PI License in the UK (2025): FCA Payment Institution Authorisation Explained

If by “PI licence” you mean a Payment Institution licence, the relevant UK regulator is the Financial Conduct Authority, and the core legal framework is the Payment Services Regulations 2017. This guide does not cover private investigator licensing. It explains when a UK fintech needs API authorisation, SPI registration, an EMI licence, or a different model such as acting as an agent or remaining outside the payment services perimeter.

If by “PI licence” you mean a Payment Institution licence, the relevant UK regulator is the Financial Conduct Authority, and the core legal framework is the Payment Services Regulations 2017. This guide does not cover private investigator licensing. Read more Hide It explains when a UK fintech needs API authorisation, SPI registration, an EMI licence, or a different model such as acting as an agent or remaining outside the payment services perimeter.

This page is a general information resource for 2026 and is not legal, tax, accounting or regulatory advice. UK payments regulation changes over time, and any filing should be checked against current FCA forms, guidance and legislation before submission.

Disclaimer This page is a general information resource for 2026 and is not legal, tax, accounting or regulatory advice. UK payments regulation changes over time, and any filing should be checked against current FCA forms, guidance and legislation before submission.
PI means two different things in the UK

EMI Snapshot

Core authorization thresholds, timeline reality and the practical review lens in one block.

At a Glance

Meaning of “PI licence”
In UK search results, “PI” can mean Payment Institution or Private Investigator. This page covers only FCA-regulated payment services authorisation.
Main regulator
The FCA authorises and supervises Payment Institutions under the Payment Services Regulations 2017. Other authorities can also matter, including Companies House, the ICO, and, where relevant, AML-related bodies and guidance sources such as JMLSG.
Core route choices
A UK payments business usually needs to determine whether it fits Authorised Payment Institution (API), Small Payment Institution (SPI), Electronic Money Institution (EMI), AISP/PISP, or no licence because it is only a technical service provider or agent.
Main approval themes
The FCA focuses heavily on regulatory perimeter analysis, governance, safeguarding, financial resources, AML controls, outsourcing oversight and whether the business model is described with enough operational detail to supervise it.

Mini Timeline

Stage 1
Perimeter and model analysis

Define whether the firm is executing payment transactions, issuing e-money, providing PIS or AIS, or only supplying software or infrastructure.

Stage 2
Build the application pack

Prepare the programme of operations, business plan, governance map, safeguarding framework, AML documentation, financial forecasts and outsourcing materials.

Stage 3
FCA review and follow-up questions

Real-world timing depends heavily on whether the file is complete and whether the business model is internally consistent across legal, financial and operational documents.

Quick Assessment

  • You likely need a UK PI analysis if your firm receives, controls, transmits or executes customer payment flows rather than only providing software.
  • You may need an EMI, not a PI, if you issue stored monetary value or operate a wallet structure where customer value is represented as e-money.
  • You may avoid direct authorisation if you operate as an agent of an authorised firm, but the structure must be genuine and documented.
  • Cross-border scaling after Brexit requires separate analysis because UK authorisation does not itself create EEA passporting rights.
Request an API vs SPI eligibility review
What a Payment Institution can and cannot do

What is a Payment Institution licence in the UK?

A UK Payment Institution licence is FCA authorisation or registration allowing a non-bank firm to provide specified payment services under the Payment Services Regulations 2017. In plain terms, the regime applies where a firm does more than sell software and is actually involved in regulated payment execution, remittance, payment initiation, acquiring or related payment account activity.

The legal question is not whether your product looks like fintech. The legal question is whether your firm performs a regulated payment service in its own right, controls the payment flow, or holds itself out to merchants or users as the provider of that regulated service. That is why two businesses with similar front-end apps can fall into different regulatory outcomes.

Schedule 1 to the PSRs 2017 is the starting point. Typical regulated categories include placing cash on a payment account, cash withdrawals, executing payment transactions including credit transfers and direct debits, issuing payment instruments or acquiring payment transactions, money remittance, payment initiation services, and account information services. A pure technical processor may stay outside the perimeter, but a platform that receives or controls settlement instructions often does not.

Can Do

Permitted Activities

  • Provide regulated payment services covered by the firm’s FCA permissions, such as money remittance, execution of payment transactions, merchant acquiring support, PIS or AIS, depending on the route obtained.
  • Appoint agents where the legal structure and FCA requirements permit, subject to oversight, due diligence and ongoing control by the principal.
  • Operate with safeguarding, AML, governance and reporting systems proportionate to the scale and risk of the business model.
  • Use outsourced technology, cloud providers and payment processors if the firm retains effective oversight, contractual control and operational resilience.
Cannot Do

Out-of-Scope Activities

  • Issue e-money merely because the business handles payments. If the model involves stored monetary value or e-wallet issuance, an EMI analysis is required instead of assuming PI status.
  • Take deposits like a bank. A PI is not a deposit-taking institution and does not become a bank by adding payment accounts or cards.
  • Assume that being a software platform, marketplace or crypto-related app automatically avoids regulation. Funds flow and legal responsibility matter more than product labels.
  • Rely on an exclusion or agent model without fact-specific legal analysis. Misclassification is one of the most common causes of delay and enforcement risk.
Choose the right FCA route before filing

API vs SPI vs EMI vs AISP/PISP: which UK authorisation fits your business?

