Crypto License in Czech Republic

Primary MiCA CASP Authorisation Services in the Czech Republic

MiCA CASP authorisation in the Czech Republic is a regulated market-entry project, not a formal filing. It requires a controlled operating build that can withstand Czech National Bank (CNB) supervision, banking scrutiny, and continuous post-authorisation oversight.

We provide end-to-end MiCA CASP authorisation services in the Czech Republic for crypto exchanges, custody providers, brokers, and platform operators. Our role is to design and execute the full authorisation process as an integrated regulatory project — from service classification and capital structuring to governance build, AML/CTF implementation, ICT resilience, and CNB submission management.

The outcome is not a set of policies, but a licensed and operationally ready CASP: with a defensible service perimeter, inspectable controls, fit-and-proper management structure, and an operating model that can be demonstrated under supervisory questioning. Where a business previously operated under a pre-MiCA local regime, we manage continuity and transition to avoid operational disruption during CNB review.

Authorisation is treated as infrastructure. We align legal permissions, governance, technology, and compliance execution so the business can operate lawfully in the Czech Republic and scale across the EU under MiCA passporting — without rebuilding the structure under pressure later.

Request a scope review to confirm your service perimeter and authorisation path.

Who This Service Is For

  • Exchanges and brokers providing execution, exchange, and order handling

  • Custody / wallet operators and administrators of crypto-assets

  • Platforms with retail client exposure and high transaction velocity

  • Groups relocating into an EU MiCA base with cross-border provision plans

  • Businesses transitioning from pre-MiCA local arrangements into CASP authorisation


What You Get

A complete MiCA CASP authorisation programme designed around CNB supervisory expectations, including documentation, evidence, governance build, and submission management.


Deliverables

Authorisation Strategy and Scope

  • Service scope memo (MiCA service mapping) aligned with your operational flows

  • Asset perimeter note (EMTs / ARTs / other crypto-assets; exclusions and boundary cases)

  • Operating flow maps (onboarding → funding → execution/custody → withdrawals → complaints/incidents)

  • Prudential and organisational requirement mapping based on final scope

Capital and Financial Resilience

  • Minimum own-funds threshold determination based on service scope

  • Capital structuring and evidence pack (source, unencumbered nature, ownership checks)

  • Financial plan narrative aligned to operational reality (viability, buffers, cost base)

  • Internal capital planning framework (presented as governance best practice, not banking Pillar logic)

Governance and Control Framework

  • Governance charter, roles, delegations, committee terms, reporting cadence

  • Fit-and-proper evidence pack for management and key function holders

  • Conflicts of interest policy, registers, and independence safeguards for control functions

  • Outsourcing governance (criticality assessment, oversight, audit/access rights, exit planning)

  • Complaints handling framework with MI reporting and corrective-action loop

AML/CTF Operating System

  • AML/CTF policy and procedures (CDD/EDD, ongoing monitoring, sanctions/PEP)

  • Enterprise-wide risk assessment (EWRA) with scoring methodology and escalation triggers

  • SoF/SoW standards proportionate to risk tier and turnover patterns

  • STR/SAR escalation playbook aligned to Czech FIU processes (FAÚ), including non-tipping-off controls

  • Training plan, record-keeping discipline, evidence logs for inspection readiness

ICT Risk and DORA-Aligned Operational Resilience

  • ICT governance: access control, change management, secure SDLC principles

  • Incident management framework and supervisory engagement playbook

  • BIA, BCP/DRP with RTO/RPO rationale and proportionate testing plan

  • Third-party ICT risk framework with contractual clauses and tested exit strategy

  • Security monitoring, vulnerability management, remediation governance

Client Asset Safeguarding

(Where custody/administration is in scope)

  • Segregation and reconciliation model, discrepancy escalation routines

  • Wallet/key management governance (multi-control approvals, logging, least privilege)

  • Incident response for compromise/loss scenarios and client communication rules

  • Risk mitigation options, including insurance feasibility assessment where appropriate

Submission Management and Supervisory Dialogue

  • Application assembly, completeness review preparation, version control

  • Structured responses to CNB Q&A with traceability to evidence and operating reality

  • Inspection readiness: evidence room, walkthrough scripts, personnel preparation

Cross-Border Provision Under MiCA

  • Passporting plan (target Member States, distribution model, readiness constraints)

  • Notification package preparation aligned with MiCA procedures

  • Host-state operating consistency map (scope discipline, disclosures, marketing controls)


How We Work

Step 1 — Scope and Operating Reality

We confirm your service perimeter and operational flows, identify custody exposure, outsourcing dependencies, client type, transaction velocity, and cross-border footprint. Output: scope memo + flow maps.

