EMI License in Lithuania

A Lithuanian EMI license allows an authorized Electronic Money Institution to issue electronic money and provide payment services across the EEA after passporting. For a full EMI, the core hard-law entry point remains €350,000 initial capital, with authorization and supervision handled by the Bank of Lithuania (Lietuvos bankas) under the national regime implementing Directive 2009/110/EC (EMD2) and Directive (EU) 2015/2366 (PSD2). In practice, serious applicants should budget for a 6–12 month end-to-end project, not just the formal supervisory review period, and should treat DORA, AML/CTF, safeguarding, outsourcing, and ICT governance as part of the licensing file rather than post-launch cleanup.

A Lithuanian EMI license allows an authorized Electronic Money Institution to issue electronic money and provide payment services across the EEA after passporting. For a full EMI, the core hard-law entry point remains €350,000 initial capital, with authorization and supervision handled by the Bank of Lithuania (Lietuvos bankas) under the national regime implementing Directive 2009/110/EC (EMD2) and Directive (EU) 2015/2366 (PSD2). Read more Hide In practice, serious applicants should budget for a 6–12 month end-to-end project, not just the formal supervisory review period, and should treat DORA, AML/CTF, safeguarding, outsourcing, and ICT governance as part of the licensing file rather than post-launch cleanup.

This page is informational and does not constitute legal, tax, or regulatory advice. Licensing outcomes depend on the applicant's business model, governance quality, completeness of the file, source of funds, safeguarding design, ICT setup, and supervisory assessment by the Bank of Lithuania. Tax treatment should be confirmed against current official guidance and case-specific advice before implementation.

Disclaimer This page is informational and does not constitute legal, tax, or regulatory advice. Licensing outcomes depend on the applicant's business model, governance quality, completeness of the file, source of funds, safeguarding design, ICT setup, and supervisory assessment by the Bank of Lithuania. Tax treatment should be confirmed against current official guidance and case-specific advice before implementation.
2026 overview

EMI Snapshot

Core authorization thresholds, timeline reality and the practical review lens in one block.

At a Glance

Regulator
Bank of Lithuania is the competent authority for EMI authorization and supervision in Lithuania.
Minimum initial capital
€350,000 for a full EMI under the EU electronic money regime.
Application fee
€1,463 state fee is commonly cited for a full EMI application in Lithuania.
Statutory review clock
The formal review period is typically referenced as up to 3 months after a complete file is accepted; this is not the same as total project duration.
Realistic total timeline
6–12 months is a practical planning range for incorporation, documentation, Q&A rounds, remediation, and operational readiness.
Passporting
An authorized Lithuanian EMI may passport eligible services across the EEA after the required notification process.
Infrastructure angle
Lithuania remains relevant because of CENTROlink, SEPA connectivity, and the regulator's accumulated fintech supervisory experience.
2026 compliance stack
Applicants should assume DORA, AML/CTF, GDPR, safeguarding, outsourcing control, and incident governance will be reviewed as an integrated control framework.

Mini Timeline

Weeks 1–4
Feasibility and perimeter analysis

Define whether the model requires EMI, PI, or another regime; map products, target markets, safeguarding, and outsourcing.

Months 2–4
Entity setup and documentation build

Incorporation, capital planning, governance appointments, policies, financial model, AML framework, and ICT architecture are prepared.

Months 4–8+
Submission, completeness review, and Q&A

The supervisory clock matters only after the file is considered complete; weak files lose time before substantive review even starts.

Months 6–12
Authorization and go-live readiness

Approval does not replace operational onboarding with banks, safeguarding partners, vendors, auditors, or SEPA infrastructure providers.

Quick Assessment

  • The model needs stored balances, wallets, or reusable customer value, not only payment execution.
  • Founders can evidence legitimate source of funds and support €350,000 regulatory capital plus launch budget.
  • The group can appoint credible management and control functions with real decision-making capacity.
  • Safeguarding, AML monitoring, sanctions screening, and ICT governance are designed before filing.
  • The target rollout includes EEA expansion where passporting has strategic value.
Check if EMI is the right route
What the license covers

What an EMI license in Lithuania allows you to do — and what it does not

A Lithuanian EMI license authorizes an institution to issue electronic money and provide relevant payment services within the legal perimeter of the EU electronic money and payments framework. In practical product terms, this is the regime used for customer wallets, stored balances, payment accounts, IBAN-led account products, merchant settlement flows, payroll wallets, and embedded finance models where users hold redeemable value rather than merely sending one-off payments.

The key legal distinction is that electronic money is not a bank deposit. E-money represents a monetary value stored electronically, issued on receipt of funds, and redeemable at par. That redemption feature is not a marketing detail; it is one of the core prudential mechanics that affects safeguarding, reconciliation, customer terms, and balance-sheet treatment. A Lithuanian EMI may also provide payment services listed under the PSD2 framework, but it may not present itself as a bank or take repayable funds from the public as deposits.

For founders, the practical test is simple: if the product requires customer balances that can be held, reused, and redeemed, EMI is usually the relevant route. If the model only moves funds from point A to point B without issuing stored value, a PI license may be enough. If the model requires deposit-taking or broader banking permissions, the EMI regime is the wrong perimeter.

Can Do

Permitted Activities

  • Issue electronic money in exchange for received funds and maintain redeemable customer balances.
  • Open and operate payment accounts and wallet structures, including IBAN-based user flows where the operating model supports it.
  • Execute payment transactions, including credit transfers, transfers between users, merchant settlement, and other PSD2 payment services within scope.
  • Support card-based products through lawful issuing and scheme/vendor arrangements, subject to operational readiness and card-program structure.
  • Provide ancillary foreign-exchange features connected to payment services where legally structured and properly disclosed.
  • Passport authorized services across the EEA after notification, either cross-border or through a branch structure.
  • Redeem issued e-money at par in accordance with the legal framework and customer terms.
Cannot Do

Out-of-Scope Activities

  • Take deposits or other repayable funds from the public as a bank does.
  • Use safeguarded customer funds as proprietary working capital or treasury liquidity.
  • Assume that an EMI license automatically grants unrestricted lending or banking permissions.
  • Assume that EMI authorization alone is sufficient for issuing e-money tokens under MiCA without the additional MiCA layer.
  • Assume that direct SEPA or CENTROlink connectivity is automatic immediately upon authorization.
Decision framework

EMI vs PI vs specialized bank: which license fits your business model?

