.

AML/CFT framework is generic and not tailored to the actual customer base, geographies, channels, and transaction patterns.

High risk

Legal risk: The institution may appear unable to detect suspicious activity, sanctions exposure, mule behavior, or fraud-linked abuse.

Mitigation: Draft a risk-based AML framework tied to real product risks, onboarding logic, transaction typologies, and escalation workflows.

Critical technology is outsourced, but the applicant cannot evidence vendor oversight or DORA-aligned control.

High risk

Legal risk: The institution may fail to demonstrate operational resilience and accountability for critical outsourced functions.

Mitigation: Maintain an outsourcing register, critical-provider classification, audit rights, incident reporting logic, and tested contingency arrangements.

Financial projections assume fast growth but ignore compliance headcount, fraud losses, safeguarding friction, and vendor costs.

Medium risk

Legal risk: KNF may treat the model as commercially unrealistic and prudentially unreliable.

Mitigation: Use conservative scenarios, stress assumptions, and cost lines that reflect actual regulated operations.

Strategic structuring

Build a new EMI application or use another market-entry route

The right route depends on the business model, timeline, investor expectations, and control appetite. Some founders need a full new EMI application because the product, governance, and ownership structure are bespoke. Others may first validate the market through partnership, agency, or a narrower payment perimeter before committing to a full EMI build. The wrong sequencing can waste both capital and regulatory goodwill.

This is also where Poland should be assessed honestly against other EU jurisdictions. If the business needs a real operating base, Polish market presence, and CEE expansion, Poland can be a strong fit. If the model is lighter or the product does not require e-money, another route may be more efficient.

Option Advantages Limitations Best For
Build a new Polish EMI Full control over the license perimeter, governance design, product architecture, and future passporting strategy. Best alignment where e-money issuance is central to the product. Heavier preparation burden, EUR 350,000 capital benchmark, longer build timeline, and substantial post-license compliance obligations. Wallets, stored-value products, prepaid ecosystems, and serious fintech operators building a long-term regulated presence in Poland or CEE.
Start with a narrower payment structure May reduce regulatory complexity if the product does not actually require e-money issuance from day one. Can constrain product design, stored-value functionality, and future expansion if the model later evolves into true e-money issuance. Founders validating transaction-execution models before scaling into a full EMI structure.
Use a partner or program model before own license Faster market testing, lower initial regulatory build burden, and practical evidence for later licensing. Less control over economics, safeguarding setup, onboarding rules, branding, and product roadmap; partner dependency can become strategic risk. Early-stage teams that need proof of demand before funding a full authorization project.
Option
Build a new Polish EMI
Advantages
Full control over the license perimeter, governance design, product architecture, and future passporting strategy. Best alignment where e-money issuance is central to the product.
Limitations
Heavier preparation burden, EUR 350,000 capital benchmark, longer build timeline, and substantial post-license compliance obligations.
Best For
Wallets, stored-value products, prepaid ecosystems, and serious fintech operators building a long-term regulated presence in Poland or CEE.
Option
Start with a narrower payment structure
Advantages
May reduce regulatory complexity if the product does not actually require e-money issuance from day one.
Limitations
Can constrain product design, stored-value functionality, and future expansion if the model later evolves into true e-money issuance.
Best For
Founders validating transaction-execution models before scaling into a full EMI structure.
Option
Use a partner or program model before own license
Advantages
Faster market testing, lower initial regulatory build burden, and practical evidence for later licensing.
Limitations
Less control over economics, safeguarding setup, onboarding rules, branding, and product roadmap; partner dependency can become strategic risk.
Best For
Early-stage teams that need proof of demand before funding a full authorization project.
FAQ

FAQ about EMI license in Poland

These answers address the most common founder and investor questions about a Poland EMI project in 2026. Each answer is intentionally short and perimeter-focused.

What is an EMI license in Poland? +

A Poland EMI license authorizes a legal entity to act as an Electronic Money Institution under the Polish Payment Services Act and the EU EMD2/PSD2 framework. The core right is to issue electronic money and provide permitted payment services within the authorized scope. It is not a banking license and it is not a generic fintech registration.

Who regulates an EMI in Poland? +

The main licensing authority is KNF, the Polish Financial Supervision Authority. Depending on the issue, an EMI may also interact with KRS for corporate registration, GIIF for AML/CFT matters, UODO for data protection, and other institutions involved in operational banking and safeguarding arrangements.

What is the minimum capital for an EMI in Poland? +

For a full EMI, the benchmark initial capital under the EU framework is EUR 350,000. Founders should not confuse this with the total project budget. The institution must also maintain ongoing own funds and fund the real operating build: governance, AML, ICT, safeguarding, audit, and local substance.

Is an EMI the same as a payment institution in Poland? +

No. A payment institution can provide payment services, but it does not automatically have the right to issue electronic money. EMI status is used where the product includes stored value or wallet functionality that qualifies as e-money. This distinction is central to choosing the correct Polish license perimeter.

Is EMI the same as a crypto license in Poland? +

No. An EMI authorization and a crypto/CASP authorization are different regulatory regimes. Some business models touch both payments and crypto, but that does not merge the legal analysis. If the product includes crypto-asset services, the project should also be assessed against MiCA and related rules. See CASP license and MiCA in Poland.

Can a foreign founder obtain an EMI license in Poland? +

Yes, foreign founders can structure a Poland EMI project, but the authorization is granted to a Polish legal entity, not to an individual. KNF will still expect transparent ownership, fit and proper management, lawful source of funds, and real operational substance. A fully remote, no-substance structure is a weak starting point for a full EMI.

How long does it take to get an EMI license in Poland? +

There is no reliable one-size-fits-all deadline. A prepared project may spend 6-12+ weeks on structuring and dossier preparation, while KNF review commonly takes several months and may involve multiple rounds of questions. Any promise of a full EMI authorization in just a few weeks should be treated cautiously.

Does a Poland EMI license allow EU passporting? +

Yes, an authorized Polish EMI can use the EEA passporting framework for covered services, but only after the proper notification process. Passporting is not automatic on day one and does not expand the underlying license scope. The institution must distinguish between cross-border services and branch-based expansion.

What documents are most important in the application pack? +

The most important documents are the program of operations, business plan, financial model, ownership and UBO pack, fit and proper files, AML/CFT framework, safeguarding policy, outsourcing documentation, and ICT governance materials. KNF usually focuses on whether these documents are internally consistent and tailored to the actual operating model.

What do founders most often underestimate in a Poland EMI project? +

Three items are underestimated most often: safeguarding mechanics, management suitability, and ICT governance under DORA. Many teams also underestimate how much scrutiny KNF gives to ownership transparency and to the difference between a consultant template and a genuinely operational control framework.

Need a Practical Readout?

Need a realistic view on a Poland EMI project?

A credible EMI strategy starts with perimeter analysis, not with filing forms. If you are assessing whether your model needs a full EMI, a narrower payment institution route, or a different EU jurisdiction, start with a structured feasibility review tied to KNF expectations, capital logic, safeguarding, and DORA-era operating requirements.

Phone +372 56 966 260 Email info@rue.ee Hours Mon-Fri, 9:00-18:00 CET
Confidential - No obligation - Response within 24 hours