Crypto License in Lithuania

MiCA CASP Authorisation in Lithuania

A MiCA crypto licence in Lithuania is not a procedural approval. It is a prudential authorisation that determines whether your business can operate as regulated financial infrastructure across the EEA. Supervisors do not assess documents in isolation. They assess whether governance, capital planning, AML controls, and technology form a coherent operating system that will remain stable under supervision, audits, and scale.

We provide end-to-end MiCA CASP authorisation in Lithuania as a structured regulatory build. The engagement starts by defining your actual service perimeter — exchange, custody, trading platform operation, order handling, or a combination — and mapping it to the MiCA obligations that will be enforced in practice. From there, we design and implement the operating framework regulators will test: decision-making authority, risk ownership, AML and financial crime controls, Travel Rule execution, IT security and resilience, capital logic, audit readiness, and supervisory reporting discipline.

The objective is not only approval. The objective is a Lithuanian-authorised CASP that can withstand ongoing oversight by the Bank of Lithuania and AML supervision without regulatory drift, internal contradictions, or post-licensing remediation. The structure is built to support MiCA passporting across the EEA while preserving a single home-state supervisory anchor and controlled tax and permanent-establishment exposure.

This service is designed for firms that require durable authorisation, institutional credibility, and a regulatory model that remains defensible as volumes, complexity, and scrutiny increase.

A Lithuanian crypto licence under MiCA is no longer a lightweight registration. It is a full prudential authorisation where your business is assessed as regulated financial infrastructure: governance, risk ownership, AML effectiveness, operational resilience, and the ability to operate under continuous supervisory pressure. The decisive question is not how well policies are written, but whether your real operating behaviour matches what you declare. If controls exist only on paper, without logs, escalation trails, monitoring outputs, and accountable decision-making, regulators treat this as a structural weakness.

We deliver MiCA CASP authorisation in Lithuania as an operational build, not a documentation exercise. We define your exact licensing perimeter (exchange, custody, trading platform, order reception and transmission, execution and related services), then construct the operating system regulators will test: capital logic, governance and fit-and-proper framework, AML/CTF controls, Travel Rule implementation, sanctions screening, IT security, business continuity, audit readiness, and evidence discipline.

The outcome is a Lithuanian-authorised CASP that can obtain approval and sustain it through inspections, audits, banking reviews, growth, and MiCA passporting across the EEA. This is a solution for firms that require approval that holds under pressure.


Who This Service Is For

Lithuania is appropriate for firms that understand that MiCA approval depends on operational maturity, not document volume. This includes spot exchanges and brokerage models, custodians holding client assets and keys, trading platforms operating matching engines, and international groups seeking a single EEA home-state authorisation with controlled passporting.


What You Receive

This engagement delivers a regulatory result, not a set of files. Your business model is translated into a form regulators can inspect, challenge, and continuously supervise without internal contradictions.

You receive:

  • a MiCA authorisation architecture aligned to your real services and risks;

  • a regulator-ready submission pack built to withstand supervisory Q&A;

  • an integrated operating framework where AML, risk, governance, and IT controls are consistent;

  • a passporting-ready EEA delivery model with managed permanent-establishment risk;

  • a post-authorisation operating cadence for reporting, audits, and supervisory interaction.


Deliverables

Licensing perimeter and authorisation architecture

We eliminate the common failure where the website, policies, and real operations describe different businesses. Services are defined through actual flows: client risk, transaction logic, custody boundaries, controls, monitoring, and reporting.

Included:

  • MiCA service classification and obligation mapping;

  • decision-making and accountability structure;

  • fiat and crypto flow mapping, custody contours, counterparty logic;

  • home-state / host-state operating model for EEA passporting.

AML/CTF as an operating system

In Lithuania, AML supervision focuses on effectiveness and evidence. Regulators expect demonstrable monitoring, case handling, escalation, and the ability to reconstruct decisions retrospectively.