The correct license depends on the product perimeter, not on branding. A Lithuanian EMI is the right fit where the business model requires stored value, customer wallets, or balances that remain available for later use. A PI is usually sufficient where the institution only executes payment flows and does not issue e-money. A specialized bank sits in a different category because it can engage in deposit-taking and broader banking activity, with a materially heavier prudential and governance burden.

Founders often over-license because they want optionality. In practice, over-licensing can slow the project and expand the control burden unnecessarily. Under-licensing is worse: if the model functionally creates redeemable stored value, the regulator will look through product labels and assess the substance. That is why the stored-balance question is usually the first licensing fork.

Parameter PI EMI Specialized Bank
Core legal function Provides payment services under PSD2 without issuing electronic money. Issues electronic money and may also provide payment services. Provides banking services under a banking regime, including deposit-taking within its licensed scope.
Initial capital €20,000–€125,000 depending on the payment services provided. €350,000 for a full EMI. Higher prudential threshold than EMI; separate banking regime applies.
Stored balances / wallets Not suitable where the model requires issuance of reusable stored e-money value. Yes; this is the core use case. Yes, but under a banking framework rather than e-money law.
Deposit-taking No. No. Yes, within the banking authorization perimeter.
Typical use cases Money remittance, payment processing, payment flow only models, some merchant payment services. Neobank-style wallets, payroll wallets, marketplace balances, B2B treasury wallets, embedded finance with customer balances. Deposit products, broader treasury and lending structures, bank-grade balance-sheet models.
Passporting Yes, for authorized institutions after notification. Yes, for authorized institutions after notification. Passporting mechanics differ and follow the banking framework.
Prudential focus Payment volume, safeguarding where relevant, governance, AML, outsourcing. Initial capital, outstanding e-money, safeguarding, redemption, governance, AML, ICT resilience. Bank capital, liquidity, governance, recovery and broader prudential supervision.
Best fit Payment flow only. Wallet / IBAN / stored value / reusable balance models. Deposit-taking and wider banking strategy.
Parameter
Core legal function
PI
Provides payment services under PSD2 without issuing electronic money.
EMI
Issues electronic money and may also provide payment services.
Specialized Bank
Provides banking services under a banking regime, including deposit-taking within its licensed scope.
Parameter
Initial capital
PI
€20,000–€125,000 depending on the payment services provided.
EMI
€350,000 for a full EMI.
Specialized Bank
Higher prudential threshold than EMI; separate banking regime applies.
Parameter
Stored balances / wallets
PI
Not suitable where the model requires issuance of reusable stored e-money value.
EMI
Yes; this is the core use case.
Specialized Bank
Yes, but under a banking framework rather than e-money law.
Parameter
Deposit-taking
PI
No.
EMI
No.
Specialized Bank
Yes, within the banking authorization perimeter.
Parameter
Typical use cases
PI
Money remittance, payment processing, payment flow only models, some merchant payment services.
EMI
Neobank-style wallets, payroll wallets, marketplace balances, B2B treasury wallets, embedded finance with customer balances.
Specialized Bank
Deposit products, broader treasury and lending structures, bank-grade balance-sheet models.
Parameter
Passporting
PI
Yes, for authorized institutions after notification.
EMI
Yes, for authorized institutions after notification.
Specialized Bank
Passporting mechanics differ and follow the banking framework.
Parameter
Prudential focus
PI
Payment volume, safeguarding where relevant, governance, AML, outsourcing.
EMI
Initial capital, outstanding e-money, safeguarding, redemption, governance, AML, ICT resilience.
Specialized Bank
Bank capital, liquidity, governance, recovery and broader prudential supervision.
Parameter
Best fit
PI
Payment flow only.
EMI
Wallet / IBAN / stored value / reusable balance models.
Specialized Bank
Deposit-taking and wider banking strategy.
EU and Lithuania rules

Legal and regulatory framework for a Lithuanian EMI

A Lithuanian EMI operates under a layered framework: EMD2 for electronic money, PSD2 for payment services, national Lithuanian implementing law and supervisory rules, and cross-cutting EU regimes such as DORA, AML/CTF legislation, and GDPR. In 2026, applicants should also understand the reform trajectory toward PSD3 / PSR, even though authorization decisions continue to be made under the current applicable regime until new legislation takes effect.

The practical point is that the Bank of Lithuania does not assess an EMI file as a stack of isolated PDFs. It reviews whether the applicant’s legal perimeter, control model, outsourcing map, safeguarding design, governance, and ICT environment form a coherent operating institution. This is where many weak applications fail: the legal documents say one thing, the financial model assumes another, and the technology or safeguarding setup cannot support the promises made in the program of operations.

A 2026-ready EMI file should distinguish clearly between current applicable law and forward-looking reform planning. Referring to PSD3 or PSR as if already in force would weaken legal accuracy; ignoring them entirely can weaken strategic planning.