The right route depends on what service you provide, whether you hold or control customer funds, whether you issue e-money, and the scale of the business. An Authorised Payment Institution is the full PI route. A Small Payment Institution is a lighter regime with threshold-based limits and narrower utility. An Electronic Money Institution is different because it covers the issuance of e-money, not just payment execution. AISP and PISP models can also require their own analysis, especially in open banking structures.

A practical rule is simple: if your firm stores customer value for later spending, wallet use or redemption, test for EMI. If your firm only initiates or executes payments without issuing stored monetary value, test for PI. If your firm only accesses account data with consent, test for AISP. If your firm only builds technical rails for a licensed provider and never becomes the regulated provider itself, you may be outside the authorisation perimeter.

Parameter PI EMI Specialized Bank
Core legal function Provides regulated payment services under the PSRs 2017. Issues electronic money and may also provide payment services under the EMRs 2011 and related rules. Takes deposits and operates under a banking regime, not the PI/EMI perimeter.
Typical business models Remittance, merchant payment execution, acquiring-related flows, payment accounts, PIS, AIS, settlement orchestration where the firm is the regulated provider. Stored-value wallet, prepaid product, app balance, customer funds represented as redeemable e-money, multi-merchant wallet structures. Deposit accounts, lending funded by deposits, broader prudential banking activity.
Customer funds question May receive or transmit funds for payment services and must analyse safeguarding of relevant funds where applicable. Customer funds linked to issued e-money create a different safeguarding and redemption analysis. Deposit regime applies rather than PI/EMI safeguarding.
Route variants API, SPI, PISP, AISP depending on the model and scale. Authorised or small EMI analysis may be relevant depending on the structure. Separate banking authorisation route.
When founders choose it Where the product is a payments business but not an e-money issuer. Where the product needs wallet functionality or stored monetary value. Rare for early-stage fintechs due to materially heavier prudential and organisational burden.
Common misclassification Calling a wallet or app balance a payment flow when it is legally e-money issuance. Assuming every payment flow needs EMI status even where no e-money is issued. Assuming a PI or EMI can market itself as a bank-equivalent institution.
Parameter
Core legal function
PI
Provides regulated payment services under the PSRs 2017.
EMI
Issues electronic money and may also provide payment services under the EMRs 2011 and related rules.
Specialized Bank
Takes deposits and operates under a banking regime, not the PI/EMI perimeter.
Parameter
Typical business models
PI
Remittance, merchant payment execution, acquiring-related flows, payment accounts, PIS, AIS, settlement orchestration where the firm is the regulated provider.
EMI
Stored-value wallet, prepaid product, app balance, customer funds represented as redeemable e-money, multi-merchant wallet structures.
Specialized Bank
Deposit accounts, lending funded by deposits, broader prudential banking activity.
Parameter
Customer funds question
PI
May receive or transmit funds for payment services and must analyse safeguarding of relevant funds where applicable.
EMI
Customer funds linked to issued e-money create a different safeguarding and redemption analysis.
Specialized Bank
Deposit regime applies rather than PI/EMI safeguarding.
Parameter
Route variants
PI
API, SPI, PISP, AISP depending on the model and scale.
EMI
Authorised or small EMI analysis may be relevant depending on the structure.
Specialized Bank
Separate banking authorisation route.
Parameter
When founders choose it
PI
Where the product is a payments business but not an e-money issuer.
EMI
Where the product needs wallet functionality or stored monetary value.
Specialized Bank
Rare for early-stage fintechs due to materially heavier prudential and organisational burden.
Parameter
Common misclassification
PI
Calling a wallet or app balance a payment flow when it is legally e-money issuance.
EMI
Assuming every payment flow needs EMI status even where no e-money is issued.
Specialized Bank
Assuming a PI or EMI can market itself as a bank-equivalent institution.
PSRs 2017, FSMA, EMRs and AML rules

FCA framework and legal basis for a PI licence in the UK

The current UK PI regime is built primarily on the Payment Services Regulations 2017. The wider compliance stack also includes the Financial Services and Markets Act 2000 for broader regulatory architecture and enforcement context, the Electronic Money Regulations 2011 where e-money is relevant, the Money Laundering, Terrorist Financing and Transfer of Funds Regulations 2017, the Data Protection Act 2018 and UK GDPR. For crime prevention and source-of-funds controls, firms also work within the practical expectations shaped by POCA 2002, the Terrorism Act 2000 and sector guidance such as JMLSG.

The FCA is the main authorising and supervising authority for Payment Institutions. Companies House matters because the applicant will normally need an appropriate UK corporate vehicle and transparent ownership record. The ICO matters because payments businesses process personal data, transaction data and often special categories of financial profile data. The Financial Ombudsman Service and complaints-handling framework may also be relevant depending on the firm’s activities and customer base. A useful nuance often missed by generic content is that FSCS protection does not generally apply to safeguarded PI customer funds in the same way it applies to bank deposits, so firms must describe safeguarding accurately and not market it as deposit protection.

Post-Brexit, UK authorisation is a domestic regime. A UK PI licence does not by itself recreate former EEA passporting rights, so cross-border servicing into the EEA requires separate local analysis.