We build:

  • AML risk assessment and a functional risk-based approach;

  • CDD and EDD procedures with clear triggers and thresholds;

  • source-of-funds and source-of-wealth logic aligned to risk and volume;

  • SAR/STR processes with documented decision ownership;

  • an evidence framework that supports inspections without ad-hoc reconstruction.

Travel Rule, sanctions, and unhosted wallets

Travel Rule compliance is treated as a technical and procedural capability, not a policy paragraph. We design a model that remains auditable without breaking the client journey.

Covered:

  • Travel Rule provider requirements and integration logic;

  • unhosted wallet risk treatment, additional checks, and limits;

  • sanctions, PEP, and adverse-media screening with freeze and reporting procedures.

Governance, fit & proper, and control functions

The Bank of Lithuania evaluates governance quality as the primary safeguard against failure. We design structures that are simple, defensible, and genuinely functional.

Deliverables include:

  • governance structure and reporting lines;

  • fit-and-proper framework for management, key functions, and qualifying holders;

  • decision-making and record-keeping discipline;

  • internal control and internal audit model proportionate to scale.

IT security, custody architecture, and resilience

For custody and trading platforms, technology becomes a supervisory object. Security, access control, logging, testing, and recovery must be demonstrable.

We deliver:

  • IT security framework, access management, logging, incident response;

  • custody architecture: HSM logic, signing controls, segregation of duties, key recovery;

  • business continuity and disaster recovery with RTO/RPO and stress-testing methodology;

  • audit-readiness and remediation tracking.


Process

Eligibility and scoping

We confirm whether Lithuania is the correct home state and define the exact licensing scope. Services, client types, markets, volumes, and risk drivers are mapped to supervisory expectations. The result is a clear execution plan and risk profile.

Operating build

Controls are built as working processes, not theoretical descriptions. Documents reflect how decisions are actually taken, monitored, and evidenced. This phase creates a coherent operating system rather than isolated policies.

Submission and supervisory dialogue

Submission is managed as an iterative process. We control consistency, versioning, and regulator responses so that answers do not create contradictions between AML, governance, and IT.

Pre-launch and post-authorisation readiness

After approval, supervision intensifies. We establish reporting routines, audit cycles, incident handling, and governance oversight so the licence remains stable under growth and scrutiny.


Timing and critical path

Timelines depend on business complexity and readiness, but the critical path is almost always operational maturity. Where monitoring, evidence discipline, or IT controls are missing, time increases due to system build-out — not because of documentation.


EEA Passporting Without Structural Tax Risk

Passporting only works if Lithuania remains the real centre of management, risk ownership, and decision-making. We structure expansion so that host-state activity remains auxiliary, preventing unintended permanent establishment while preserving supervisory coherence.


What We Need From You

We do not require “perfect documents.” We need your real operating model: services, client profile, markets, volumes, technology stack, custody model, and decision-makers. From this, we build a licence-ready, inspectable system.

Request a Crypto Licensing Assessment

Regulatory Reality in Lithuania Under MiCA

Lithuania’s transformation under MiCA is not cosmetic. The jurisdiction has moved from a notification-style AML registration regime into a supervisory model where crypto businesses are assessed in the same conceptual category as other regulated financial institutions. This shift changes how regulators interpret risk, responsibility, and credibility.

The practical implication is that a CASP is no longer evaluated at the moment of submission alone. The licensing decision is a forward-looking judgement about whether the firm can survive years of supervision without regulatory drift. Supervisors assess whether internal controls will continue to function when transaction volumes increase, when staff changes occur, when technology is stressed, and when unexpected incidents arise.

For applicants, this means that regulatory approval is inseparable from organisational maturity. Weak governance, unclear ownership of decisions, or fragmented compliance functions are treated as early indicators of future supervisory failure. The Lithuanian model therefore rewards firms that are built with institutional discipline from the outset, even if they are still at an early commercial stage.


Capital Logic and Financial Sustainability

Capital under MiCA is not a static threshold to be “parked” for approval. It is a dynamic supervisory metric used to test whether the business model is realistic, resilient, and proportionate to its risks.