Framework Why It Matters Operational Impact
Directive 2009/110/EC (EMD2) EMD2 is the core EU legal basis for electronic money issuance, redemption, initial capital, and prudential treatment of EMIs. Defines whether the product is actually e-money, drives redemption wording in customer terms, and shapes safeguarding and own-funds analysis.
Directive (EU) 2015/2366 (PSD2) PSD2 governs payment services, conduct rules, security obligations, and passporting mechanics for payment activity. Affects payment execution, SCA-related design where relevant, agent/outsourcing structures, and the range of payment services the EMI may provide.
Bank of Lithuania national supervisory regime Lithuania's national law and supervisory practice determine the application package, local expectations, and ongoing reporting interface. Applicants must submit a file that is complete, internally consistent, and tailored to the Lithuanian supervisory process rather than copied from another jurisdiction.
DORA — Regulation (EU) 2022/2554 DORA applies to financial entities and makes ICT risk management, incident governance, resilience testing, and third-party oversight a live compliance issue. Applicants should be ready with ICT asset inventory, incident classification, vendor register, contractual controls, business continuity, and recovery planning.
AML/CTF framework EMIs are high-scrutiny financial institutions for AML, sanctions, fraud, and source-of-funds controls. The regulator will expect customer risk assessment, onboarding controls, transaction monitoring, sanctions screening, escalation logic, and MLRO ownership.
GDPR and local data protection supervision Fintech onboarding, transaction monitoring, fraud controls, and vendor outsourcing all involve large-scale personal data processing. Applicants should map lawful basis, retention, processor contracts, access control, and cross-border data flows; weak privacy governance can undermine the licensing narrative.
MiCA — Regulation (EU) 2023/1114 MiCA matters if the group intends to issue an e-money token or build a stablecoin strategy on top of EMI authorization. EMI status may be necessary for EMT issuance, but additional MiCA obligations such as white paper, reserve, disclosure, and redemption controls still apply.
Framework
Directive 2009/110/EC (EMD2)
Why It Matters
EMD2 is the core EU legal basis for electronic money issuance, redemption, initial capital, and prudential treatment of EMIs.
Operational Impact
Defines whether the product is actually e-money, drives redemption wording in customer terms, and shapes safeguarding and own-funds analysis.
Framework
Directive (EU) 2015/2366 (PSD2)
Why It Matters
PSD2 governs payment services, conduct rules, security obligations, and passporting mechanics for payment activity.
Operational Impact
Affects payment execution, SCA-related design where relevant, agent/outsourcing structures, and the range of payment services the EMI may provide.
Framework
Bank of Lithuania national supervisory regime
Why It Matters
Lithuania's national law and supervisory practice determine the application package, local expectations, and ongoing reporting interface.
Operational Impact
Applicants must submit a file that is complete, internally consistent, and tailored to the Lithuanian supervisory process rather than copied from another jurisdiction.
Framework
DORA — Regulation (EU) 2022/2554
Why It Matters
DORA applies to financial entities and makes ICT risk management, incident governance, resilience testing, and third-party oversight a live compliance issue.
Operational Impact
Applicants should be ready with ICT asset inventory, incident classification, vendor register, contractual controls, business continuity, and recovery planning.
Framework
AML/CTF framework
Why It Matters
EMIs are high-scrutiny financial institutions for AML, sanctions, fraud, and source-of-funds controls.
Operational Impact
The regulator will expect customer risk assessment, onboarding controls, transaction monitoring, sanctions screening, escalation logic, and MLRO ownership.
Framework
GDPR and local data protection supervision
Why It Matters
Fintech onboarding, transaction monitoring, fraud controls, and vendor outsourcing all involve large-scale personal data processing.
Operational Impact
Applicants should map lawful basis, retention, processor contracts, access control, and cross-border data flows; weak privacy governance can undermine the licensing narrative.
Framework
MiCA — Regulation (EU) 2023/1114
Why It Matters
MiCA matters if the group intends to issue an e-money token or build a stablecoin strategy on top of EMI authorization.
Operational Impact
EMI status may be necessary for EMT issuance, but additional MiCA obligations such as white paper, reserve, disclosure, and redemption controls still apply.
Capital, governance, substance

Eligibility requirements for an EMI license in Lithuania

A Lithuanian EMI applicant must show more than a legal entity and paid-in capital. The Bank of Lithuania will assess whether the institution has the financial base, governance, fit-and-proper management, AML and safeguarding architecture, and operational substance necessary to run a regulated e-money business. In practice, the quality of management and control design often matters as much as the formal document count.

The usual corporate vehicle is a Lithuanian company such as UAB or AB, but the legal form is only the starting point. The regulator will look through ownership, source of funds, group structure, and decision-making reality. Applications built around nominal local presence but fully externalized control frequently run into questions on substance, outsourcing dependence, and who actually manages risk.

Applicants should also separate three categories of requirements: hard law, supervisory expectations, and market practice. For example, physical presence and credible local decision-making are practical expectations that support supervisory comfort, even where a specific staffing number is not a universal statutory rule for every case.

A common licensing mistake is to present outsourcing as a substitute for governance. Outsourcing may be permitted, but accountability remains with the EMI. The stronger the outsourcing footprint, the stronger the oversight evidence must be.