Step 2 — Gap Analysis and Authorisation Blueprint

We map your current state to MiCA requirements and CNB supervisory expectations, define the documentation architecture, evidence needs, staffing plan, and governance design. Output: blueprint + workplan + evidence register.

Step 3 — Build the Application Pack as an Operating System

We draft and integrate policies, procedures, registers, and process descriptions so they are enforceable and internally consistent — not “paper compliance”. Output: full documentation suite + implementation mapping.

Step 4 — Fit-and-Proper and Control-Function Readiness

We structure accountability, independence safeguards, and competence evidence; propose mitigations where gaps exist (hiring, outsourcing, training). Output: suitability pack + role maps + reporting lines.

Step 5 — ICT/DORA Alignment and Resilience Proof

We align incident handling, BCP/DRP, third-party ICT governance, and change management with DORA-aligned expectations, proportionate to your model. Output: resilience framework + testing plan + provider controls.

Step 6 — Submission and CNB Dialogue Management

We manage submission assembly, completeness review readiness, and supervisory Q&A. Output: controlled submission set + response management + version governance.

Step 7 — From Authorisation to Steady State

We convert the approved framework into ongoing compliance routines: MI dashboards, periodic reviews, training, audits, change governance, and regulatory engagement standards. Output: steady-state operating model.


Typical Timeline

Timelines depend on scope complexity, existing maturity, and availability of evidence, staffing, and ICT controls. Most projects progress through structured workstreams in parallel: scope → pack build → readiness → submission → supervisory Q&A.


What CNB Typically Tests

  • Whether the service perimeter is precise and consistent across documents

  • Whether governance is real: accountability, independence, reporting cadence

  • Whether AML controls work operationally (EWRA, SoF/SoW, monitoring, escalation evidence)

  • Whether ICT risk and outsourcing are controlled and exit plans are credible

  • Whether custody safeguarding (if applicable) is demonstrable and auditable

  • Whether disclosures and client protection are embedded in processes, not slogans

Request a Czech MiCA Authorisation Assessment

Regulatory Entry Strategy for Different Business Models

Exchange and Execution Platforms

For exchange and execution models, CNB scrutiny typically concentrates on how orders are received, matched, executed, and settled, and whether the platform can demonstrate fair client treatment under stress conditions. In practice, the regulator wants to see that your operating model is not built on “black box” decision-making. If your venue includes internal matching, routing to external liquidity, or hybrid execution logic, the rules must be translated into a verifiable process: who can change routing parameters, how conflicts of interest are prevented, and how the firm evidences best execution logic in the context of crypto-market fragmentation.

A defensible model describes the operational truth: the full trade lifecycle, price formation sources, the mechanics of spreads and fees, and the controls that prevent abusive execution practices. This is not a purely legal exercise. A platform that cannot demonstrate controlled governance over listing decisions, market integrity monitoring, and incident response will struggle during supervisory dialogue.

Where the platform serves retail clients, the regulator’s focus expands beyond “what you do” to “how you manage harm”. This includes volatile market conditions, client behaviour under stress, mis-selling risks, and complaint patterns. The expected outcome is not perfection, but an operating system that can detect and correct issues early — and prove it with evidence logs.

Custody and Administration Models

Custody changes the risk profile materially. CNB will test whether safeguarding is built as a controlled environment rather than a set of statements. The core question is simple: can you demonstrate that client assets are protected against internal misuse, external compromise, operational error, and stress-driven withdrawal events — and that your procedures would work under real conditions?

A custody model must define wallet architecture, key governance, access control, segregation logic, reconciliation routines, and incident response. It must also show how custody integrates with onboarding, transaction monitoring, sanctions screening, and de-risking controls for withdrawals. A common failure pattern is building a technically sophisticated custody setup but leaving governance weak — unclear authority thresholds, missing logging discipline, and undocumented exception handling.

We treat custody as a regulated operating environment with traceability. That means decisions must be reconstructible: why an address was whitelisted, why a withdrawal was approved, what checks were run, who approved an override, and what evidence was retained. This is the difference between “policy compliance” and inspection readiness.

