SAFEGUARDING OF CUSTOMER FUNDS

Digital Capital Ltd

1. PURPOSE

1.1 This document sets out how Digital Capital Ltd safeguards customer funds in accordance with applicable laws and regulatory requirements.

1.2 It explains:

  • how funds are protected

  • how safeguarding operates in practice

  • how risks are managed

  • how safeguarding is governed

 

2. REGULATORY FRAMEWORK

2.1 Digital Capital Ltd safeguards customer funds in accordance with:

  • Electronic Money Regulations 2011

  • applicable FCA requirements

2.2 Safeguarding is a core regulatory obligation.

 

3. NATURE OF CUSTOMER FUNDS

3.1 Funds held by Digital Capital:

  • are electronic money

  • represent a claim on Digital Capital

3.2 These funds:

  • are not deposits

  • are not covered by FSCS


4. SAFEGUARDING PRINCIPLE

4.1 Customer funds must:

  • be segregated from corporate funds

  • be protected in insolvency

 

5. SAFEGUARDING METHOD

5.1 Digital Capital safeguards funds by:

  • holding funds in segregated safeguarding accounts

 

6. SEGREGATION OF FUNDS

6.1 Customer funds are:

  • separated from company funds

  • not used for operational purposes

 

7. SAFEGUARDING ACCOUNTS

7.1 Safeguarding accounts are:

  • held with authorised credit institutions

 

8. OWNERSHIP AND RESPONSIBILITY

8.1 Digital Capital retains full responsibility for safeguarding.

 

9. GOVERNANCE

9.1 Safeguarding is overseen by:

  • senior management

  • finance / safeguarding function

 

10. RISK MANAGEMENT

10.1 Safeguarding risks include:

  • reconciliation errors

  • operational failures

  • banking dependency

 

11. INTERNAL CONTROLS

11.1 Controls include:

  • segregation

  • reconciliation

  • monitoring

 

12. PARTNER MODEL

12.1 Partners do not:

  • hold funds

  • control safeguarding

 

13. TRANSPARENCY

13.1 Customers are informed that:

  • funds are safeguarded

  • not insured

 

14. LIMITATIONS

14.1 Safeguarding:

  • is not equivalent to deposit protection

 

15. CONTACT

15.1 For safeguarding queries:

info@digi-capital.co.uk

 

16. OPERATIONAL SAFEGUARDING FRAMEWORK

16.1 Digital Capital operates a structured safeguarding framework designed to ensure that customer funds are identified, segregated, reconciled, monitored and protected on an ongoing basis.

16.2 The operational safeguarding framework is intended to ensure that:

  • the amount of funds that should be safeguarded is accurately determined

  • safeguarded funds are held in the correct accounts

  • discrepancies are identified promptly

  • exceptions are escalated and resolved without undue delay

  • records remain sufficiently accurate to support customer fund protection

  • management has visibility over safeguarding effectiveness and exceptions

16.3 Safeguarding is treated as a live operational control environment and not as a static legal concept.


17. SAFEGUARDING OPERATING MODEL

17.1 Digital Capital maintains an operating model under which:

  • customer funds received in exchange for electronic money or otherwise subject to safeguarding requirements are identified through the firm’s systems and records

  • those funds are held in designated safeguarding accounts

  • safeguarding balances are compared against internal records through reconciliation processes

  • any safeguarding discrepancies are escalated, investigated and resolved

  • governance and management information support regular oversight of safeguarding effectiveness

17.2 The safeguarding operating model must be documented and kept under review.

17.3 The safeguarding model must remain consistent with:

  • the firm’s product set

  • payment flows

  • card arrangements

  • account structures

  • banking arrangements

  • geographic footprint

  • operational dependencies

 

18. IDENTIFICATION OF RELEVANT FUNDS

18.1 Digital Capital identifies funds that are subject to safeguarding requirements through its internal books, records and transaction systems.