Area Regulatory Expectation Evidence Pack
Legal entity and seat A Lithuanian legal entity is required, commonly a UAB or AB, with a registered office and an operating setup consistent with the proposed business. Incorporation documents, shareholder register, articles, registered address, and organizational setup.
Initial capital A full EMI requires €350,000 initial capital. This is an entry threshold and does not replace ongoing own-funds maintenance. Capital contribution evidence, bank confirmation, accounting records, and prudential planning.
Own funds The institution must maintain own funds at least at the required prudential level, generally assessed against the higher of initial capital and the formula-driven ongoing requirement linked to e-money/payment activity. Financial projections, prudential methodology, capital planning memo, and stress assumptions.
Shareholders and UBOs Qualifying shareholders and beneficial owners must be transparent, reputable, and able to evidence lawful source of funds and source of wealth where relevant. UBO charts, passports, corporate chain documents, source-of-funds pack, declarations, and adverse-media screening.
Management body and senior management The regulator expects a credible governance structure with real oversight, not nominee appointments. Interviews may be used to test understanding of the business and risk model. CVs, criminal-record and reputation checks, role descriptions, time-commitment analysis, and governance map.
Control functions Compliance, AML/MLRO, risk, and internal control responsibilities must be clearly assigned, with adequate independence and escalation lines. Policies, committee terms, reporting lines, outsourcing analysis, and evidence of function-holder competence.
Physical office and substance A physical office and genuine operational presence in Lithuania are typically expected. Substance is assessed case by case against the scale and risk of the model. Lease, staffing plan, local management availability, board calendar, and operational process ownership.
Business model clarity The product perimeter must be legally coherent: issuance of e-money, payment services, customer segments, geographies, and safeguarding flows must align. Program of operations, customer journey maps, T&Cs, financial model, and product-control matrix.
Safeguarding design The applicant must show how customer funds are separated, reconciled, protected, and redeemed without contamination by proprietary funds. Safeguarding policy, account structure, reconciliation procedure, insolvency analysis, and partner-bank documentation.
ICT and outsourcing Core systems, cloud providers, processors, AML vendors, and card/program partners must be governed under a controlled outsourcing and ICT risk framework. Architecture diagrams, vendor register, outsourcing policy, SLAs, incident process, and DORA control mapping.
Area
Legal entity and seat
Regulatory Expectation
A Lithuanian legal entity is required, commonly a UAB or AB, with a registered office and an operating setup consistent with the proposed business.
Evidence Pack
Incorporation documents, shareholder register, articles, registered address, and organizational setup.
Area
Initial capital
Regulatory Expectation
A full EMI requires €350,000 initial capital. This is an entry threshold and does not replace ongoing own-funds maintenance.
Evidence Pack
Capital contribution evidence, bank confirmation, accounting records, and prudential planning.
Area
Own funds
Regulatory Expectation
The institution must maintain own funds at least at the required prudential level, generally assessed against the higher of initial capital and the formula-driven ongoing requirement linked to e-money/payment activity.
Evidence Pack
Financial projections, prudential methodology, capital planning memo, and stress assumptions.
Area
Shareholders and UBOs
Regulatory Expectation
Qualifying shareholders and beneficial owners must be transparent, reputable, and able to evidence lawful source of funds and source of wealth where relevant.
Evidence Pack
UBO charts, passports, corporate chain documents, source-of-funds pack, declarations, and adverse-media screening.
Area
Management body and senior management
Regulatory Expectation
The regulator expects a credible governance structure with real oversight, not nominee appointments. Interviews may be used to test understanding of the business and risk model.
Evidence Pack
CVs, criminal-record and reputation checks, role descriptions, time-commitment analysis, and governance map.
Area
Control functions
Regulatory Expectation
Compliance, AML/MLRO, risk, and internal control responsibilities must be clearly assigned, with adequate independence and escalation lines.
Evidence Pack
Policies, committee terms, reporting lines, outsourcing analysis, and evidence of function-holder competence.
Area
Physical office and substance
Regulatory Expectation
A physical office and genuine operational presence in Lithuania are typically expected. Substance is assessed case by case against the scale and risk of the model.
Evidence Pack
Lease, staffing plan, local management availability, board calendar, and operational process ownership.
Area
Business model clarity
Regulatory Expectation
The product perimeter must be legally coherent: issuance of e-money, payment services, customer segments, geographies, and safeguarding flows must align.
Evidence Pack
Program of operations, customer journey maps, T&Cs, financial model, and product-control matrix.
Area
Safeguarding design
Regulatory Expectation
The applicant must show how customer funds are separated, reconciled, protected, and redeemed without contamination by proprietary funds.
Evidence Pack
Safeguarding policy, account structure, reconciliation procedure, insolvency analysis, and partner-bank documentation.
Area
ICT and outsourcing
Regulatory Expectation
Core systems, cloud providers, processors, AML vendors, and card/program partners must be governed under a controlled outsourcing and ICT risk framework.
Evidence Pack
Architecture diagrams, vendor register, outsourcing policy, SLAs, incident process, and DORA control mapping.
Application checklist

Documents required for the application

The Bank of Lithuania reviews an EMI application as a structured evidence pack, not as isolated forms. A strong file usually contains five document groups: corporate, financial and prudential, governance, AML/compliance, and ICT/operations. The regulator is not only checking whether each document exists; it is testing whether the documents agree with each other on the same facts.

For example, if the business plan promises instant merchant settlement, the safeguarding model, liquidity assumptions, bank-partner setup, and reconciliation process must support that promise. If the AML policy says high-risk customers are excluded, the commercial deck and onboarding flow cannot quietly target those same segments. Internal consistency is a licensing issue, not just a drafting preference.

Document Purpose Owner
Program of operations Defines the licensed activities, product perimeter, customer journeys, target markets, and operating model the regulator is being asked to authorize. Legal / founders / regulatory lead
Three-year business plan and financial projections Shows commercial rationale, prudential sustainability, revenue assumptions, cost base, break-even logic, and capital adequacy planning. Finance / founders
Initial capital and source-of-funds pack Evidences paid-in capital, shareholder funding capacity, lawful source of funds, and ownership transparency. Shareholders / finance / legal
Corporate documents Establishes the Lithuanian legal entity, constitutional documents, shareholding, and governance structure. Corporate legal
UBO and qualifying holding disclosures Allows fit-and-proper and ownership assessment of controllers and beneficial owners. Legal / compliance
Governance framework Sets out board oversight, senior management roles, committees, reporting lines, conflicts management, and decision rights. Legal / compliance / HR
CVs and fit-and-proper evidence Demonstrates the competence, reputation, time commitment, and role suitability of directors and key managers. HR / legal
AML/CTF policy suite Covers customer due diligence, risk scoring, sanctions screening, transaction monitoring, suspicious activity escalation, and MLRO responsibilities. Compliance / MLRO
Safeguarding policy Explains segregation or alternative protection method, reconciliation logic, customer-fund classification, and redemption controls. Finance / operations / compliance
Risk management framework Maps operational, AML, fraud, conduct, liquidity, outsourcing, and ICT risks with ownership and controls. Risk / compliance
ICT architecture and security documentation Shows core systems, data flows, access control, logging, resilience, incident handling, and vendor dependencies. CTO / security / operations
Outsourcing register and key contracts Identifies critical providers, control allocation, SLAs, audit rights, exit planning, and DORA-relevant contractual safeguards. Legal / procurement / CTO
Customer terms and redemption terms Confirms the legal characterization of e-money, fees, redemption rights, complaint handling, and conduct disclosures. Legal / product
Document
Program of operations
Purpose
Defines the licensed activities, product perimeter, customer journeys, target markets, and operating model the regulator is being asked to authorize.
Owner
Legal / founders / regulatory lead
Document
Three-year business plan and financial projections
Purpose
Shows commercial rationale, prudential sustainability, revenue assumptions, cost base, break-even logic, and capital adequacy planning.
Owner
Finance / founders
Document
Initial capital and source-of-funds pack
Purpose
Evidences paid-in capital, shareholder funding capacity, lawful source of funds, and ownership transparency.
Owner
Shareholders / finance / legal
Document
Corporate documents
Purpose
Establishes the Lithuanian legal entity, constitutional documents, shareholding, and governance structure.
Owner
Corporate legal
Document
UBO and qualifying holding disclosures
Purpose
Allows fit-and-proper and ownership assessment of controllers and beneficial owners.
Owner
Legal / compliance
Document
Governance framework
Purpose
Sets out board oversight, senior management roles, committees, reporting lines, conflicts management, and decision rights.
Owner
Legal / compliance / HR
Document
CVs and fit-and-proper evidence
Purpose
Demonstrates the competence, reputation, time commitment, and role suitability of directors and key managers.
Owner
HR / legal
Document
AML/CTF policy suite
Purpose
Covers customer due diligence, risk scoring, sanctions screening, transaction monitoring, suspicious activity escalation, and MLRO responsibilities.
Owner
Compliance / MLRO
Document
Safeguarding policy
Purpose
Explains segregation or alternative protection method, reconciliation logic, customer-fund classification, and redemption controls.
Owner
Finance / operations / compliance
Document
Risk management framework
Purpose
Maps operational, AML, fraud, conduct, liquidity, outsourcing, and ICT risks with ownership and controls.
Owner
Risk / compliance
Document
ICT architecture and security documentation
Purpose
Shows core systems, data flows, access control, logging, resilience, incident handling, and vendor dependencies.
Owner
CTO / security / operations
Document
Outsourcing register and key contracts
Purpose
Identifies critical providers, control allocation, SLAs, audit rights, exit planning, and DORA-relevant contractual safeguards.
Owner
Legal / procurement / CTO
Document
Customer terms and redemption terms
Purpose
Confirms the legal characterization of e-money, fees, redemption rights, complaint handling, and conduct disclosures.
Owner
Legal / product
From pre-app to approval