Framework Why It Matters Operational Impact
Payment Services Regulations 2017 This is the core legal basis for UK Payment Institutions, payment service definitions, authorisation categories, conduct rules and safeguarding obligations. The firm must map each revenue stream and funds flow to a specific regulated service or exclusion before filing.
Financial Services and Markets Act 2000 FSMA provides the broader UK financial services architecture, supervisory powers and enforcement context around regulated firms. Governance, controllers, systems and controls, and senior accountability must be built to withstand FCA scrutiny, not just complete a form.
Electronic Money Regulations 2011 These rules become central if the product issues e-money rather than only executing payments. Wallets, stored value products and app balances must be tested carefully to avoid filing for the wrong regime.
MLRs 2017 and JMLSG guidance Payment businesses are exposed to money laundering, sanctions and fraud risk, especially in remittance, merchant onboarding and cross-border flows. The firm needs customer due diligence, transaction monitoring, screening, suspicious activity escalation and documented AML governance.
Data Protection Act 2018 and UK GDPR Payments firms process sensitive personal and transactional data, often across multiple processors and cloud environments. The firm needs data mapping, lawful basis analysis, retention controls, processor agreements, breach response and privacy governance.
Framework
Payment Services Regulations 2017
Why It Matters
This is the core legal basis for UK Payment Institutions, payment service definitions, authorisation categories, conduct rules and safeguarding obligations.
Operational Impact
The firm must map each revenue stream and funds flow to a specific regulated service or exclusion before filing.
Framework
Financial Services and Markets Act 2000
Why It Matters
FSMA provides the broader UK financial services architecture, supervisory powers and enforcement context around regulated firms.
Operational Impact
Governance, controllers, systems and controls, and senior accountability must be built to withstand FCA scrutiny, not just complete a form.
Framework
Electronic Money Regulations 2011
Why It Matters
These rules become central if the product issues e-money rather than only executing payments.
Operational Impact
Wallets, stored value products and app balances must be tested carefully to avoid filing for the wrong regime.
Framework
MLRs 2017 and JMLSG guidance
Why It Matters
Payment businesses are exposed to money laundering, sanctions and fraud risk, especially in remittance, merchant onboarding and cross-border flows.
Operational Impact
The firm needs customer due diligence, transaction monitoring, screening, suspicious activity escalation and documented AML governance.
Framework
Data Protection Act 2018 and UK GDPR
Why It Matters
Payments firms process sensitive personal and transactional data, often across multiple processors and cloud environments.
Operational Impact
The firm needs data mapping, lawful basis analysis, retention controls, processor agreements, breach response and privacy governance.
Substance, governance and fit-and-proper standards

Eligibility, substance and fit-and-proper expectations

The FCA does not assess a PI application as a paperwork exercise. It assesses whether the applicant is a real, governable and financially credible business capable of delivering regulated payment services in compliance with law. That means the application must show substance in management, risk ownership, safeguarding design, AML controls, complaint handling, outsourcing oversight and financial planning.

Founders often underestimate how much the FCA tests internal consistency. If the business plan says the firm will onboard merchants in multiple sectors, the AML risk assessment must reflect those sectors. If the financial model assumes rapid volume growth, the safeguarding and operational staffing model must scale with it. If a critical processor or cloud provider is outsourced, the governance framework must show who monitors incidents, service levels, concentration risk and exit planning.

Foreign-owned groups can obtain UK authorisation, but the FCA will still expect credible UK governance, decision-making substance and effective supervisory access to records, systems and responsible individuals.

Area Regulatory Expectation Evidence Pack
Corporate presence and ownership The applicant should have a clear legal vehicle, transparent beneficial ownership and an ownership structure the FCA can understand and assess. Companies House records, group chart, shareholder information, controller disclosures and source-of-funds support where required.
Business model clarity The firm must define exactly which payment services it will provide, to whom, through what funds flow, and under what contractual chain. Programme of operations, customer journey maps, merchant or user terms, funds flow diagrams and service descriptions.
Governance and management time commitment Directors and senior managers must be competent, available and able to explain the business and its controls in detail. CVs, role descriptions, governance map, committee structure, reporting lines and evidence of relevant sector experience.
Financial resilience The applicant must show realistic forecasts, capital planning and a credible path to operating within prudential expectations. Integrated financial model, assumptions paper, stress scenarios, liquidity planning and funding evidence.
Compliance operating model AML, complaints, safeguarding, incident management and outsourcing oversight must exist as operating processes, not only policy text. Policies, procedures, control logs, MI examples, sample reconciliations, escalation routes and outsourced service oversight framework.
Fit and proper assessment Controllers, directors and key persons are assessed for honesty, integrity, reputation, competence and financial soundness. Personal questionnaires, background information, references where relevant, regulatory history and explanation of any adverse matters.
Area
Corporate presence and ownership
Regulatory Expectation
The applicant should have a clear legal vehicle, transparent beneficial ownership and an ownership structure the FCA can understand and assess.
Evidence Pack
Companies House records, group chart, shareholder information, controller disclosures and source-of-funds support where required.
Area
Business model clarity
Regulatory Expectation
The firm must define exactly which payment services it will provide, to whom, through what funds flow, and under what contractual chain.
Evidence Pack
Programme of operations, customer journey maps, merchant or user terms, funds flow diagrams and service descriptions.
Area
Governance and management time commitment
Regulatory Expectation
Directors and senior managers must be competent, available and able to explain the business and its controls in detail.
Evidence Pack
CVs, role descriptions, governance map, committee structure, reporting lines and evidence of relevant sector experience.
Area
Financial resilience
Regulatory Expectation
The applicant must show realistic forecasts, capital planning and a credible path to operating within prudential expectations.
Evidence Pack
Integrated financial model, assumptions paper, stress scenarios, liquidity planning and funding evidence.
Area
Compliance operating model
Regulatory Expectation
AML, complaints, safeguarding, incident management and outsourcing oversight must exist as operating processes, not only policy text.
Evidence Pack
Policies, procedures, control logs, MI examples, sample reconciliations, escalation routes and outsourced service oversight framework.
Area
Fit and proper assessment
Regulatory Expectation
Controllers, directors and key persons are assessed for honesty, integrity, reputation, competence and financial soundness.
Evidence Pack
Personal questionnaires, background information, references where relevant, regulatory history and explanation of any adverse matters.
What the FCA expects to see in the file