18.2 This includes funds which:

  • have been received from or for a customer in connection with the issuance of electronic money

  • remain owed to customers in connection with regulated services

  • must be protected pending redemption, payment execution or other lawful disposition

18.3 The identification logic must be sufficiently robust to ensure that:

  • customer liabilities are not understated

  • corporate funds are not incorrectly treated as safeguarded funds

  • relevant pending and settled flows are properly captured

  • timing differences are understood and controlled

18.4 The firm must ensure that the basis on which relevant funds are identified is documented and consistently applied.

 

19. CUSTOMER FUND RECORDS

19.1 Digital Capital maintains books and records sufficient to determine:

  • the amount owed to customers

  • the balance that should be safeguarded

  • the relationship between customer liabilities and safeguarded balances

19.2 Customer fund records must be:

  • accurate

  • complete

  • current

  • capable of supporting reconciliation and exception investigation

19.3 Record integrity is a critical component of safeguarding.

19.4 If record accuracy is in doubt, the matter must be treated as a safeguarding risk and escalated appropriately.

 

20. SAFEGUARDING ACCOUNTS — OPERATIONAL EXPECTATIONS

20.1 Safeguarding accounts must be clearly designated and distinguishable from Digital Capital’s own corporate or operating accounts.

20.2 The firm must maintain a clear internal record of:

  • each safeguarding account

  • the institution with which it is held

  • its intended purpose

  • associated operational dependencies

  • authorised internal users and approval controls

20.3 Access to safeguarding accounts and associated banking operations must be appropriately restricted.

20.4 Any change to safeguarding account arrangements must be subject to governance review and controlled implementation.


21. SEGREGATION IN PRACTICE

21.1 Segregation is not satisfied solely by legal description; it must also be reflected in operational reality.

21.2 Digital Capital therefore operates controls intended to ensure that:

  • customer funds are not mixed with general operating funds other than to the limited extent permitted by the safeguarding framework and timing mechanics of payments operations

  • transfers into and out of safeguarding accounts are controlled and traceable

  • operational personnel understand the distinction between safeguarded funds and firm funds

  • finance, operations and compliance are aligned on the treatment of balances and exceptions

21.3 Any actual or suspected failure of segregation must be treated as a serious safeguarding incident.

 

22. RECONCILIATION OBJECTIVE

22.1 The objective of safeguarding reconciliation is to verify that the amount held in safeguarding accounts appropriately matches the amount that ought to be safeguarded for customers.

22.2 Reconciliation exists to:

  • detect under-safeguarding

  • detect over-safeguarding

  • identify timing mismatches and record errors

  • support prompt remediation

  • provide management assurance that safeguarding is functioning effectively

22.3 Reconciliation is one of the most important operational safeguards within the safeguarding framework.

 

23. RECONCILIATION FREQUENCY

23.1 Digital Capital performs safeguarding reconciliations on a regular basis consistent with regulatory requirements, the scale of the business, volume of customer funds and operational risk profile.

23.2 As a minimum expectation for a mature control environment, safeguarding should be treated as a daily operational control where relevant balances and flows justify it.

23.3 The reconciliation cycle must be sufficiently frequent to ensure that:

  • discrepancies are identified promptly

  • management does not rely on stale information

  • operational issues do not remain undetected for prolonged periods

 

24. RECONCILIATION DATA SOURCES

24.1 Safeguarding reconciliation may involve comparison between:

  • internal customer liability records

  • ledger balances

  • safeguarding account balances

  • pending movement records

  • settlement or timing adjustment records

24.2 The firm must understand the origin, quality and timing of each data source used in reconciliation.

24.3 Where reconciliation depends on extracts, uploads, interfaces or reports, those dependencies must be controlled and monitored.


25. RECONCILIATION METHODOLOGY

25.1 The reconciliation methodology must be documented in sufficient detail to explain:

  • what balances are included

  • what balances are excluded

  • how timing differences are treated

  • how exceptions are identified

  • who performs the reconciliation

  • who reviews it

  • how it is evidenced

25.2 The methodology must be consistent with the firm’s actual product and transaction flows.

25.3 If the product set or payment flow logic changes, the reconciliation methodology must be reviewed accordingly.

 

26. RECONCILIATION PREPARATION

26.1 Before each reconciliation, the relevant data inputs should be checked for reasonableness and completeness.

26.2 This may include:

  • confirming ledger integrity

  • confirming availability of banking balances

  • confirming completion of relevant processing cycles

  • identifying known system issues that may affect the comparison

26.3 Material uncertainty affecting reconciliation accuracy must be escalated.

 

27. PERFORMANCE OF RECONCILIATION

27.1 The reconciliation must be performed by appropriately trained personnel using the approved methodology.

27.2 The reconciliation process must produce a clear comparison between:

  • the required safeguarded amount

  • the actual safeguarded amount

  • any difference or break identified

27.3 The output must be recorded in a manner that is auditable and retrievable.

 

28. REVIEW OF RECONCILIATION

28.1 Reconciliations must be subject to review by an appropriately authorised reviewer.

28.2 The reviewer should assess:

  • whether the reconciliation appears complete

  • whether unusual movements or unexplained items exist

  • whether any differences have been identified

  • whether the explanation of differences is reasonable

  • whether escalation is required

28.3 Review evidence must be retained.

 

29. SAFEGUARDING BREAKS

29.1 A safeguarding break is any discrepancy between the amount that should be safeguarded and the amount actually safeguarded, or any other material failure in the safeguarding control process.