Step-by-step process to obtain an EMI license in Lithuania

A Lithuanian EMI project usually starts with regulatory perimeter analysis and ends only when the institution is operationally ready to launch, not when the first draft application is emailed. In practice, the process has five stages: feasibility, incorporation and design, documentation build, supervisory review, and post-approval readiness. The formal review clock matters, but incomplete files usually lose more time before that clock starts than during the clock itself.

Application Pack

Core Documents and Evidence Trail

The file should read like one operating model, not like disconnected policy appendices.

Document Purpose Owner
Program of operations Defines exactly what the Bank of Lithuania is being asked to authorize. Legal / founders
Financial projections and prudential model Supports capital adequacy, own-funds planning, and business viability. Finance
AML/CTF framework Shows how the EMI will identify, monitor, and escalate financial crime risk. Compliance / MLRO
Safeguarding framework Explains client-funds protection mechanics and reconciliation controls. Finance / operations
ICT and outsourcing pack Demonstrates system resilience, vendor governance, and DORA readiness. CTO / security / legal
Document
Program of operations
Purpose
Defines exactly what the Bank of Lithuania is being asked to authorize.
Owner
Legal / founders
Document
Financial projections and prudential model
Purpose
Supports capital adequacy, own-funds planning, and business viability.
Owner
Finance
Document
AML/CTF framework
Purpose
Shows how the EMI will identify, monitor, and escalate financial crime risk.
Owner
Compliance / MLRO
Document
Safeguarding framework
Purpose
Explains client-funds protection mechanics and reconciliation controls.
Owner
Finance / operations
Document
ICT and outsourcing pack
Purpose
Demonstrates system resilience, vendor governance, and DORA readiness.
Owner
CTO / security / legal
Review Risk

Common Delays and Bottlenecks

  • The file is drafted around a sales deck rather than the real operating model.
  • Source of funds or ownership chain documentation is incomplete or inconsistent.
  • Safeguarding is described at a high level but not operationalized through accounts, reconciliation, and ownership.
  • Management CVs do not match the complexity or geography of the proposed business.
  • Critical functions are outsourced without clear oversight, KPIs, audit rights, or exit planning.
  • Financial projections assume unrealistic client growth, margins, or transaction volumes.
  • The institution has no credible local substance despite claiming Lithuania as its supervisory home.
Real launch budget

Cost of an EMI license in Lithuania: realistic 2026 budget

The cost of a Lithuanian EMI project has two different layers: regulatory capital and implementation spend. The first is the hard-law capital requirement of €350,000 for a full EMI. The second includes legal drafting, compliance design, audit and accounting support, staffing, office, technology, AML tooling, and vendor onboarding. Founders often confuse these two buckets and under-budget the launch by focusing only on the capital number.

For planning purposes, many applicants model a first-year launch envelope in the range of roughly €430,000–€600,000+, depending on how much is built in-house, whether card or cross-border infrastructure is included, and how mature the AML/ICT stack already is. This is not a statutory number; it is a practical market-planning range and should be validated against the actual project scope.

Cost Bucket Low Estimate High Estimate What Drives Cost
Initial regulatory capital €350,000 €350,000 Hard-law entry capital for a full EMI. This is not a fee and should not be treated as disposable operating spend.
State application fee €1,463 €1,463 Application fee commonly referenced for a Lithuanian EMI filing.
Legal and regulatory preparation €20,000 €50,000+ Depends on the complexity of the business model, number of jurisdictions, outsourcing footprint, and whether MiCA or card-program elements are in scope.
Audit, accounting, and finance setup €8,000 €20,000 Includes external audit planning, accounting design, and reporting setup; recurring cost continues after launch. See also /accounting/lithuania/.
AML, sanctions, and fraud tooling €5,000 €30,000+ Varies significantly by customer volume, screening vendors, KYC depth, and transaction-monitoring sophistication.
ICT, security, and vendor onboarding €10,000 €60,000+ Cloud, core ledger, access management, logging, BCP/DR, and integration work can materially change the budget.
Office and substance build-out €5,000 €25,000+ Physical office, local administration, and staffing create real substance cost even before scale.
Cost Bucket
Initial regulatory capital
Low Estimate
€350,000
High Estimate
€350,000
What Drives Cost
Hard-law entry capital for a full EMI. This is not a fee and should not be treated as disposable operating spend.
Cost Bucket
State application fee
Low Estimate
€1,463
High Estimate
€1,463
What Drives Cost
Application fee commonly referenced for a Lithuanian EMI filing.
Cost Bucket
Legal and regulatory preparation
Low Estimate
€20,000
High Estimate
€50,000+
What Drives Cost
Depends on the complexity of the business model, number of jurisdictions, outsourcing footprint, and whether MiCA or card-program elements are in scope.
Cost Bucket
Audit, accounting, and finance setup
Low Estimate
€8,000
High Estimate
€20,000
What Drives Cost
Includes external audit planning, accounting design, and reporting setup; recurring cost continues after launch. See also /accounting/lithuania/.
Cost Bucket
AML, sanctions, and fraud tooling
Low Estimate
€5,000
High Estimate
€30,000+
What Drives Cost
Varies significantly by customer volume, screening vendors, KYC depth, and transaction-monitoring sophistication.
Cost Bucket
ICT, security, and vendor onboarding
Low Estimate
€10,000
High Estimate
€60,000+
What Drives Cost
Cloud, core ledger, access management, logging, BCP/DR, and integration work can materially change the budget.
Cost Bucket
Office and substance build-out
Low Estimate
€5,000
High Estimate
€25,000+
What Drives Cost
Physical office, local administration, and staffing create real substance cost even before scale.
The most common budgeting error is to assume that €350,000 covers the project. It covers the initial capital threshold, not the full cost of becoming and operating as a supervised EMI.
Client funds protection

