· Maciej Maciejowski · 9 min read

MiCA for IT & Telecommunications

MiCA

Learn how MiCA affects IT & Telecommunications companies. Requirements, implementation steps, and FAQ. Check Plan Be Eco.

MiCA for IT & Telecommunications

What is MiCA?

The Markets in Crypto-Assets Regulation, commonly known as MiCA, is a comprehensive legislative framework introduced by the European Union to regulate the issuance, trading, and supervision of crypto-assets across all EU member states. Enacted in June 2023 and entering full application in December 2024, MiCA establishes uniform rules for crypto-asset service providers (CASPs) and issuers operating within the EU single market. Its primary goal is to protect consumers, ensure market integrity, and provide legal certainty in a sector that has historically operated in a regulatory grey zone.

MiCA and the IT & Telecommunications Industry

The IT and telecommunications sector sits at the intersection of technology infrastructure and financial innovation, making it one of the industries most directly affected by MiCA. Telecom operators, software companies, cloud providers, and payment platform developers are increasingly embedding crypto-asset functionality into their products and services. Whether a telecom company offers blockchain-based identity verification, a software firm develops a crypto wallet application, or a cloud provider hosts exchange infrastructure, MiCA's reach extends into each of these business models.

Consider a European mobile operator that allows subscribers to purchase and store digital tokens through their billing system. Under MiCA, that operator would likely qualify as a crypto-asset service provider and must obtain the appropriate authorization before offering such services. Similarly, an IT company that develops white-label exchange software and licenses it to EU-based clients must assess whether its role in the value chain triggers compliance obligations either directly or through its clients' activities.

Telecommunications companies are also increasingly exploring utility tokens for loyalty programs, data monetization schemes, and machine-to-machine micropayments in Internet of Things deployments. Each of these use cases falls within MiCA's definitional scope, requiring companies to classify the assets they issue or facilitate and comply with the corresponding tier of regulation. For IT vendors providing the underlying platforms, this means contractual due diligence and technical readiness are no longer optional considerations but legal necessities.

Key Requirements

  • Authorization as a Crypto-Asset Service Provider: Any IT or telecom company offering custody, exchange, transfer, or advisory services related to crypto-assets to EU customers must apply for CASP authorization from the competent national authority. Authorization in one member state grants a passporting right across the entire EU, but the application process requires detailed business plans, governance documentation, and proof of adequate capital.
  • White Paper Publication: Issuers of crypto-assets that are not asset-referenced tokens or e-money tokens must publish a detailed white paper before any public offering. The document must describe the project, the rights attached to the token, the technology used, and the risks involved. IT companies launching utility tokens as part of software ecosystems or telecom providers issuing loyalty tokens must prepare and notify regulators of this document in advance.
  • Capital and Prudential Requirements: CASPs are subject to minimum capital requirements that vary according to the category of services provided. Companies offering custody services face higher capital thresholds than those providing exchange or transfer services. IT firms that pivot to offer financial services around crypto-assets must build capital adequacy into their financial planning from the outset.
  • Consumer Protection and Disclosure Obligations: Marketing communications related to crypto-assets must be fair, clear, and not misleading. IT and telecom companies must ensure that advertising of crypto products prominently displays risk warnings and that all promotional material is consistent with the information in the white paper. Influencer campaigns and social media promotions are explicitly captured by these rules.
  • Anti-Money Laundering Integration: MiCA works in tandem with the EU's Anti-Money Laundering directives. CASPs must implement robust know-your-customer procedures, transaction monitoring, and suspicious activity reporting. IT companies building wallet software or exchange platforms must embed AML-compliant workflows directly into their product architecture, not treat compliance as a bolt-on feature.
  • Operational Resilience and Cybersecurity: CASPs must maintain operational resilience plans addressing cyberattacks, system outages, and data breaches. For IT and telecom companies, this aligns with existing obligations under the Network and Information Security Directive, but MiCA adds crypto-specific requirements around the security of private key management and the continuity of custody arrangements.
  • Travel Rule Compliance: When transferring crypto-assets between CASPs, companies must transmit originator and beneficiary information alongside the transaction, consistent with the FATF Travel Rule as implemented in the EU Transfer of Funds Regulation. IT companies developing transaction routing infrastructure must build Travel Rule data fields into message formats and API specifications.
  • Conflict of Interest Policies: CASPs must establish, implement, and maintain effective conflict of interest policies. For IT companies that both develop crypto infrastructure and operate services on that infrastructure, structural separation or rigorous governance controls are required to demonstrate that client interests are protected.