29.2 Safeguarding breaks may arise from:

  • reconciliation error

  • ledger error

  • delayed transfer

  • banking issue

  • operational process failure

  • system issue

  • data integrity weakness

  • misclassification of balances

  • manual error

29.3 A safeguarding break may indicate:

  • under-safeguarding

  • over-safeguarding

  • uncertainty in records

  • unresolved timing mismatch

  • process weakness requiring remediation


30. UNDER-SAFEGUARDING

30.1 Under-safeguarding arises where the amount held in safeguarding accounts is less than the amount that should be safeguarded.

30.2 Under-safeguarding is treated as a serious matter because it may indicate that customer funds are not fully protected in the manner required.

30.3 Any under-safeguarding position must be escalated promptly and addressed with urgency.

30.4 The firm must document:

  • the amount of the break

  • the cause or suspected cause

  • when it arose or was identified

  • interim actions taken

  • final resolution steps

 

31. OVER-SAFEGUARDING

31.1 Over-safeguarding arises where the amount held in safeguarding accounts exceeds the amount that should be safeguarded.

31.2 While generally less severe than under-safeguarding from a customer protection perspective, over-safeguarding may still indicate:

  • record inaccuracy

  • process weakness

  • misclassification

  • inefficient liquidity management

  • unresolved operational error

31.3 Over-safeguarding must therefore also be investigated and resolved.


32. TIMING DIFFERENCES

32.1 Some reconciliation differences may arise due to timing differences between systems, settlement cycles, banking movements or payment processing cut-offs.

32.2 Timing differences must not be assumed to be acceptable merely because they are common.

32.3 The firm must maintain a documented basis for distinguishing:

  • acceptable and understood timing differences

  • unexplained or suspicious discrepancies

  • breaks requiring escalation or remediation

32.4 Ageing of timing differences must be monitored.

 

33. BREAK LOG

33.1 Digital Capital maintains a safeguarding break log or equivalent exception register.

33.2 The break log should record, at minimum:

  • date identified

  • reference ID

  • amount

  • type of break

  • root cause category

  • owner

  • current status

  • escalation status

  • target resolution date

  • actual resolution date

  • control remediation required, if any

33.3 The break log must support management oversight and auditability.


34. BREAK INVESTIGATION

34.1 Each safeguarding break must be investigated to determine:

  • what happened

  • how material it is

  • whether customer funds were or may have been exposed

  • whether the issue is isolated or systemic

  • whether an interim control is required

  • whether a regulatory or governance escalation is required

34.2 Investigations must be documented.

34.3 Repeated similar breaks must trigger root cause analysis and control review.

 

35. ESCALATION OF SAFEGUARDING BREAKS

35.1 Safeguarding breaks must be escalated according to severity and nature.

35.2 Escalation criteria should take into account:

  • amount of the discrepancy

  • duration of the discrepancy

  • whether the break indicates under-safeguarding

  • whether customer protection may have been compromised

  • whether the cause is unknown

  • whether the issue is recurring

  • whether a system or third-party dependency is implicated

35.3 Escalation may include:

  • finance / safeguarding operations

  • compliance

  • risk

  • senior management

  • legal or regulatory engagement where required


36. INTERIM ACTIONS

36.1 Where a safeguarding discrepancy or control failure is identified, Digital Capital may take interim actions to reduce risk.