Documents and policies the FCA will expect

A strong PI application package is document-heavy because the FCA needs to understand not only the legal perimeter but the operating model behind it. The exact set varies by route, but a credible file usually contains a programme of operations, business plan, detailed financial forecasts, governance materials, safeguarding methodology, AML framework, complaints process, outsourcing documentation and information on controllers and key individuals.

A practical nuance is that the FCA reads these documents together. A weak application often fails not because one document is missing, but because the same business is described differently across the programme of operations, contracts, financial model and AML risk assessment.

Document Purpose Owner
Programme of operations Defines the regulated services, customer types, jurisdictions, transaction flows, channels, counterparties and operational model. Legal and regulatory lead
Business plan Explains the commercial rationale, target market, product scope, distribution model, outsourcing structure and growth assumptions. Founders and strategy lead
Financial forecasts Shows projected volumes, revenues, costs, capital adequacy, liquidity assumptions and downside scenarios, usually across a multi-period horizon. Finance lead
Safeguarding policy and methodology Explains how relevant funds are identified, segregated or otherwise protected, reconciled and monitored. Finance and compliance
AML/CTF framework Sets out customer due diligence, sanctions screening, transaction monitoring, suspicious activity escalation and governance under the MLRs 2017. MLRO and compliance
Risk management framework Maps operational, fraud, financial crime, conduct, technology and third-party risks with ownership and escalation paths. Risk and compliance
Outsourcing and third-party oversight pack Identifies critical suppliers, contractual controls, SLAs, incident response, concentration risk and exit planning. Operations and legal
Governance map and key person pack Shows board structure, responsibilities, reporting lines and fit-and-proper information for directors, controllers and senior managers. Company secretary and legal
Wind-down plan Explains how the firm would cease regulated activity in an orderly way without harming customers or losing control of safeguarded funds and records. Board and compliance
Document
Programme of operations
Purpose
Defines the regulated services, customer types, jurisdictions, transaction flows, channels, counterparties and operational model.
Owner
Legal and regulatory lead
Document
Business plan
Purpose
Explains the commercial rationale, target market, product scope, distribution model, outsourcing structure and growth assumptions.
Owner
Founders and strategy lead
Document
Financial forecasts
Purpose
Shows projected volumes, revenues, costs, capital adequacy, liquidity assumptions and downside scenarios, usually across a multi-period horizon.
Owner
Finance lead
Document
Safeguarding policy and methodology
Purpose
Explains how relevant funds are identified, segregated or otherwise protected, reconciled and monitored.
Owner
Finance and compliance
Document
AML/CTF framework
Purpose
Sets out customer due diligence, sanctions screening, transaction monitoring, suspicious activity escalation and governance under the MLRs 2017.
Owner
MLRO and compliance
Document
Risk management framework
Purpose
Maps operational, fraud, financial crime, conduct, technology and third-party risks with ownership and escalation paths.
Owner
Risk and compliance
Document
Outsourcing and third-party oversight pack
Purpose
Identifies critical suppliers, contractual controls, SLAs, incident response, concentration risk and exit planning.
Owner
Operations and legal
Document
Governance map and key person pack
Purpose
Shows board structure, responsibilities, reporting lines and fit-and-proper information for directors, controllers and senior managers.
Owner
Company secretary and legal
Document
Wind-down plan
Purpose
Explains how the firm would cease regulated activity in an orderly way without harming customers or losing control of safeguarded funds and records.
Owner
Board and compliance
From perimeter analysis to FCA decision

How to apply for a PI licence in the UK

The correct sequence is perimeter analysis first, document build second, filing third. A firm that files before it has resolved whether it is a PI, EMI, SPI, AISP, PISP, agent or unregulated technology provider usually loses time answering avoidable FCA questions.

1
Early scoping phase

1. Define the regulatory perimeter

Map the exact customer journey, settlement chain, contractual roles and funds flow. Decide whether the firm is providing a regulated payment service, issuing e-money, acting as an agent, or remaining outside the perimeter as a technical service provider. This is the stage where marketplace, wallet, remittance and open banking models most often diverge.