Regulators assess capital adequacy in relation to fixed overheads, custody exposure, operational complexity, and the volatility inherent in crypto-asset markets. A business that plans rapid scale but presents a minimal capital structure signals a structural mismatch. Conversely, excessive or poorly explained capital can also raise questions about economic logic and risk allocation.

Financial projections are therefore treated as behavioural evidence. Revenue assumptions, cost development, staffing plans, and technology expenditure must align with the declared service scope. If a firm claims institutional custody but budgets minimal security, audit, or insurance costs, this inconsistency becomes a supervisory concern.

Capital planning must also anticipate stress. Supervisors expect firms to model adverse scenarios such as prolonged market downturns, client withdrawal spikes, or temporary loss of banking access. The question is not whether such events will happen, but whether the firm remains solvent and operationally coherent when they do.


Governance as a Supervisory Instrument

Governance under MiCA is not a formal board structure designed to satisfy statutory requirements. It is the primary mechanism through which regulators assess whether risk is genuinely controlled.

Decision-making authority must be clearly allocated and demonstrable in practice. Supervisors examine who approves high-risk clients, who authorises exceptions, who decides on new products, and how conflicts of interest are prevented. Informal or undocumented decision paths are treated as red flags, regardless of how well policies are drafted.

Effective governance also requires proportionality. Over-engineered committee structures for small firms often signal a lack of operational understanding. Conversely, under-governed structures in complex businesses indicate an inability to manage scale. The supervisory expectation is alignment between business complexity and governance depth.

Importantly, governance is continuously tested. Management changes, shareholder movements, and strategic pivots all trigger reassessment. Firms must therefore design governance that remains stable under change, not one that collapses when key individuals leave.


AML Effectiveness Beyond Formal Compliance

In the Lithuanian supervisory environment, AML compliance is assessed almost entirely through outcomes. Policies are relevant only insofar as they produce observable, reviewable results.

Supervisors focus on how risk assessments influence real decisions. They examine whether high-risk clients are genuinely treated differently, whether transaction monitoring generates meaningful alerts, and whether escalation leads to documented outcomes. A system that produces either no alerts or an unmanageable volume of low-quality alerts is treated as ineffective.

Source-of-funds and source-of-wealth controls are scrutinised particularly closely. Regulators expect firms to demonstrate not only that checks exist, but that staff understand when and how to apply them, how to challenge clients, and how to document conclusions. Boilerplate explanations or reliance on unsupported client statements undermine credibility.

Crucially, AML compliance is retrospective. Firms must be able to reconstruct why a client was accepted, why a transaction was allowed, and who approved it — months or even years later. Weak record retention or fragmented systems are therefore treated as systemic weaknesses, not minor technical issues.


Technology as a Regulated Control Layer

Under MiCA, technology is no longer a neutral operational tool. It is a regulated control layer that must support governance, AML, risk management, and resilience simultaneously.

Supervisors assess whether systems enforce rules automatically or merely reflect them in documentation. For example, transaction limits, segregation rules, and approval thresholds should be embedded into system logic wherever possible. Manual controls are permitted, but only where automation is genuinely impractical and where compensating controls exist.

Logging and audit trails are critical. Regulators expect complete, immutable records of user actions, administrative changes, approvals, and exceptions. The absence of reliable logs undermines the firm’s ability to prove compliance, even if no misconduct is identified.

Cybersecurity and resilience are evaluated not only through policies but through testing discipline. Incident simulations, penetration testing, and recovery exercises must be realistic and documented. A firm that has never tested its recovery assumptions cannot credibly claim operational resilience.


Custody Obligations as a Trust Model

For custodial services, MiCA effectively imposes a trust-style responsibility. Client assets must be protected against operational failure, fraud, and insolvency through both legal and technical mechanisms.

Supervisors examine whether custody architecture prevents single points of failure. Key management procedures, access controls, and segregation of duties must be designed so that no individual can compromise client assets unilaterally. Emergency and recovery procedures must exist and be tested.

Asset segregation is also a legal concept. Client assets must be clearly distinguished from the firm’s own assets in a way that remains enforceable under insolvency scenarios. This requires alignment between legal documentation, accounting treatment, and technical implementation.