Brokerage, Advice, and Client-Facing Complexity

Where brokerage or advice is provided, the regulatory burden shifts into suitability and appropriateness logic and the prevention of misleading communications. CNB will examine whether the client-facing process matches what is declared: the actual prompts, questions, scoring logic, and override governance.

Advice in crypto is rarely treated as “traditional” advice, but if you are making recommendations or presenting curated lists and signals, your risk shifts. The expectation is that you can demonstrate fair treatment, risk disclosure quality, and a process that does not push clients into products they cannot understand. This also includes internal training discipline, remuneration controls, and compliance oversight of marketing.


CNB Documentation Pack as a Single Operating System

Why “Integrated” Matters

Most failed applications are not rejected because a policy is missing. They fail because the documentation is internally inconsistent. The business plan says one thing, AML policy assumes another, the IT framework describes systems that do not exist, and the governance chart assigns responsibilities that cannot operate. CNB supervision is increasingly oriented toward coherence: does the story match the operating reality?

An integrated pack means each part reinforces the other. Operational flow maps are not decorative — they drive AML monitoring logic, incident handling, safeguarding routines, and outsourcing control. Role descriptions are not HR documents — they define accountability under supervisory scrutiny. Evidence artefacts are not appendices — they prove that controls can be executed and audited.

Evidence Design and Auditability

A credible pack does not only define policies; it defines evidence. In other words: what will you be able to show CNB during a meeting, inspection, or written request? This includes decision logs, approval trails, exception registers, incident reports, training attendance and testing, and reconciliation proofs.

We structure each framework with a clear evidence model: what is generated, by whom, at what frequency, how it is stored, and how it can be retrieved. This turns compliance into an operational discipline rather than a “compliance function”.


Service Scope Discipline and “Boundary Safety”

Avoiding Uncontrolled Scope Drift

CASPs often drift into activities that create regulatory exposure without recognising it: informal brokerage, quasi-advice, facilitation of third-party promotions, or unclear involvement in token issuance and marketing. The problem is not ambition. The problem is mismatch between authorised scope and actual behaviour.

A money-hub page must communicate that your service includes scope discipline. That means we define boundaries: what you do, what you do not do, and under what governance you can expand. We implement a controlled change management framework that prevents accidental perimeter expansion.

Asset Perimeter and Token Categories

MiCA differentiates token categories and imposes distinct obligations. Even if you do not issue tokens, your platform may support EMTs or ARTs. This affects risk disclosure, custody logic, and operational monitoring. We document how asset categories are identified in systems, how risks are communicated, and how restrictions are enforced.

Where boundary cases exist, we prepare legal analysis notes to support CNB dialogue. The objective is to avoid ambiguity and to prevent unplanned exposure.


Supervisory Dialogue: Building for Q&A, Not Just Submission

CNB Review as an Iterative Process

CNB authorisation is best understood as structured dialogue. The completeness review tests whether the file is coherent and well-formed; the subsequent Q&A tests whether the operating model holds under stress questions. Firms that treat the submission as a “one-time delivery” often struggle because their own internal teams cannot explain the operating reality consistently.

We manage the file with version discipline and Q&A readiness. When CNB asks how a control works, the answer must be supported by process descriptions, evidence artefacts, system configurations, and role accountability. This is why we build walkthrough scripts for AML, custody (if applicable), incident response, and complaints handling.

Inspection Readiness as a Commercial Advantage

Inspection readiness is not only regulatory risk control; it is commercial advantage. Payment providers, banks, institutional counterparties, and major liquidity partners evaluate you through similar lenses: governance maturity, transaction transparency, and control enforceability. A CASP that can demonstrate readiness typically achieves better banking outcomes and lower counterparty friction.


Banking and Payments Readiness as a Core Workstream

Why Banking Is a Licensing Constraint

Even with a strong regulatory file, a CASP that cannot secure stable fiat rails is operationally fragile. Banks and payment institutions apply their own de-risking frameworks. They care about customer types, exposure to high-risk geographies, transaction velocity, and whether your monitoring and escalation procedures are credible.

We treat banking readiness as a parallel build, not a post-authorisation afterthought. That includes payment flow mapping, segregation between client funds and revenues, reconciliation discipline, and contingency planning for payment disruption.