Safeguarding of client funds: the section most competitors oversimplify

Safeguarding is a core prudential obligation, not a back-office formality. A Lithuanian EMI that receives funds in exchange for e-money must protect those funds so that customer money is separated from the institution’s own assets and remains insulated in an insolvency scenario to the extent required by law and the safeguarding model used. In practice, the regulator will look for a safeguarding design that is legally sound, operationally executable, and supported by daily controls.

The most common model is segregation through dedicated safeguarding accounts with a credit institution, combined with reconciliation procedures that match incoming funds, issued e-money, pending settlements, fees, chargebacks, and redemptions. The difficult part is not writing that sentence in a policy; the difficult part is proving how the institution will classify funds at each stage of the payment lifecycle and who resolves breaks when ledger balances and bank balances diverge.

A strong safeguarding file usually explains at least four things clearly: when funds are deemed received, when e-money is issued, where safeguarded balances are held, and how the institution prevents operational funds from contaminating protected funds. It should also explain treatment of edge cases such as delayed bank postings, failed payouts, chargebacks, and redemption requests arriving around cut-off times.

Control Stack

Operational Controls That Must Exist Before Launch

Dedicated safeguarding account structure separated from the EMI's proprietary operating funds.
Documented trigger for when received funds become subject to safeguarding and when e-money is issued.
Daily or otherwise policy-defined reconciliation between ledger balances, bank balances, pending items, and customer liabilities.
Break management process with thresholds, escalation owners, and remediation timelines.
Clear treatment of fees, chargebacks, reversals, and failed outbound payments.
Redemption workflow showing how customer funds are paid out at par and recorded.
Insolvency-remoteness analysis and legal characterization of safeguarded balances.
Segregation between safeguarded customer funds and the EMI's operational treasury.
Management reporting on safeguarding breaks, aged exceptions, and reconciliation sign-off.
Technology and resilience

Technology, security, and DORA readiness for EMI applicants

In 2026, an EMI application without a credible ICT control environment is structurally weak. Since 17 January 2025, DORA has made ICT risk management, incident handling, operational resilience, and third-party oversight an explicit compliance layer for financial entities. For a Lithuanian EMI, this means the technology stack is part of the licensing perimeter, not a post-approval implementation detail.

The Bank of Lithuania will not expect every early-stage applicant to run a bank-scale infrastructure, but it will expect the institution to know its critical systems, data flows, dependencies, and failure points. That includes core ledger logic, customer onboarding, sanctions screening, transaction monitoring, access control, logging, backup, recovery, and vendor governance. If cards or acquiring are in scope, additional standards such as PCI DSS, scheme rules, and fraud controls become relevant. If the institution relies on SEPA rails, the operating model should also be consistent with ISO 20022 messaging and payment operations discipline.

A practical supervisory question is not whether the EMI uses vendors; almost all do. The question is whether the EMI can still govern critical risk if a vendor fails, degrades service, or changes subcontractors.

Area Control Owner
ICT governance Maintain an ICT governance framework with asset inventory, role ownership, risk taxonomy, and board-level reporting on critical systems. Board / CTO / risk
Access management Implement role-based access, joiner-mover-leaver controls, privileged access review, MFA where appropriate, and evidenceable approval trails. CTO / security
Logging and monitoring Retain system and security logs, define alert thresholds, and ensure suspicious operational events can be investigated end to end. Security / DevOps
Incident management Maintain incident classification, escalation, response, root-cause analysis, and regulatory reporting logic consistent with DORA obligations. Security / compliance / operations
Business continuity and disaster recovery Define backup, recovery objectives, failover responsibilities, and periodic testing for critical services and data restoration. CTO / operations
AML and sanctions systems Deploy customer screening, transaction monitoring, alert handling, and case management with documented tuning and ownership. MLRO / compliance / operations
Fraud prevention Implement fraud rules, velocity controls, device or behavioral signals where relevant, and escalation paths between first line and compliance. Operations / fraud / compliance
Outsourcing and third-party risk Keep a register of critical providers, perform due diligence, include audit and exit rights, and monitor concentration risk and subcontracting. Legal / procurement / CTO / compliance
Area
ICT governance
Control
Maintain an ICT governance framework with asset inventory, role ownership, risk taxonomy, and board-level reporting on critical systems.
Owner
Board / CTO / risk
Area
Access management
Control
Implement role-based access, joiner-mover-leaver controls, privileged access review, MFA where appropriate, and evidenceable approval trails.
Owner
CTO / security
Area
Logging and monitoring
Control
Retain system and security logs, define alert thresholds, and ensure suspicious operational events can be investigated end to end.
Owner
Security / DevOps
Area
Incident management
Control
Maintain incident classification, escalation, response, root-cause analysis, and regulatory reporting logic consistent with DORA obligations.
Owner
Security / compliance / operations
Area
Business continuity and disaster recovery
Control
Define backup, recovery objectives, failover responsibilities, and periodic testing for critical services and data restoration.
Owner
CTO / operations
Area
AML and sanctions systems
Control
Deploy customer screening, transaction monitoring, alert handling, and case management with documented tuning and ownership.
Owner
MLRO / compliance / operations
Area
Fraud prevention
Control
Implement fraud rules, velocity controls, device or behavioral signals where relevant, and escalation paths between first line and compliance.
Owner
Operations / fraud / compliance
Area
Outsourcing and third-party risk
Control
Keep a register of critical providers, perform due diligence, include audit and exit rights, and monitor concentration risk and subcontracting.
Owner
Legal / procurement / CTO / compliance
EEA rollout mechanics

Passporting, CENTROlink, and cross-border expansion

A Lithuanian EMI can expand across the EEA through passporting, but passporting is a notification-based market access mechanism, not a substitute for operational readiness. The institution must distinguish between freedom to provide services on a cross-border basis and establishment through a branch. The choice affects governance, local presence, customer support, and implementation sequencing.