2
Before submission

2. Form the UK applicant and governance structure

Set up the legal entity, ownership records and board structure, then identify controllers, directors and key function holders. Governance must reflect actual decision-making, not only a nominal UK presence.

3
Document build phase

3. Build the application pack

Prepare the programme of operations, business plan, financial forecasts, safeguarding design, AML framework, risk controls, outsourcing materials and key person documentation. The pack should explain the same business model consistently from legal, operational and financial angles.

4
Formal filing stage

4. Submit through the FCA process

Complete the relevant FCA application route and provide supporting materials. The statutory review clock only becomes meaningful when the application is treated as complete, so submission quality matters as much as timing.

5
Review and clarification stage

5. Respond to FCA queries

Expect follow-up questions on perimeter analysis, safeguarding, AML controls, outsourcing, governance capacity, financial assumptions and customer terms. The FCA often tests whether the applicant truly understands its own product and risk profile.

6
Pre-launch readiness

6. Prepare for live operations

Authorisation is not the end of the project. Before launch, the firm should finalise safeguarding accounts or equivalent arrangements, reporting workflows, incident escalation, complaints handling, AML operations, training and board MI.

Regulatory fees, build costs and hidden spend

Cost of getting a PI licence in the UK

The cost stack is wider than the FCA application fee. A realistic budget should include regulatory filing costs, legal and compliance drafting, financial model preparation, company setup, banking and safeguarding implementation, technology controls, possible audit support, insurance and post-authorisation operating spend. The total cost varies materially with complexity, number of jurisdictions, use of agents, outsourcing intensity and whether the business is PI or should actually be EMI.

The hidden cost driver is rework. A weak perimeter analysis can force a redesign of contracts, funds flow, forecasts and safeguarding architecture after submission, which is usually more expensive than doing the scoping properly at the start.

Cost Bucket Low Estimate High Estimate What Drives Cost
FCA fees Varies by route Varies by route Use current FCA fee tables at the time of filing. Do not rely on old web content or third-party summaries.
Legal and regulatory advisory Mid four figures High five figures or more Depends on whether the adviser is only reviewing forms or building the perimeter analysis, application pack and FCA response strategy.
Policies, controls and compliance build-out Low four figures Mid five figures Cost rises where AML, safeguarding, outsourcing and incident management frameworks must be built from scratch.
Finance, forecasting and prudential support Low four figures Mid five figures Integrated financial models are often underbudgeted, especially where transaction-volume assumptions drive capital and safeguarding operations.
Banking, safeguarding and operational setup Varies significantly Varies significantly Opening safeguarding arrangements, merchant relationships and operational banking can be difficult for early-stage or higher-risk models.
Technology, security and vendor assurance Varies significantly Varies significantly Cloud controls, access management, PCI DSS exposure, transaction monitoring tooling and incident response maturity can add substantial cost.
Cost Bucket
FCA fees
Low Estimate
Varies by route
High Estimate
Varies by route
What Drives Cost
Use current FCA fee tables at the time of filing. Do not rely on old web content or third-party summaries.
Cost Bucket
Legal and regulatory advisory
Low Estimate
Mid four figures
High Estimate
High five figures or more
What Drives Cost
Depends on whether the adviser is only reviewing forms or building the perimeter analysis, application pack and FCA response strategy.
Cost Bucket
Policies, controls and compliance build-out
Low Estimate
Low four figures
High Estimate
Mid five figures
What Drives Cost
Cost rises where AML, safeguarding, outsourcing and incident management frameworks must be built from scratch.
Cost Bucket
Finance, forecasting and prudential support
Low Estimate
Low four figures
High Estimate
Mid five figures
What Drives Cost
Integrated financial models are often underbudgeted, especially where transaction-volume assumptions drive capital and safeguarding operations.
Cost Bucket
Banking, safeguarding and operational setup
Low Estimate
Varies significantly
High Estimate
Varies significantly
What Drives Cost
Opening safeguarding arrangements, merchant relationships and operational banking can be difficult for early-stage or higher-risk models.
Cost Bucket
Technology, security and vendor assurance
Low Estimate
Varies significantly
High Estimate
Varies significantly
What Drives Cost
Cloud controls, access management, PCI DSS exposure, transaction monitoring tooling and incident response maturity can add substantial cost.
The main misconception is that a PI licence is a form-filling exercise with a fixed price. In practice, cost is driven by how much regulatory substance the business already has and whether the chosen route is correct.
Relevant funds protection is a core approval issue

Capital, safeguarding and prudential requirements

Safeguarding is one of the central approval issues for UK Payment Institutions because it directly affects customer protection if the firm fails. The FCA expects the firm to identify relevant funds, protect them in line with the applicable safeguarding method, maintain clear records, perform reconciliations and ensure the operating model works in real life, not only on paper. A recurring weakness in poor applications is that the safeguarding policy describes segregation in theory but does not explain ledger logic, exception handling, timing mismatches or who owns the daily control.

Capital analysis also has two layers: initial capital and ongoing own funds. Founders often focus only on the entry threshold and ignore the continuing prudential requirement. The exact amount depends on the service type and route, and figures must be checked against the current legislation and FCA materials at the time of filing. The important legal point is that initial capital is not the same as the ongoing own-funds methodology, and the FCA expects the applicant to understand both.