Payment Flow Transparency and De-Risking Controls

A defensible payment architecture explains end-to-end flows: client deposits, internal allocation, settlement to liquidity providers, fees, and withdrawals. It also defines controls that prevent misuse: limits, enhanced checks, escalation triggers, and exception governance.

We document how you prevent “pass-through” patterns that banks consider suspicious, how you manage merchant and third-party payment risks, and how you maintain consistent narratives across compliance, finance, and operations.


Client Onboarding as a Risk Filter, Not an Intake Form

Acceptance Criteria and Rejection Governance

Regulators and banks both expect that not every client is acceptable. The ability to reject and exit clients is part of compliance maturity. We implement a gatekeeping model: acceptance criteria approved by governance, exclusion lists, risk-based onboarding depth, and reproducible decisions.

Rejection must be operationally possible — not only theoretically allowed. That requires process design, tool support, and staff training. Borderline cases must have escalation paths and documented rationale.

KYC Refresh and Lifecycle Reviews

Client risk changes over time. We design periodic and event-driven refresh models: triggers based on transaction behaviour, adverse media, geography shifts, and changes in ownership or control for corporate clients. The objective is to prevent “stale KYC” — a common weakness in supervisory reviews.


Transaction Monitoring That Can Be Defended

Combining Rules and Behaviour

A credible monitoring approach combines structured rules with behavioural indicators. Over-reliance on static rules creates blind spots; purely behavioural monitoring without governance becomes untestable. We design a model that can be explained: why alerts are generated, how they are triaged, what thresholds exist, and how false positives are managed without compromising effectiveness.

Blockchain Analytics Governance (When Needed)

If blockchain analytics is required, CNB will be less interested in which tool you use and more interested in governance: selection rationale, calibration, validation, alert handling, and staff competence. We document tool governance without hard-coding vendor dependency, keeping the model flexible while still defensible.


Safeguarding and Withdrawal Controls Under Stress

Withdrawal Pressure Scenarios

Withdrawal stress is a core scenario for custody and platforms serving retail clients. A credible model includes authorization logic, limits, enhanced checks, and temporary restriction governance for extreme conditions. The key is proportionality: controls must protect clients without becoming arbitrary or abusive.

Reconciliation and Discrepancy Escalation

Safeguarding is proven through reconciliation. We document routines, frequency, escalation steps, and evidence logs. Discrepancies must trigger immediate investigation, senior oversight, and documented remediation. This is where many firms fail: they claim segregation but cannot show operational reconciliation discipline.


DORA-Aligned Operational Resilience That Reflects Reality

Critical Services and Dependency Chains

Operational resilience is not achieved by writing “we have BCP”. It requires defining critical services, dependencies, and recovery objectives with rationales. We build a BIA that maps systems, providers, and people, then defines RTO/RPO based on operational truth.

Incident Handling and Regulatory Engagement

Incident response must include classification, escalation, decision authority, and communication governance. The objective is not to claim unrealistic timelines; it is to show that the firm can detect incidents, contain impact, communicate responsibly, and remediate — with evidence.

Third-Party ICT Exit Strategy

Exit strategy is one of the most tested areas under DORA-aligned expectations. If your critical provider fails or becomes non-cooperative, can you migrate, replace, or operate in degraded mode? We implement tested exit planning, not paper statements.


Outsourcing and Intragroup: Control Without Illusions

Outsourcing Does Not Transfer Responsibility

Outsourcing is allowed, but it increases supervision intensity. CNB will test whether you retain control: governance, audit rights, access to logs, incident support, and termination capability.

Intragroup Services and Transparency

Where group entities provide services (e.g., development, customer support, compliance support), the arrangements must be contractually documented, priced in a defensible way, and subject to oversight. The key principle: regulated responsibility must remain inside the CASP.


Conduct of Business and Marketing Controls

Balanced Disclosures and Fee Transparency

CASPs must demonstrate that disclosures are understandable, accurate, and updated. Fees must be transparent, including indirect elements. Risk warnings must not be buried.

Marketing Governance

Marketing is increasingly scrutinised in crypto. We implement review workflows, claim substantiation standards, and controls preventing misleading messaging. This protects both the authorisation file and long-term reputation.


Product Governance and Token Listing Controls

Listing as a Governance Event

Token listing (if relevant) is not only a commercial decision; it is a governance event. CNB will expect that listing decisions are supported by documented criteria, conflict-of-interest controls, and monitoring of outcomes.