36.2 Interim actions may include:

  • immediate funding or transfer action

  • additional reconciliations

  • temporary manual controls

  • increased review frequency

  • transaction or process restrictions

  • system workarounds pending permanent remediation

36.3 Interim actions must be documented and reviewed.

 

37. RESOLUTION OF BREAKS

37.1 A safeguarding break should only be treated as resolved when:

  • the discrepancy is corrected

  • the cause is understood to an appropriate level

  • any required remediation has been identified

  • evidence of resolution is retained

  • any necessary escalation or reporting has been completed

37.2 Closure of a break without adequate explanation is not acceptable.

 

38.ROOT CAUSE ANALYSIS

38.1 Significant or recurring safeguarding breaks must undergo root cause analysis.

38.2 Root cause analysis should assess whether the break arose from:

  • system design weakness

  • process gap

  • human error

  • inadequate review

  • incomplete records

  • third-party dependency

  • training deficiency

  • poor change implementation

38.3 Root cause analysis must result in:

  • specific remediation actions

  • assigned owners

  • timelines

  • follow-up validation where appropriate

 

39. SAFEGUARDING MANAGEMENT INFORMATION (MI)

39.1 Digital Capital maintains safeguarding MI to support governance and oversight.

39.2 Safeguarding MI may include:

  • total safeguarded balances

  • reconciliation completion status

  • number and value of breaks

  • ageing of unresolved breaks

  • under-safeguarding incidents

  • repeat issues by cause

  • time to resolve safeguarding discrepancies

  • unresolved control actions

  • dependency or banking issues affecting safeguarding

39.3 MI should be sufficiently clear to support challenge by management and, where relevant, the Board or equivalent governance body.


40. DAILY AND PERIODIC REPORTING

40.1 Daily or frequent operational reporting may be required for safeguarding teams or control owners.

40.2 Periodic management reporting should summarise:

  • current safeguarding position

  • open issues

  • trend analysis

  • remediation progress

  • material incidents or near misses

40.3 Reporting should be proportionate to the scale and complexity of operations but sufficiently robust to support governance.

 

41. EVIDENCE AND RECORD RETENTION

41.1 Digital Capital retains records sufficient to evidence the operation of the safeguarding framework.

41.2 This includes, where relevant:

  • reconciliation outputs

  • review sign-offs

  • break logs

  • investigation records

  • funding adjustments

  • management reports

  • escalation records

  • remediation actions

  • governance minutes or issue papers

41.3 Safeguarding evidence must be retrievable in a form suitable for:

  • internal review

  • audit

  • bank diligence

  • FCA requests


42. ACCESS CONTROLS AND SEGREGATION OF DUTIES

42.1 Safeguarding operations must be supported by appropriate segregation of duties.

42.2 This includes, where practicable:

  • separation between preparation and review of reconciliations

  • controlled access to safeguarding bank account operations

  • restricted approval rights for funding movements

  • controlled exception handling

42.3 Access permissions should be reviewed periodically.

 

43. SYSTEM AND THIRD-PARTY DEPENDENCIES

43.1 The safeguarding operating model may depend on systems, banks or service providers.

43.2 Digital Capital must understand and monitor such dependencies.

43.3 Where a third-party issue affects safeguarding, the matter must be treated with urgency and tracked as a safeguarding-related risk or incident where appropriate.

 

44. TRAINING AND COMPETENCE

44.1 Staff involved in safeguarding operations must be appropriately trained.

44.2 Training should cover:

  • safeguarding principles

  • reconciliation methodology

  • identification of breaks

  • escalation requirements

  • documentation standards

  • the distinction between customer funds and firm funds

44.3 Competence should be refreshed periodically and when material process changes occur.


45. REVIEW OF SAFEGUARDING OPERATIONS

45.1 The safeguarding operating model must be reviewed periodically to confirm that it remains appropriate.

45.2 Review triggers may include:

  • product changes

  • new payment flows

  • new banking arrangements

  • incidents or repeated breaks

  • regulatory developments

  • audit or compliance findings

45.3 Any material change to safeguarding operations must be subject to change governance and documented update.

 

46. INSOLVENCY PROTECTION — GENERAL POSITION

46.1 The purpose of safeguarding is to improve protection of customer funds if Digital Capital Ltd were to become insolvent.

46.2 Safeguarding is intended to ensure that relevant customer funds are protected from claims by the firm’s general creditors and are available to be returned to customers in accordance with applicable law and insolvency processes.

46.3 Safeguarding is a regulatory protection mechanism. It is not a guarantee that funds will be returned immediately, without process, delay, cost or legal complexity in every circumstance.

46.4 The firm must therefore ensure that its public and internal safeguarding descriptions are accurate, balanced and do not overstate the protection afforded by safeguarding.


47. INSOLVENCY SCENARIO — OPERATIONAL EXPECTATION

47.1 If Digital Capital were to fail or enter an insolvency-related process, customer funds that have been safeguarded should be distinguishable from the firm’s own funds through the safeguarding structure, books and records, and associated reconciliations.