Liability expectations under MiCA mean that custody failures are not treated as abstract risks. Firms must demonstrate financial and insurance capacity to compensate clients in the event of loss attributable to negligence or operational failure. This reinforces the requirement for conservative, institution-grade custody design.


Market Integrity for Trading Platforms

For firms operating trading platforms, MiCA introduces expectations comparable to traditional market infrastructure. Fair access, orderly trading, and abuse prevention are central supervisory themes.

Supervisors examine whether trading rules are enforced consistently and transparently. Preferential treatment, opaque execution logic, or undisclosed conflicts of interest undermine market integrity and can trigger enforcement action.

Surveillance capabilities are critical. Firms must demonstrate the ability to detect manipulative behaviour such as wash trading, spoofing, or coordinated abuse. The absence of credible surveillance is interpreted as an inability to protect market integrity, regardless of intent.

Equally important is governance around listings and market changes. Decisions affecting market structure must be documented, justified, and insulated from commercial pressure. Regulators expect firms to treat market integrity as a core responsibility, not a secondary compliance function.


Supervisory Interaction as an Ongoing Process

MiCA supervision in Lithuania is continuous. Approval marks the beginning of regulatory engagement, not its conclusion.

Firms are expected to maintain a consistent supervisory dialogue, responding promptly and coherently to information requests. Inconsistent answers, unexplained changes, or delayed responses erode trust and increase supervisory intensity.

Periodic reporting is not treated as a formality. Supervisors cross-check reports against operational reality, audit findings, and external information. Discrepancies are investigated, and repeated inconsistencies can escalate into enforcement actions.

Successful firms approach supervision as a structured process. They maintain internal reporting discipline, rehearse responses to potential issues, and treat regulatory communication as part of governance rather than an external burden.


Scaling Without Regulatory Drift

One of the most difficult challenges under MiCA is scaling without undermining the original approval assumptions.

As transaction volumes grow, client profiles change, or new markets are added, the original risk model may no longer be valid. Regulators expect firms to reassess and adjust controls proactively rather than waiting for supervisory intervention.

Staff growth also introduces risk. New employees must be trained, supervised, and integrated into the compliance culture. Informal knowledge held by early team members must be converted into documented procedures to prevent control erosion.

Technology scaling presents similar challenges. Systems that function well at low volumes may fail under stress. Regulators therefore expect capacity planning, performance testing, and continuous improvement as part of the compliance framework.


Lithuania as a Long-Term Regulatory Base

Lithuania’s value under MiCA lies in predictability rather than leniency. The jurisdiction rewards firms that treat regulation as infrastructure rather than friction.

A Lithuanian CASP that aligns governance, AML, technology, and financial planning can operate across the EEA with a single supervisory anchor. Conversely, firms that attempt to minimise substance or rely on formalistic compliance face increasing pressure as supervision intensifies.

For serious market participants, Lithuania offers a stable platform for building regulated crypto services that can integrate with banking, institutional clients, and future digital-finance developments. The cost of entry is discipline, but the reward is durability.

Supervisory Logic: How Lithuanian MiCA Reviews Are Actually Formed

Supervisory assessment under MiCA in Lithuania is not conducted as a checklist exercise. Regulators form a holistic judgement about the internal coherence of the applicant. This judgement emerges from cross-reading governance structures, AML controls, financial planning, and technology architecture. Weakness in one layer is rarely treated as isolated. Instead, supervisors evaluate whether weaknesses correlate across layers and point to a deeper organisational flaw.

For example, a weak AML escalation process is rarely interpreted as “only” an AML issue. Supervisors examine whether the same lack of ownership appears in governance, whether technology supports or undermines controls, and whether management understands the consequences of risk decisions. Approval therefore depends on consistency of institutional behaviour, not the formal adequacy of individual documents.

This supervisory logic explains why technically compliant but poorly integrated applications often stall. When different parts of the application imply different operational realities, regulators assume the firm itself does not yet fully understand its own risk profile. Under MiCA, uncertainty inside the firm is treated as a supervisory risk in itself.