A further nuance is insolvency messaging. Safeguarding is designed to protect relevant funds, but it is not the same thing as deposit protection. Customer terms, website copy and complaints scripts should not imply that PI-held safeguarded funds are protected like a bank deposit under the FSCS.

Control Stack

Operational Controls That Must Exist Before Launch

Document exactly when funds become relevant funds for safeguarding purposes and when they leave that status.
Maintain a safeguarding method that matches the actual funds flow, not an idealised future-state process.
Use clear ledger tagging so safeguarded funds can be identified at customer and aggregate level.
Perform reconciliations with documented review, escalation and break-resolution procedures.
Ensure safeguarding accounts or alternative protection arrangements are legally and operationally workable before go-live.
Align safeguarding operations with finance, treasury, complaints, insolvency planning and outsourced processor reporting.
Explain how refunds, chargebacks, failed payments, suspense items and cut-off timing are treated.
Operational resilience, cloud and third-party control

AML, KYC, data protection, ICT and outsourcing controls

A UK PI application is also an operating model review. The FCA expects the firm to show how customer onboarding, sanctions screening, transaction monitoring, fraud controls, complaints handling, data protection and third-party oversight will work in production. Even where a provider outsources onboarding, cloud hosting, card processing, transaction monitoring or customer support, the regulated firm remains accountable for the outsourced function.

DORA is an EU framework rather than a UK domestic PI regime, so it is not the direct legal basis for a UK Payment Institution application. But DORA has influenced market expectations around ICT governance, incident handling, testing and third-party risk. For UK firms, the practical focus remains FCA expectations on operational resilience, systems and controls, cyber hygiene, outsourcing governance and the ability to continue critical services during disruption.

A common failure point is assuming that outsourcing compliance operations reduces regulatory responsibility. It does not. The principal firm must still evidence oversight, challenge and decision-making.

Area Control Owner
AML and KYC Implement customer due diligence, enhanced due diligence where risk requires it, sanctions and PEP screening, ongoing monitoring and suspicious activity escalation aligned to the MLRs 2017 and the firm’s risk assessment. MLRO and compliance
Transaction monitoring Use rules, scenarios or hybrid monitoring calibrated to the actual product. Generic off-the-shelf settings are rarely enough for remittance, marketplace or merchant-acquiring style flows. MLRO, fraud and operations
Data protection Map personal data flows, define lawful bases, manage processor relationships, retention, international transfers and incident response under the DPA 2018 and UK GDPR. Data protection lead and legal
Cloud and ICT resilience Maintain access control, logging, change management, backup and recovery, vulnerability management and incident escalation for critical systems supporting payments and safeguarding. CTO and security lead
Outsourcing governance Classify critical providers, maintain an outsourcing register, negotiate audit and information rights, monitor performance and plan exit or substitution for critical services. Operations, legal and board
Key persons and accountability Assign clear ownership for AML, complaints, safeguarding, finance, ICT incidents and third-party oversight. Role clarity matters more than long policy text. Board and senior management
Area
AML and KYC
Control
Implement customer due diligence, enhanced due diligence where risk requires it, sanctions and PEP screening, ongoing monitoring and suspicious activity escalation aligned to the MLRs 2017 and the firm’s risk assessment.
Owner
MLRO and compliance
Area
Transaction monitoring
Control
Use rules, scenarios or hybrid monitoring calibrated to the actual product. Generic off-the-shelf settings are rarely enough for remittance, marketplace or merchant-acquiring style flows.
Owner
MLRO, fraud and operations
Area
Data protection
Control
Map personal data flows, define lawful bases, manage processor relationships, retention, international transfers and incident response under the DPA 2018 and UK GDPR.
Owner
Data protection lead and legal
Area
Cloud and ICT resilience
Control
Maintain access control, logging, change management, backup and recovery, vulnerability management and incident escalation for critical systems supporting payments and safeguarding.
Owner
CTO and security lead
Area
Outsourcing governance
Control
Classify critical providers, maintain an outsourcing register, negotiate audit and information rights, monitor performance and plan exit or substitution for critical services.
Owner
Operations, legal and board
Area
Key persons and accountability
Control
Assign clear ownership for AML, complaints, safeguarding, finance, ICT incidents and third-party oversight. Role clarity matters more than long policy text.
Owner
Board and senior management
UK scope is not EEA market access

Post-Brexit position, cross-border limits and expansion planning

A UK PI licence is a UK authorisation. After Brexit, it does not create automatic access to the EEA. If your growth plan includes EU or EEA customers, you need a separate cross-border analysis covering local licensing, reverse solicitation risk, local agent structures, or establishment of an EU-authorised entity such as an EMI or PI in another jurisdiction.

This matters commercially because many founders still assume a UK FCA authorisation is a Europe-wide passport. That assumption is outdated. Expansion planning should therefore be built into the licensing strategy from the start, especially where the product depends on local IBAN access, open banking connectivity, merchant acquiring relationships or consumer-facing payment accounts.

If your roadmap includes both UK and EU payments activity, compare the UK PI route with EU alternatives such as Lithuania, Cyprus or the Netherlands before committing to one licensing sequence.