47.2 In such a scenario, the return of safeguarded funds would ordinarily depend on matters including:

  • the accuracy and completeness of the firm’s books and records

  • the quality of segregation and reconciliation controls

  • the availability of safeguarding account balances

  • the speed and effectiveness of insolvency administration processes

  • the ability to identify customer entitlements

  • any legal, practical or operational issues arising at the point of failure

47.3 Digital Capital must not assume that insolvency protection is purely a legal drafting issue. It is heavily dependent on operational readiness and record integrity.

 

48. ROLE OF BOOKS AND RECORDS IN INSOLVENCY

48.1 The quality of the firm’s books and records is a critical safeguarding control because, in an insolvency scenario, those records may be relied upon to determine:

  • which funds are customer funds

  • how much is owed to each customer

  • whether a safeguarding shortfall or surplus exists

  • whether customer liabilities can be matched to safeguarded balances

48.2 Poor records, unresolved breaks, inconsistent classifications or weak data lineage may materially increase the complexity, delay and cost of returning funds.

48.3 For this reason, Digital Capital treats books and records as a core safeguarding issue rather than merely an accounting or operational matter.


49. INSOLVENCY PRACTITIONER AND DISTRIBUTION PROCESS

49.1 In an insolvency or administration scenario, an insolvency practitioner or similar officeholder may be appointed.

49.2 That person may be involved in:

  • identifying safeguarded funds

  • reconciling entitlements

  • managing distribution of available safeguarded amounts

  • dealing with operational issues, claims and records

49.3 The insolvency process may therefore involve administrative work, forensic review, legal interpretation and customer balance verification.

49.4 Digital Capital must ensure that its public disclosure accurately reflects that safeguarding improves customer protection but does not eliminate the practical realities of insolvency administration.

 

50. COSTS AND DEDUCTIONS

50.1 In certain circumstances, costs associated with the return of safeguarded funds may be incurred in connection with the insolvency process or the operation of the safeguarding framework.

50.2 Where permitted by law, such costs may affect the funds ultimately returned or the speed at which they are returned.

50.3 Digital Capital must ensure that customer-facing safeguarding disclosure does not imply that no costs, deductions, delays or process frictions could ever arise.

50.4 This point is particularly important because inaccurate statements about “full protection” or “guaranteed immediate return” may create regulatory and conduct risk.


51. LIMITATIONS OF SAFEGUARDING

51.1 Safeguarding does not provide the same protection as a bank deposit protection regime.

51.2 In particular, safeguarded funds:

  • are not deposits

  • are not protected by the Financial Services Compensation Scheme (FSCS) solely by reason of being safeguarded e-money or payment funds

  • may still be affected by insolvency process delays, records issues or related costs

51.3 Safeguarding also does not remove all operational risks. Its effectiveness depends on:

  • correct identification of relevant funds

  • robust segregation

  • accurate reconciliation

  • timely issue escalation

  • effective governance and oversight

51.4 Digital Capital must therefore present safeguarding as a strong regulatory protection mechanism, but not as an absolute or insurance-like promise.

 

52. CUSTOMER DISCLOSURE PRINCIPLES

52.1 Customer-facing safeguarding disclosure must be:

  • clear

  • accurate

  • balanced

  • not misleading

  • consistent across all public materials

52.2 Customer disclosure should explain, at a minimum:

  • that relevant funds are safeguarded in accordance with applicable rules

  • that safeguarded funds are not deposits

  • that safeguarded funds are not protected by the FSCS solely because they are safeguarded

  • that safeguarding is intended to protect customer funds if the firm fails

  • that insolvency processes may still involve administrative delay or costs

52.3 Customer-facing disclosure must avoid:

  • overstating protection

  • implying a guarantee of immediate access

  • using language that suggests safeguarding is equivalent to deposit insurance

  • using vague promotional language that weakens legal accuracy

 

53. CONSISTENCY OF PUBLIC DISCLOSURE

53.1 Safeguarding-related statements must be consistent across:

  • the safeguarding information page

  • account terms

  • website disclosures

  • FAQs

  • onboarding flows

  • customer support scripts, where relevant

  • complaint responses, where relevant

53.2 Inconsistency between documents may create:

  • customer confusion

  • conduct risk

  • FCA scrutiny

  • bank diligence concerns

  • legal interpretation risk

53.3 Digital Capital must therefore periodically review safeguarding language across all external materials.

 

54. GOVERNANCE OF SAFEGUARDING

54.1 Safeguarding must be subject to formal governance and oversight.

54.2 Governance should ensure that safeguarding is not treated as a narrow finance process only, but as a cross-functional control environment involving:

  • finance / safeguarding operations

  • compliance

  • risk

  • senior management

  • operations and systems stakeholders where relevant

54.3 Governance must be sufficiently robust to ensure that material safeguarding risks, issues and trends are visible to the appropriate management level.