Management Accountability and the End of Delegated Responsibility

MiCA fundamentally alters how responsibility is assigned inside a crypto firm. Delegation no longer removes accountability. Management bodies remain responsible for outcomes even where operational tasks are outsourced or technically delegated.

This is particularly relevant for compliance, transaction monitoring, custody infrastructure, and Travel Rule solutions. While vendors and service providers may perform technical functions, supervisors expect management to understand, control, and continuously evaluate those services. “Outsourced” is not a defence when failures occur.

Management accountability also extends to strategic choices. Decisions to enter new markets, onboard new client categories, or introduce new asset types must be demonstrably risk-assessed and approved through formal governance channels. Informal expansion or reactive growth is treated as a governance failure, not a commercial one.


Evidence Discipline as a Core Regulatory Asset

Under Lithuanian MiCA supervision, evidence is not a by-product of compliance. It is a core regulatory asset. The ability to produce timely, coherent, and complete evidence often determines the outcome of supervisory interactions.

Evidence includes logs, decision records, monitoring outputs, investigation files, audit trails, and internal communications related to risk decisions. Importantly, evidence must be internally consistent. A decision referenced in an AML file must be traceable to a governance approval or documented authority. A system action must correspond to a policy rule and a technical control.

Supervisors frequently test evidence discipline through retrospective questions. They may request explanations for decisions taken months earlier, or ask for reconstruction of client onboarding logic long after approval. Firms that rely on fragmented systems or ad-hoc documentation struggle in these scenarios, even if no wrongdoing is present.


Human Capital as a Regulatory Risk Vector

MiCA supervision recognises that people, not documents, ultimately determine compliance quality. As a result, regulators evaluate not only the competence of key individuals, but also the firm’s ability to remain compliant when those individuals change.

This is why succession planning, knowledge transfer, and training are no longer optional. A firm that depends heavily on one compliance officer or one technical architect is considered fragile. Supervisors expect roles to be institutionalised, not personalised.

Training is also assessed substantively. Generic or repetitive training materials signal low engagement. Regulators expect training to reflect the firm’s actual risk profile, services, and operational challenges. Evidence of training must demonstrate understanding, not mere attendance.


Financial Crime Risk Beyond AML Formalities

While AML frameworks are central, MiCA supervision in Lithuania increasingly focuses on broader financial crime risks. These include fraud, market manipulation, misuse of custody arrangements, insider abuse, and exploitation of platform mechanics.

Supervisors expect firms to identify where their business model could be abused even in the absence of traditional money laundering. This requires a mindset shift from “AML compliance” to “financial crime risk management.” Firms that narrowly interpret their obligations risk supervisory criticism for incomplete risk coverage.

This broader perspective is particularly relevant for trading platforms and brokerage models, where manipulation risks may exceed classical AML concerns. Surveillance systems, behavioural analysis, and internal controls must therefore extend beyond transaction monitoring into market integrity protection.


Product Governance Under MiCA

MiCA introduces a product-governance mindset into crypto regulation. Firms are expected to understand and manage the risks of the products and services they offer, including their suitability for different client segments.

Product governance requires firms to assess complexity, risk transparency, and potential harm. Offering sophisticated or volatile products to retail clients without adequate disclosures or controls is treated as a governance failure. Supervisors examine whether client communications accurately reflect risks and whether internal incentives encourage responsible product distribution.

Changes to products or services must also be governed. Adding new tokens, changing custody terms, or modifying trading mechanics requires internal approval, risk assessment, and documentation. Informal product evolution undermines regulatory trust.


Internal Controls as Living Mechanisms

MiCA supervision distinguishes sharply between static controls and living control systems. Controls that exist only in policy text, without continuous operation and review, are considered ineffective.

Effective internal controls generate signals. These signals may include alerts, exceptions, breaches, or performance indicators. Supervisors expect firms to monitor these signals, analyse trends, and adjust controls accordingly. A control environment that never produces issues is as suspicious as one that produces too many.