Topic Details Risk Note
Serving UK customers A UK-authorised PI can serve within the UK perimeter covered by its permissions, subject to ongoing FCA supervision and conduct obligations. Permissions must match the live business model. Launching new services can require variation analysis.
Serving EEA customers from the UK This requires separate legal analysis because UK authorisation no longer gives automatic passporting into the EEA. Assuming passive cross-border access can create unauthorised business risk in target states.
Using agents and distributors Agency structures can support go-to-market, but the principal must retain oversight and the arrangement must reflect the real operating model. An artificial agent structure used only to avoid authorisation risk can fail perimeter scrutiny.
Foreign-owned UK applicants Overseas groups can set up a UK PI, but the FCA will look for credible UK governance, records access and effective control over regulated operations. A thin UK shell with all real decision-making offshore can trigger substance concerns.
Crypto-payment hybrids Where a business combines fiat payment services with crypto functionality, the UK payments perimeter may overlap with separate crypto regulatory analysis. Do not assume a PI or EMI route covers crypto exchange, custody or financial promotions issues. Separate review is required.
Topic
Serving UK customers
Details
A UK-authorised PI can serve within the UK perimeter covered by its permissions, subject to ongoing FCA supervision and conduct obligations.
Risk Note
Permissions must match the live business model. Launching new services can require variation analysis.
Topic
Serving EEA customers from the UK
Details
This requires separate legal analysis because UK authorisation no longer gives automatic passporting into the EEA.
Risk Note
Assuming passive cross-border access can create unauthorised business risk in target states.
Topic
Using agents and distributors
Details
Agency structures can support go-to-market, but the principal must retain oversight and the arrangement must reflect the real operating model.
Risk Note
An artificial agent structure used only to avoid authorisation risk can fail perimeter scrutiny.
Topic
Foreign-owned UK applicants
Details
Overseas groups can set up a UK PI, but the FCA will look for credible UK governance, records access and effective control over regulated operations.
Risk Note
A thin UK shell with all real decision-making offshore can trigger substance concerns.
Topic
Crypto-payment hybrids
Details
Where a business combines fiat payment services with crypto functionality, the UK payments perimeter may overlap with separate crypto regulatory analysis.
Risk Note
Do not assume a PI or EMI route covers crypto exchange, custody or financial promotions issues. Separate review is required.
Why PI applications are delayed or challenged

Common mistakes that delay or derail PI licence applications

The most common reason a PI application struggles is not lack of ambition. It is lack of precision. The FCA expects the applicant to understand exactly what it does, why that activity falls inside a specific legal category, how customer funds move, who controls each risk point and how the business remains compliant after launch.

Applications are often delayed because the perimeter analysis is weak, the safeguarding model is generic, the forecasts are unrealistic, or the governance chart is too thin for the proposed scale. Another recurring issue is that applicants describe themselves as a PI when the product is functionally an EMI or a hybrid model with additional regulatory implications.

Weak perimeter analysis

High risk

Legal risk: The firm applies for the wrong regime or cannot explain why its activities are payment services rather than e-money issuance, agency or unregulated software provision.

Mitigation: Prepare a line-by-line service mapping, funds flow analysis and legal classification before drafting the application.

Unclear safeguarding mechanics

High risk

Legal risk: The FCA cannot see how relevant funds will be identified, protected, reconciled and segregated from house money in real operations.

Mitigation: Build a safeguarding methodology tied to actual ledger logic, settlement timing, exception handling and named control owners.

Unrealistic financial forecasts

High risk

Legal risk: The business appears undercapitalised or commercially implausible, especially where projected volumes do not support staffing, compliance or technology spend.

Mitigation: Use evidence-based assumptions, downside scenarios and a financial model that aligns with the operating plan.

Governance gaps

Medium risk

Legal risk: Directors and senior staff appear nominal, unavailable or lacking enough payments, AML or operational experience for the proposed model.

Mitigation: Assign clear responsibilities, document time commitment and ensure key persons can explain the business and controls in detail.

Outsourcing without oversight

Medium risk

Legal risk: Critical functions are delegated to vendors, but the applicant cannot show monitoring, audit rights, incident response or exit planning.

Mitigation: Maintain an outsourcing register, criticality assessment, contractual control framework and board reporting.

Poor AML calibration

Medium risk

Legal risk: CDD, screening and monitoring are generic and do not reflect the actual customer, channel or geographic risk profile.

Mitigation: Tailor the AML framework to the business-wide risk assessment and demonstrate operational ownership by the MLRO.

Authorisation is not the only route to market

Do you need your own PI licence, or is another route better?

Direct FCA authorisation is only one route to market. For some founders, the right answer is to build a fully authorised UK PI. For others, the better answer is to start under an agent model, use an EMI sponsor or principal, remain a technical service provider, or redesign the product so that the regulated function sits with another authorised entity. The correct choice depends on speed, control, economics, investor expectations and whether payments are core IP or only an embedded feature.

The strategic mistake is filing for authorisation before deciding whether regulation is the business or only an enabler. If payments are central to margin, customer ownership and product defensibility, build may be justified. If the business mainly sells software, distribution or marketplace functionality, a partner-led route may be more efficient.