Lifecycle Monitoring and Withdrawal

Product governance includes monitoring complaint trends, incidents, and client outcomes. If a product generates disproportionate harm or risk, the firm must have the ability to restrict, modify, or withdraw it with controlled client communication.


Data Governance and Record-Keeping That Survives Inspection

Traceability and Retention

MiCA and AML obligations rely on data integrity. The firm must be able to reconstruct what happened, why decisions were made, and what evidence supports those decisions. We define retention logic that aligns with AML and privacy constraints, supported by access control and audit trails.


Post-Authorisation: Steady-State Compliance as an Operating Model

MI Dashboards and Governance Cadence

After authorisation, CNB expects ongoing oversight. We design management information that supports board-level supervision: AML indicators, incident metrics, complaint trends, safeguarding reports, outsourcing risk status, and training completion.

Change Management and Regulatory Notifications

Growth creates regulatory risk when changes are uncontrolled: new services, new assets, new markets, new providers, or new key persons. We implement a change governance model that identifies material changes early and structures CNB engagement with impact assessments.

Treasury, Liquidity, and Balance-Sheet Governance

Treasury as a Regulated Risk Function

For CASPs, treasury is not a back-office utility. It is a regulated risk function that directly affects client protection, liquidity stability, and conflict-of-interest exposure. CNB supervision increasingly evaluates whether treasury operations are governed, restricted, and aligned with the firm’s risk appetite rather than driven by opportunistic yield-seeking behaviour.

A credible treasury framework clearly separates proprietary assets from client assets at both legal and operational levels. It defines which assets may be held, for what purpose, under what limits, and with what approval thresholds. Where proprietary trading is permitted, it must be constrained by exposure limits, segregation from client order flow, and oversight mechanisms that prevent informational advantage or market abuse.

The supervisory question is not whether treasury exists, but whether it is controlled. Firms that treat treasury informally often fail to demonstrate how liquidity decisions are made, how risks are monitored, and how losses would be absorbed without client detriment.

Liquidity Buffers and Stress Governance

Liquidity planning under MiCA is not limited to minimum capital thresholds. CNB expects management to understand how liquidity behaves under adverse scenarios: mass withdrawals, banking disruption, market illiquidity, or operational outages.

We design liquidity governance that links stress scenarios to decision-making. This includes defining liquidity buffers, escalation thresholds, and management actions under stress. Importantly, the framework must demonstrate that management has pre-agreed responses rather than improvising during a crisis.

Liquidity stress testing is not presented as a mathematical exercise but as a governance tool. Scenarios are selected based on the firm’s actual operating model, client composition, and asset mix. Results are documented, reviewed, and used to justify liquidity decisions.


Conflict-of-Interest Architecture Beyond Formal Policies

Structural Conflicts in Crypto Businesses

Crypto business models inherently create conflicts: market-making alongside client execution, token listings tied to commercial incentives, proprietary positions in supported assets, or intragroup arrangements that blur accountability. CNB supervision focuses on whether these conflicts are recognised, mitigated, and monitored — not merely disclosed.

A defensible conflicts framework maps conflicts structurally. It identifies where incentives diverge from client interests, where information asymmetry exists, and where decision-making authority could be misused. Controls then follow: separation of functions, disclosure standards, approval governance, and monitoring.

Monitoring and Evidence of Effectiveness

Policies alone are insufficient. CNB expects evidence that conflicts controls work in practice. This includes registers, decision logs, periodic reviews, and escalation records. For example, a token listing decision should be traceable: who proposed it, what conflicts were identified, how they were mitigated, and who approved the final decision.

The objective is not to eliminate all conflicts — which is unrealistic — but to demonstrate disciplined governance that prevents abuse and supports client trust.


Market Integrity Framework for Trading Platforms

Surveillance as an Operating Capability

For platforms facilitating trading, market integrity is a supervisory priority. CNB recognises the unique challenges of crypto markets — fragmented liquidity, algorithmic trading, and high volatility — but expects CASPs to implement proportionate surveillance.

A credible surveillance framework defines what behaviours are monitored, how alerts are generated, and how investigations are conducted. This includes detection of wash trading, spoofing, layering, and abuse of privileged information. Surveillance must be supported by escalation procedures linking alerts to compliance review and potential remedial action.