Periodic review is therefore essential. Controls must be reassessed in light of operational changes, audit findings, and external developments. Firms that treat controls as fixed structures struggle to demonstrate adaptability under supervision.


Audit Interaction and Regulatory Expectations

Audits under MiCA are not isolated events. Supervisors view auditors as part of the regulatory ecosystem. Audit findings, management responses, and remediation timelines are actively reviewed.

Firms must therefore approach audits strategically. Delayed remediation, superficial responses, or repeated findings indicate weak governance. Conversely, proactive identification of issues and credible remediation plans strengthen supervisory confidence.

Audit readiness also requires internal alignment. Audit evidence must match supervisory reporting and internal documentation. Discrepancies between audit materials and regulatory submissions are treated as serious credibility issues.


Banking Relationships as a Supervisory Indicator

Access to banking is not formally part of MiCA authorisation, but it is closely monitored. Supervisors view stable banking relationships as an indirect indicator of operational credibility and AML effectiveness.

Firms that repeatedly lose banking partners or operate with fragile arrangements raise supervisory concerns. Regulators may inquire into the reasons for banking difficulties and assess whether they indicate deeper compliance weaknesses.

As a result, banking strategy must be integrated into the regulatory model. Transaction transparency, fund flow clarity, and AML robustness support both banking access and supervisory confidence.


Cross-Border Consistency Under Passporting

MiCA passporting does not dilute supervisory expectations. Instead, it amplifies them. When services are provided across multiple jurisdictions, supervisors focus on consistency of behaviour and controls.

Host authorities may raise concerns that feed back to the home supervisor. Inconsistent client treatment, divergent disclosures, or operational fragmentation across countries increase supervisory intensity. Firms must therefore ensure that passported services remain operationally anchored to the home-state model.

This requires clear internal boundaries. Staff in host countries must operate within defined roles. Decision-making authority must remain centralised. Documentation must reflect this structure consistently across jurisdictions.


Data Integrity and Regulatory Trust

Data quality is an increasingly important supervisory theme. Regulators rely on data for prudential monitoring, risk assessment, and market oversight. Inaccurate or inconsistent data undermines regulatory trust even if errors are unintentional.

Firms must therefore implement data governance frameworks that ensure accuracy, completeness, and timeliness. Data sources, transformations, and reporting logic must be documented and controlled. Manual data manipulation without oversight is viewed as a risk factor.

Regulatory reporting is particularly sensitive. Errors or late submissions trigger scrutiny and can escalate into enforcement if repeated. Firms that treat reporting as a technical afterthought often struggle under sustained supervision.


Incident Management as Proof of Maturity

Supervisors do not expect zero incidents. They expect mature incident management. How a firm detects, responds to, documents, and learns from incidents is a critical indicator of organisational quality.

Incident management includes not only cyber incidents, but also AML breaches, operational failures, and client-impacting events. Firms must demonstrate clear escalation paths, decision authority, communication protocols, and remediation processes.

Post-incident reviews are particularly important. Regulators expect firms to analyse root causes and implement improvements. Failure to learn from incidents suggests governance weakness.


Cultural Signals and Regulatory Perception

Beyond formal structures, regulators assess cultural signals. These include how management speaks about risk, how staff respond to questions, and whether compliance is treated as integral or peripheral.

In interviews and inspections, supervisors often test understanding rather than memorisation. They evaluate whether staff can explain why controls exist, not just what they are. Superficial answers erode confidence even when documents are technically correct.

A strong compliance culture does not require rigidity. It requires clarity, honesty, and willingness to engage constructively with supervision. Firms that attempt to “manage optics” rather than substance are quickly identified.


Long-Term Supervisory Trajectory

MiCA supervision is designed as a long-term relationship. Initial approval sets expectations that continue to apply as the firm evolves. Early weaknesses that are tolerated at launch may become unacceptable as the firm grows.

Firms must therefore anticipate their future supervisory profile. Scaling without upgrading controls, governance, and resources creates regulatory debt that eventually surfaces. Sustainable firms invest ahead of growth rather than reacting to supervisory pressure.