Option Advantages Limitations Best For
Build your own UK PI authorisation Maximum control over product, compliance architecture, agents, customer proposition and long-term enterprise value. Longer timeline, higher upfront build cost, ongoing regulatory burden and need for real governance substance. Fintechs whose core business is regulated payments rather than software enablement.
Operate as an agent of an authorised firm Faster market entry and lower initial regulatory build where the principal’s model genuinely supports the activity. Less control, dependence on the principal’s risk appetite, onboarding standards, commercial terms and product roadmap. Early-stage teams validating demand before building their own authorisation case.
Use an EMI or PI partner for embedded payments Can reduce licensing complexity where the firm mainly needs payments as infrastructure. Commercial dependency, margin sharing, and less flexibility in safeguarding, settlement and customer journey design. Platforms, SaaS providers and marketplaces where payments are important but not the main regulated business.
Remain a technical service provider Avoids direct authorisation if the firm truly provides software or infrastructure without becoming the regulated payment service provider. The perimeter must be carefully structured; control over funds flow and customer-facing promises must remain limited. API vendors, orchestration tools, analytics providers and non-custodial infrastructure businesses.
Option
Build your own UK PI authorisation
Advantages
Maximum control over product, compliance architecture, agents, customer proposition and long-term enterprise value.
Limitations
Longer timeline, higher upfront build cost, ongoing regulatory burden and need for real governance substance.
Best For
Fintechs whose core business is regulated payments rather than software enablement.
Option
Operate as an agent of an authorised firm
Advantages
Faster market entry and lower initial regulatory build where the principal’s model genuinely supports the activity.
Limitations
Less control, dependence on the principal’s risk appetite, onboarding standards, commercial terms and product roadmap.
Best For
Early-stage teams validating demand before building their own authorisation case.
Option
Use an EMI or PI partner for embedded payments
Advantages
Can reduce licensing complexity where the firm mainly needs payments as infrastructure.
Limitations
Commercial dependency, margin sharing, and less flexibility in safeguarding, settlement and customer journey design.
Best For
Platforms, SaaS providers and marketplaces where payments are important but not the main regulated business.
Option
Remain a technical service provider
Advantages
Avoids direct authorisation if the firm truly provides software or infrastructure without becoming the regulated payment service provider.
Limitations
The perimeter must be carefully structured; control over funds flow and customer-facing promises must remain limited.
Best For
API vendors, orchestration tools, analytics providers and non-custodial infrastructure businesses.
FAQ

Frequently asked questions about PI licences in the UK

These answers address the most common decision-stage questions from founders, legal teams and compliance leads assessing UK payment services authorisation.

What does “PI licence in the UK” mean? +

In UK search results, “PI licence” can mean either Payment Institution licence or Private Investigator licence. In financial services, it means FCA authorisation or registration for regulated payment services under the Payment Services Regulations 2017.

Who regulates a Payment Institution in the UK? +

The main regulator is the Financial Conduct Authority. Depending on the business model, the firm will also need to address related obligations involving Companies House, the ICO, AML controls and sector guidance such as JMLSG.

Is a PI licence the same as an EMI licence? +

No. A PI provides payment services. An EMI issues electronic money and may also provide payment services. If your model includes stored value, wallet balances or redeemable monetary value, you need EMI analysis rather than assuming PI status.

What is the difference between API and SPI? +

API is the full Authorised Payment Institution route. SPI is the Small Payment Institution route with threshold-based limits and restrictions. SPI is not simply a cheaper API; it is a distinct regime that may not suit scaling or more complex models.

Do all fintech apps that move money need a PI licence? +

No. Some firms are only technical service providers, while others operate through an authorised principal or agent structure. The answer depends on the exact funds flow, legal responsibility, customer-facing role and whether the firm itself provides the regulated payment service.

When do I need an EMI instead of a PI? +

You usually test for EMI where the business issues e-money, such as app balances, stored value or wallet functionality representing monetary claims on the issuer. If the business only executes payments and does not issue e-money, PI may be the correct route.

How long does FCA PI authorisation take? +

There is a statutory review framework, but real timing depends heavily on whether the application is complete and whether the FCA needs multiple rounds of clarification. In practice, weak perimeter analysis and inconsistent documents are the main causes of delay.

Can a foreign-owned company get a PI licence in the UK? +

Yes, foreign ownership does not in itself prevent UK authorisation. The key issues are substance, transparency of ownership, fit-and-proper assessment, effective UK governance and the FCA’s ability to supervise the business and responsible individuals.

Does a UK PI licence allow passporting into the EEA? +

No. After Brexit, a UK PI licence is a UK domestic authorisation and does not automatically create EEA market access. Cross-border servicing into the EEA requires separate local legal analysis.

Are safeguarded funds protected like bank deposits? +

No. Safeguarding is a customer-funds protection mechanism under the payments regime, but it is not the same as deposit protection. Firms should not describe safeguarded PI funds as if they were protected like ordinary bank deposits under the FSCS.

Need a Practical Readout?

Choose the right FCA route before you apply

A UK PI application succeeds when the perimeter analysis, safeguarding model, governance structure and financial plan all describe the same business. If your firm executes payment transactions, remits funds, initiates payments, aggregates account data or operates a wallet-like product, the first question is not how to fill the form. The first question is whether you need API, SPI, EMI, AISP/PISP, an agent model, or no direct licence at all. A correct scoping decision can save months of delay and expensive rework.

Confidential - No obligation - Response within 24 hours