Governance Over Listings and Market Changes

Market integrity is closely linked to listing governance and platform changes. CNB will examine whether listings, delistings, fee changes, and technical updates are managed transparently and without undue advantage to insiders. Controls should include insider lists, restricted access to sensitive information, and employee trading rules.

Effectiveness is measured by outcomes: whether suspicious behaviour is identified, investigated, and addressed — and whether management oversight is demonstrable.


Complaints, Client Outcomes, and Supervisory Signals

Complaints as a Governance Indicator

CNB increasingly treats complaints data as a signal of governance quality and client protection culture. A low volume of complaints is not automatically positive if it reflects barriers to submission or poor transparency. The regulator focuses on whether complaints are handled fairly, consistently, and used to improve controls.

A robust complaints framework defines intake channels, acknowledgment timelines, investigation steps, escalation criteria, and outcome documentation. It also requires senior management oversight and integration into risk management.

Feedback Loops and Remediation

Complaints should inform change. We design feedback loops where complaint trends trigger product reviews, disclosure updates, training, or control enhancements. This demonstrates to CNB that the firm learns from client outcomes rather than treating complaints defensively.


Marketing, Promotions, and Public Communications Governance

Heightened Scrutiny Under MiCA

MiCA significantly increases scrutiny of crypto marketing practices. CNB supervision extends beyond misleading claims to structural governance: who approves marketing, how claims are substantiated, and how risk disclosures are presented.

Marketing governance must ensure that promotional materials reflect actual services, risks, and limitations. Overly optimistic language, selective presentation of benefits, or outdated disclosures create regulatory risk even absent intent to mislead.

Approval Workflows and Evidence

We implement approval workflows where compliance reviews marketing before publication. Evidence of review, changes, and approvals is retained. This applies to websites, social media, affiliate materials, and partner communications.

The objective is to align public messaging with authorised scope and operational reality — reducing both regulatory and reputational exposure.


Data Architecture, Analytics, and Supervisory Transparency

Data as the Backbone of Compliance

MiCA and AML frameworks rely on data integrity. CNB expects CASPs to demonstrate that data used for monitoring, reporting, and decision-making is accurate, consistent, and traceable.

We design data governance that defines sources, ownership, validation checks, and reconciliation processes. This includes alignment between transactional systems, AML tools, accounting records, and management reports.

Supervisory Access and Explainability

During inspections, CNB may request data extracts, reconciliations, or historical records. Systems must support timely retrieval and explanation. The inability to explain discrepancies is treated as a control failure, not a technical issue.


Accounting, Valuation, and Financial Reporting Controls

Crypto-Asset Valuation Discipline

Valuation of crypto-assets introduces risk due to volatility, fragmented markets, and pricing anomalies. CNB supervision focuses on whether valuation sources are defined, monitored, and adjusted under stress.

A credible framework specifies approved pricing sources, fallback mechanisms, and controls against manipulation. Valuation decisions must be consistent and documented.

Client vs Proprietary Accounting

Clear distinction between client assets and proprietary holdings is essential. We design accounting logic that prevents commingling, supports reconciliation, and aligns with safeguarding claims. This is critical during audits, inspections, and crisis scenarios.


ESG, Sustainability, and Disclosure Risk

Emerging Supervisory Dimension

While MiCA is not primarily an ESG regulation, EU supervisory expectations increasingly include scrutiny of sustainability claims. CASPs issuing or promoting crypto-assets may face questions regarding environmental impact disclosures.

We implement pragmatic ESG governance that avoids overstatement. This includes allocating responsibility, documenting assumptions, and controlling sustainability messaging. The objective is risk mitigation, not marketing.


Group Structures and Regulatory Transparency

Complexity as a Supervisory Risk

CASPs operating within groups face heightened scrutiny. CNB examines whether group complexity obscures accountability, shifts risk, or undermines control over regulated activities.

We document group structures, decision-making authority, and intragroup dependencies. Intragroup agreements must be transparent, arm’s-length, and enforceable.

Ultimate Responsibility

Regardless of group arrangements, the CASP must retain ultimate responsibility for regulated services. This principle is reinforced throughout governance, contracts, and reporting.


Technology Development and Change Governance

Controlled Innovation

Crypto platforms evolve rapidly. CNB supervision does not prohibit innovation but requires control. Change management must ensure that updates are tested, approved, and reversible.

We design development governance that separates development, testing, and production environments, enforces approval workflows, and documents releases. Security testing and rollback procedures are critical components.