Lithuania remains strategically relevant because of the Bank of Lithuania’s fintech infrastructure layer, especially CENTROlink, which can support access to SEPA Credit Transfer (SCT) and SEPA Instant Credit Transfer (SCT Inst). That said, access to SEPA infrastructure is not automatic with the license. The EMI still needs onboarding, technical readiness, compliance alignment, and operational capability to use the rails effectively.

Passporting should be planned together with AML segmentation, customer support language, complaints handling, sanctions coverage, and payment operations. Expansion fails more often from weak operating design than from the notification itself.

Topic Details Risk Note
Freedom to provide services Allows the Lithuanian EMI to serve customers in another EEA state without establishing a branch, subject to the passporting notification process. Cross-border service does not eliminate host-state consumer, marketing, or AML overlay considerations.
Branch establishment Used where the expansion model requires a more permanent local presence, local staff, or operational footprint in another EEA state. A branch can increase governance, reporting, and local compliance complexity.
CENTROlink and SEPA access CENTROlink can reduce dependence on correspondent structures by providing access to SEPA schemes, including SCT and SCT Inst, where the EMI meets onboarding and operational criteria. License approval alone does not guarantee acceptance into infrastructure or immediate production connectivity.
Instant payments competitiveness In 2026, euro instant payments are increasingly a commercial and operational baseline rather than a premium feature for many fintech models. Institutions that design only for batch settlement may face both market pressure and additional remediation later.
IBAN and account products A Lithuanian EMI can structure IBAN-led payment account products where its banking, scheme, and infrastructure arrangements support the model. IBAN capability depends on the actual account and payment architecture, not on marketing language.
Topic
Freedom to provide services
Details
Allows the Lithuanian EMI to serve customers in another EEA state without establishing a branch, subject to the passporting notification process.
Risk Note
Cross-border service does not eliminate host-state consumer, marketing, or AML overlay considerations.
Topic
Branch establishment
Details
Used where the expansion model requires a more permanent local presence, local staff, or operational footprint in another EEA state.
Risk Note
A branch can increase governance, reporting, and local compliance complexity.
Topic
CENTROlink and SEPA access
Details
CENTROlink can reduce dependence on correspondent structures by providing access to SEPA schemes, including SCT and SCT Inst, where the EMI meets onboarding and operational criteria.
Risk Note
License approval alone does not guarantee acceptance into infrastructure or immediate production connectivity.
Topic
Instant payments competitiveness
Details
In 2026, euro instant payments are increasingly a commercial and operational baseline rather than a premium feature for many fintech models.
Risk Note
Institutions that design only for batch settlement may face both market pressure and additional remediation later.
Topic
IBAN and account products
Details
A Lithuanian EMI can structure IBAN-led payment account products where its banking, scheme, and infrastructure arrangements support the model.
Risk Note
IBAN capability depends on the actual account and payment architecture, not on marketing language.
Where files fail

Common reasons EMI applications are delayed or rejected

Most EMI files are not delayed because the law is unclear; they are delayed because the application does not prove that the institution can be supervised safely. The Bank of Lithuania typically looks for coherence between product design, governance, safeguarding, financial assumptions, and ICT control. When those elements do not align, the file starts to look like a concept pitch rather than a regulated institution.

The fastest way to weaken an EMI application is to understate operational complexity. A wallet business is not just a user interface plus a partner bank. It is a regulated liability model with redemption rights, safeguarding, AML surveillance, reconciliation discipline, outsourcing control, and incident governance. If the application treats those as outsourced afterthoughts, the regulator will usually ask who is actually in control.

Incomplete or internally inconsistent application file

High risk

Legal risk: The supervisory review may not progress efficiently because the regulator cannot assess the real business perimeter or control model.

Mitigation: Run a consistency review across the program of operations, financial model, AML policy, safeguarding policy, and ICT architecture before submission.

Weak safeguarding architecture

High risk

Legal risk: If customer-funds protection is vague, the regulator may doubt whether the institution can lawfully issue and protect e-money.

Mitigation: Document account structure, reconciliation logic, exception handling, and ownership of daily safeguarding controls in operational detail.

Unclear source of funds or opaque ownership chain

High risk

Legal risk: Fit-and-proper and AML concerns can arise at shareholder and UBO level, undermining the entire application.

Mitigation: Prepare a clean ownership map, source-of-funds evidence, and adverse-media screening pack early in the project.

Management team lacks relevant regulated payments experience

High risk

Legal risk: The regulator may conclude that governance is not credible for the scale or risk of the proposed business.

Mitigation: Appoint experienced executives and control-function holders with real time commitment and clear role ownership.

Critical outsourcing without effective oversight

High risk

Legal risk: The institution may appear unable to control essential functions, creating governance and DORA-related concerns.

Mitigation: Maintain a critical-outsourcing register, due diligence, contractual controls, KPIs, incident escalation, and exit planning.

Unrealistic financial projections

Medium risk

Legal risk: Aggressive assumptions can call into question viability, prudential planning, and the credibility of the business plan.

Mitigation: Use conservative ramp-up assumptions, stress scenarios, and a prudential narrative that explains capital resilience.

Minimal local substance

Medium risk

Legal risk: If Lithuania is used only as a formal seat while control sits elsewhere, the supervisory home-state logic becomes weak.

Mitigation: Evidence local office, local management availability, governance cadence, and real decision-making in Lithuania.