Implementation Steps for IT & Telecommunications Companies

  1. Conduct a regulatory classification assessment: Begin by mapping every crypto-related product, service, and feature in your current and planned portfolio against MiCA's definitional categories. Determine whether each offering involves utility tokens, asset-referenced tokens, or e-money tokens, and identify which CASP service categories your business activities fall under. Engage legal counsel with specific MiCA expertise to validate your classification decisions, as misclassification carries significant regulatory risk.
  2. Identify the competent national authority and assess passporting strategy: MiCA authorization is granted at the member state level. Evaluate the regulatory landscape across EU jurisdictions to determine the most appropriate home member state for your authorization application. Consider factors such as the authority's processing timelines, technical guidance quality, supervisory culture, and the location of your key operational entities.
  3. Perform a gap analysis against MiCA's technical requirements: Audit your existing technology stack, data architecture, and operational processes against MiCA's specific requirements. Key areas to assess include wallet security, key management infrastructure, customer data flows, transaction monitoring capabilities, and reporting pipelines. Document gaps systematically and assign remediation owners and target completion dates.
  4. Build or upgrade AML and KYC infrastructure: Integrate identity verification, sanctions screening, and transaction monitoring solutions that meet the standards required for CASP authorization. If you are building wallet or exchange software for third-party clients, design your APIs to expose the compliance data fields those clients will need to fulfill their own MiCA and AML obligations. Conduct a full review of existing customer onboarding flows and upgrade them to meet enhanced due diligence requirements where applicable.
  5. Draft and submit the crypto-asset white paper where required: For any token issuance activities, prepare the white paper in accordance with MiCA's content requirements. The document must be accurate as of its publication date and updated whenever material changes occur. Submit the white paper to the relevant national authority within the prescribed notification window and ensure it is published on your website in a durable and accessible format.
  6. Develop and test operational resilience frameworks: Create documented incident response and business continuity plans specific to your crypto-asset operations. Conduct tabletop exercises simulating cyberattacks on hot wallet infrastructure and test failover procedures for custody arrangements. Align these plans with your existing DORA and NIS2 compliance programs to avoid duplication of effort and create a unified resilience posture.
  7. Train commercial, product, and engineering teams: MiCA compliance is not solely a legal or compliance function. Product managers must understand white paper obligations before launching new token features. Engineers must build Travel Rule data handling into messaging systems from the design stage. Sales and marketing teams must apply MiCA's advertising rules to all promotional materials. Deliver targeted training to each function and establish ongoing monitoring to catch new product decisions that trigger compliance obligations.
  8. Establish ongoing regulatory monitoring and reporting processes: MiCA is a living framework. The European Banking Authority and the European Securities and Markets Authority are issuing technical standards and guidance on a rolling basis through 2025 and beyond. Assign a dedicated regulatory affairs function or retain external advisors to track these developments and translate them into actionable updates to your compliance program. Build periodic MiCA review cycles into your governance calendar.

Frequently Asked Questions

Does MiCA apply to IT companies that only provide software tools used by crypto-asset businesses, without directly offering services to end users?

Generally, MiCA's authorization requirements apply to entities that directly provide crypto-asset services to clients in the EU, not to pure technology vendors supplying software tools to those entities. However, the boundary is not always clear-cut. If an IT company hosts the platform, maintains custody of user assets, or exercises operational control over a service, it may be treated as a co-provider rather than a mere tool supplier. Technology companies should conduct a detailed analysis of their contractual arrangements and operational responsibilities to determine whether they fall within MiCA's direct scope or whether their clients bear the primary compliance burden.

How does MiCA interact with existing telecom regulations that already govern data privacy and consumer protection?

MiCA operates alongside, and does not replace, existing regulatory frameworks such as GDPR, the Consumer Rights Directive, and sector-specific telecom regulations. A telecom company launching a crypto-asset feature must satisfy both MiCA's disclosure and consumer protection requirements and GDPR's rules on processing personal data collected during KYC procedures. Where obligations overlap, the more stringent requirement applies. Companies should conduct a cross-regulatory mapping exercise to identify interaction points and avoid compliance gaps created by siloed regulatory programs.

What happens if an IT or telecom company is already operating a crypto-related service when MiCA's full application date arrives?

MiCA includes a transitional period that allows CASPs already providing crypto-asset services in a member state under national law prior to December 30, 2024, to continue operating temporarily without a MiCA authorization, subject to national transitional regimes. The length of the transition varies by member state but can extend up to 18 months following the full application date. Companies in this position should use the transitional window to prepare and submit their authorization applications rather than treat it as a deferral. Operating under a transitional regime does not exempt companies from MiCA's market abuse, consumer protection, or AML-related provisions that applied from an earlier date.

Are utility tokens used within closed corporate environments, such as internal incentive systems for employees, covered by MiCA?

MiCA contains certain exemptions for crypto-assets offered to a limited network of participants or used within closed-loop systems. Tokens that are accepted by only a limited number of merchants or that serve a specific and restricted purpose may fall outside MiCA's white paper and authorization requirements. However, these exemptions are narrowly constructed and subject to conditions including caps on the number of holders and restrictions on transferability. IT companies designing internal token systems should obtain a legal opinion confirming that the specific design parameters meet the exemption criteria before relying on them, as regulators are expected to interpret these exclusions conservatively.

Summary

MiCA represents the most significant regulatory development for the crypto-asset sector in European history, and its implications for IT and telecommunications companies are both immediate and far-reaching. Businesses that develop, host, or operate crypto-asset-related products and services in the EU must act now to classify their activities, assess compliance gaps, and prepare authorization applications well before the transitional periods expire. The companies that treat MiCA as a strategic opportunity to build trust with enterprise clients and regulators, rather than a compliance burden to be deferred, will be best positioned to compete in the EU's emerging digital asset economy.

Check which regulations apply to your company

Take a quick quiz and get a free personalized regulatory analysis.

Regulatory Quiz Try for free