Alignment With DORA Expectations

Technology change governance aligns with DORA principles: resilience, traceability, and accountability. Uncontrolled releases are incompatible with supervisory expectations.


Privacy, Data Protection, and Regulatory Coordination

GDPR as a Parallel Obligation

MiCA authorisation does not override GDPR. CASPs must demonstrate lawful processing, minimisation, and protection of personal data. CNB may coordinate with data protection authorities where issues arise.

We design procedures for handling data subject rights while respecting AML retention obligations. Conflicts between regimes are resolved through documented legal analysis.


Supervisory Engagement, Inspections, and Thematic Reviews

Types of Engagement

CASPs should expect desk-based reviews, thematic inspections, and ad hoc requests. Preparedness reduces disruption and enforcement risk.

Inspection Readiness as a System

Inspection readiness is maintained through updated documentation, trained staff, and rapid evidence retrieval. We embed readiness into operations rather than treating inspections as exceptional events.


Enforcement Risk Mitigation and Remediation Governance

Early Detection and Self-Identification

CNB views proactive identification of weaknesses favourably. We implement issue tracking, escalation, and remediation frameworks that demonstrate governance maturity.

Remediation Oversight

Remediation plans must be approved, tracked, and validated. Repeat findings significantly increase enforcement risk and damage supervisory trust.


Regulatory Horizon Scanning and Change Readiness

Continuous Evolution

MiCA RTS/ITS, CNB guidance, and EU enforcement trends evolve. CASPs must monitor developments and adapt.

We implement horizon scanning and periodic framework reviews, ensuring that compliance remains current and credible.


Strategic Value of the Czech Republic as a MiCA Base

When the Czech Republic Works

The Czech Republic offers a credible MiCA supervisory environment when local substance is genuine, governance is effective, and compliance is operationally embedded. It is not a shortcut jurisdiction, but a stable base for disciplined operators.

Long-Term Positioning

CASPs that invest in integrated governance, resilience, and client protection are best positioned to scale across the EU, maintain banking relationships, and withstand regulatory scrutiny.


Final Commercial Perspective

MiCA CASP authorisation in the Czech Republic is a strategic commitment. Firms that approach it as infrastructure — not paperwork — gain more than a licence. They gain operational credibility, supervisory trust, and commercial resilience.

If your objective is regulated EU market access with a sustainable operating model, the Czech Republic can serve as a strong foundation — provided the build is disciplined, coherent, and real.

Request a scope review to define your authorisation path and readiness.

FAQ

The MiCA CASP license is the mandatory pan-European authorization. As of 2026, it is issued and supervised exclusively by the Czech National Bank (CNB), replacing the old VASP registration. 

No. The transitional period (grandfathering rights) has concluded. Operating solely under the old Trade License registration is illegal as of 2026, and any non-authorized entity will face severe consequences. 

The minimum initial capital requirement is tiered: €50,000, €125,000, or €150,000, depending on the class of services you intend to provide. 

The total process, from submission to final authorization, typically takes between 6 to 8 months. The pre-application preparation phase is also intensive. 

Once the CNB grants the license, the provider can automatically "passport" its authorized services to all other EU and EEA Member States without needing separate local licensing. 

You must appoint at least two Fit & Proper management board members. A qualified MLRO (Money Laundering Reporting Officer) and CCO (Compliance Officer) must also be appointed, with the CNB rigorously assessing their integrity and competence. 

Yes, but indirectly. The CASP license covers services related to issuance (e.g., placing/advice). However, the token issuance itself requires a separate MiCA White Paper approval from the CNB for that specific token, unless an exemption applies (e.g., small offering or utility token exemption). 

Regulatory Fees: CNB fees are generally modest. The primary cost stems from specialized legal, compliance, and IT consulting/auditing fees required to draft the comprehensive policy documentation, typically ranging from €50,000 to €150,000, depending on the firm’s complexity and the required MiCA class. 

MiCA governs regulation, not taxation. Crypto activities remain subject to standard Czech corporate and income tax laws. The CNB license increases the compliance burden but does not change the favorable tax treatment of capital gains on crypto (0% VAT applies to exchange/trading services). 

Outsourcing is permitted but requires strict contractual safeguards. The contract must grant the CNB and the CASP’s internal auditors full, unrestricted access to the service provider’s data and facilities for inspection. The CASP management remains fully accountable for the outsourced function's compliance.

Get in touch with our experts