License strategy options

Build your own Lithuanian EMI or use an alternative route

The best route depends on timing, control, and product ambition. Building a Lithuanian EMI gives maximum regulatory control and long-term enterprise value, but it requires capital, governance maturity, and patience. Using a partner EMI or acquiring an existing platform can accelerate market entry, but those options usually limit product flexibility, margin control, or integration independence.

The strategic mistake is to choose only on speed. Founders should decide based on whether the business needs its own balance-sheet perimeter, its own safeguarding model, and its own passporting strategy. If the answer is yes, building or acquiring a regulated perimeter may be justified. If the answer is no, a partner model can be rational while the product proves demand.

Option Advantages Limitations Best For
Build a new Lithuanian EMI Full control over product perimeter, safeguarding model, governance, passporting strategy, and long-term regulatory asset creation. Requires €350,000 initial capital, full licensing project, management build-out, and ongoing compliance overhead. Groups building wallets, stored-value products, embedded finance, or multi-market account infrastructure with long-term scale plans.
Operate under a partner EMI / BaaS model Faster market entry, lower upfront regulatory burden, and ability to test product-market fit before building a regulated institution. Lower control over pricing, compliance perimeter, product roadmap, customer terms, and infrastructure dependencies. Early-stage fintechs validating demand or launching a narrow feature set before committing to own authorization.
Acquire or invest in an existing regulated platform Potentially faster than greenfield licensing if the target is clean, operational, and strategically aligned. Requires deep legal, regulatory, AML, financial, and technology due diligence; hidden liabilities can outweigh speed benefits. Well-capitalized groups with M&A capability and a clear post-acquisition integration plan.
Option
Build a new Lithuanian EMI
Advantages
Full control over product perimeter, safeguarding model, governance, passporting strategy, and long-term regulatory asset creation.
Limitations
Requires €350,000 initial capital, full licensing project, management build-out, and ongoing compliance overhead.
Best For
Groups building wallets, stored-value products, embedded finance, or multi-market account infrastructure with long-term scale plans.
Option
Operate under a partner EMI / BaaS model
Advantages
Faster market entry, lower upfront regulatory burden, and ability to test product-market fit before building a regulated institution.
Limitations
Lower control over pricing, compliance perimeter, product roadmap, customer terms, and infrastructure dependencies.
Best For
Early-stage fintechs validating demand or launching a narrow feature set before committing to own authorization.
Option
Acquire or invest in an existing regulated platform
Advantages
Potentially faster than greenfield licensing if the target is clean, operational, and strategically aligned.
Limitations
Requires deep legal, regulatory, AML, financial, and technology due diligence; hidden liabilities can outweigh speed benefits.
Best For
Well-capitalized groups with M&A capability and a clear post-acquisition integration plan.
FAQ

FAQ about EMI license in Lithuania

These answers address the questions founders, legal teams, and investors most often ask when assessing a Lithuanian EMI project in 2026.

What is the minimum capital for an EMI license in Lithuania? +

For a full Lithuanian EMI, the minimum initial capital is €350,000. This is the entry threshold under the electronic money regime and should be distinguished from ongoing own-funds requirements, which may need to be maintained above that level depending on the institution's activity.

How long does it take to get an EMI license in Lithuania in practice? +

A realistic end-to-end project usually takes 6–12 months. The often-cited formal review period of up to 3 months is generally relevant after the application is considered complete, so weak or inconsistent files can take materially longer.

What is the difference between an EMI and a PI in Lithuania? +

A PI provides payment services but does not issue electronic money. An EMI can issue e-money and also provide payment services. If the product requires customer balances, wallets, or reusable stored value, EMI is usually the relevant regime.

Can a non-resident obtain an EMI license in Lithuania? +

Yes, non-resident founders or groups may structure a Lithuanian EMI project, but the applicant still needs a Lithuanian legal entity, transparent ownership, lawful source-of-funds evidence, credible management, and sufficient local substance to satisfy the Bank of Lithuania.

Does a Lithuanian EMI need a local office? +

A physical office and genuine operational presence in Lithuania are typically expected in practice. Substance is assessed case by case, but purely nominal local presence is a common weakness in applications.

Can a Lithuanian EMI passport services across Europe? +

Yes. After authorization, a Lithuanian EMI may passport eligible services across the EEA through the applicable notification process, either on a cross-border basis or through a branch model.

Can a Lithuanian EMI get direct SEPA access? +

Potentially yes, including through the Lithuanian infrastructure ecosystem such as CENTROlink, but access is not automatic with the license. The EMI must still satisfy onboarding, technical, compliance, and operational requirements.

Can an EMI issue cards and IBAN accounts? +

An EMI can support card and IBAN-led products where the operating model, banking arrangements, scheme participation, and infrastructure setup lawfully support those services. The license alone does not create every operational capability automatically.

Can a Lithuanian EMI issue stablecoins under MiCA? +

An EMI may be a necessary type of issuer for an e-money token under MiCA, but EMI authorization alone is not sufficient. The issuer must still comply with the relevant MiCA obligations, including the EMT-specific layer such as disclosure, reserve, and redemption requirements.

What ongoing obligations apply after authorization? +

A Lithuanian EMI should expect ongoing prudential, AML/CTF, safeguarding, governance, reporting, audit, outsourcing, and ICT resilience obligations. In 2026, DORA-related incident governance and third-party oversight are part of the practical compliance baseline.

What taxes apply to an EMI company in Lithuania in 2026? +

Tax treatment should be confirmed against current official guidance from the Lithuanian tax authority and case-specific advice. Corporate income tax, VAT treatment of financial services, withholding tax, payroll taxes, and transfer-pricing issues may all be relevant depending on the structure.

What usually causes delays in EMI applications? +

The most common causes are incomplete files, weak safeguarding design, unrealistic financials, opaque source of funds, thin local substance, and over-reliance on outsourced providers without credible oversight.

Need a Practical Readout?

Need a Lithuania EMI licensing roadmap built around your business model?

A workable EMI project starts with perimeter accuracy, not document volume. If your model involves wallets, stored balances, IBAN-led accounts, merchant settlement, or a future MiCA / EMT layer, the next step is to map the license scope, capital path, safeguarding architecture, governance, and rollout sequence before drafting the filing.

Confidential - No obligation - Response within 24 hours