Lithuania’s supervisory environment rewards this forward-looking approach. Firms that demonstrate strategic discipline and operational maturity experience more predictable supervision and greater regulatory trust.


Lithuania as a Platform for Institutional Integration

Lithuania’s role under MiCA extends beyond licensing. It serves as an integration point between crypto businesses and the broader financial system.

Firms that align with supervisory expectations can integrate with banks, institutional clients, and regulated partners more effectively. Conversely, firms that view regulation as a hurdle rather than infrastructure remain marginalised.

This integration perspective explains the depth of Lithuanian supervision. The objective is not to restrict innovation, but to ensure that innovation occurs within a controllable, inspectable framework.


Strategic Value of Doing It “Right” the First Time

Rebuilding a regulatory model after approval is significantly more expensive than building it correctly from the outset. Remediation under supervisory pressure consumes management time, damages credibility, and delays growth.

A properly constructed Lithuanian MiCA authorisation therefore creates strategic value. It reduces uncertainty, supports expansion, and enables long-term planning. The cost is discipline; the benefit is durability.


Conclusion: MiCA as an Operating Standard

MiCA in Lithuania is best understood as an operating standard, not a regulatory hurdle. It defines how a crypto business must behave to be accepted as part of the regulated financial ecosystem.

Firms that internalise this standard gain more than a licence. They gain a framework for sustainable operation, scalable growth, and regulatory trust across the EEA. Firms that resist it face ongoing friction and instability.

For organisations seeking long-term presence rather than short-term approval, Lithuania offers a clear path — provided the business is built to meet the standard in substance, not just in form.

FAQ

The Bank of Lithuania (BoL) is the primary licensing authority responsible for issuing the Lithuanian VASP Authorization under the MiCA framework. The BoL oversees prudential requirements, governance, and operational resilience.

MiCA transformed the process from a simple AML registration (pre-2026) into a comprehensive, prudentially supervised authorization. This includes mandatory requirements for Minimum Capital, Professional Indemnity Insurance (PII), robust internal governance, and the ability to MiCA Passport across the EU.

The Financial Crime Investigation Service (FCIS) remains the key authority for enforcing the Lithuanian AML Law. It scrutinizes the VASP’s AML/KYC Policy, Transaction Monitoring Systems, and adherence to the Travel Rule Compliance Solution.

The specific Lithuanian VASP Capital Requirement is determined by MiCA, based on the VASP's authorized services. Higher-risk services, particularly Custody and Administration of Crypto-Assets, require significantly higher capital, often calculated as the greater of a fixed minimum or a percentage of fixed overheads.

The most critical technical requirement is the security of the Key Management System (KMS). This mandates the use of certified Hardware Security Modules (HSMs) and strict multi-signature protocols for key storage and operations, ensuring Segregation of Client Assets and protection against physical and cyber theft.

Once fully authorized by the Bank of Lithuania (BoL), MiCA Passporting allows the VASP to provide its licensed services (e.g., exchange, custody, brokerage) across all other European Economic Area (EEA) member states without needing separate national licenses.

The Fit and Proper Assessment Lithuania applies to all members of the management body, directors, the Local Compliance Officer Lithuania, the CISO, and any shareholder holding 10% or more of the company. It assesses their reputation, competence, and financial integrity.

Yes. A mandatory annual IT Security Audit and Penetration Testing (Pen Test) must be conducted by an independent firm. The results, including documentation of the Business Continuity Plan (BCP) stress testing, must be submitted to the Bank of Lithuania (BoL).

Failure to implement an effective Travel Rule Compliance Solution and subsequent non-compliance with the data transfer requirements for crypto transactions is considered a serious breach of the Lithuanian AML Law. This attracts severe penalties and scrutiny from the FCIS, potentially leading to license revocation.

The VASP must maintain a local legal entity (UAB) and appoint at least one Local Management Member Lithuania and a dedicated Local Compliance Officer Lithuania who are resident in the country to ensure effective local operational and compliance oversight.

Get in touch with our experts