 

55. SENIOR MANAGEMENT OVERSIGHT

55.1 Senior management is responsible for ensuring that the firm maintains an effective safeguarding framework.

55.2 Senior management responsibilities include:

  • ensuring adequate resourcing and capability

  • reviewing material safeguarding MI

  • ensuring that significant breaks or weaknesses are escalated

  • ensuring remediation is tracked and completed

  • ensuring that growth, product changes or new Partner arrangements do not undermine safeguarding integrity

55.3 Senior management must also ensure that safeguarding is properly reflected in the firm’s wider governance, risk and supervisory readiness model.

 

56. MANAGEMENT INFORMATION AND REPORTING

56.1 Safeguarding MI must be reported periodically to the appropriate governance level.

56.2 Reporting should include, where relevant:

  • current safeguarded balance

  • reconciliation completion status

  • open breaks and ageing

  • under-safeguarding incidents

  • over-safeguarding trends

  • repeat issues and root causes

  • unresolved remediation actions

  • banking or dependency issues affecting safeguarding

  • any incidents requiring heightened attention

56.3 MI should support meaningful challenge, not merely summary reporting.

56.4 If safeguarding MI is incomplete, delayed or unreliable, that itself should be treated as a control concern.


57. ESCALATION TO GOVERNANCE FORUMS

57.1 Material safeguarding issues must be escalated to the appropriate governance forum or senior management channel.

57.2 Escalation should occur where there is, for example:

  • under-safeguarding

  • a significant unresolved discrepancy

  • repeated or systemic reconciliation issues

  • unresolved dependency failure affecting safeguarding

  • uncertainty over records or entitlement calculations

  • a material governance, process or systems weakness

  • any safeguarding issue with potential regulatory significance

57.3 Escalation records must be retained.

 

58. INTERACTION WITH RISK, INCIDENT AND AUDIT FRAMEWORKS

58.1 Safeguarding does not operate in isolation.

58.2 Safeguarding issues may also fall within the scope of:

  • the Risk Management Framework

  • the Incident & Breach Management Policy

  • the Compliance Monitoring Plan

  • the Internal Audit Framework

  • the Board MI and governance reporting framework

58.3 Material safeguarding matters should therefore be reflected consistently across those frameworks where relevant.

58.4 This is important to ensure that safeguarding is treated as an enterprise control issue and not siloed within one function.

 

59. INTERACTION WITH PARTNER MODEL

59.1 In Digital Capital’s business model, Partners do not hold or control safeguarded funds.

59.2 Partners do not control safeguarding account arrangements, safeguarding reconciliations, or safeguarding governance decisions.

59.3 However, the business model, customer volumes, onboarding patterns and segmentation associated with Partners may affect the scale and operational profile of safeguarding.

59.4 For this reason, changes in Partner arrangements, customer cohorts, transaction patterns or product usage should be assessed for potential safeguarding impact.

 

60. BANKING AND DEPENDENCY RISK

60.1 Safeguarding depends in part on the operational reliability of banking and related infrastructure arrangements.

60.2 Digital Capital must therefore monitor and manage risks relating to:

  • banking dependencies

  • account availability

  • operational restrictions

  • delays in account operations

  • concentration risk where relevant

  • changes in banking arrangements

60.3 Material dependency issues affecting safeguarding must be escalated and reflected in management reporting where appropriate.


61. CHANGE MANAGEMENT

61.1 Material changes to products, payment flows, banking structure, ledger logic, reconciliation logic, system architecture or Partner operating model must be assessed for safeguarding impact before implementation.

61.2 Change approval should consider:

  • whether customer funds are identified correctly

  • whether reconciliation logic remains accurate

  • whether new timing differences are introduced

  • whether reporting or evidence outputs are affected

  • whether governance or review controls require adjustment

61.3 A material change should not be treated as complete until safeguarding impact has been considered and documented.

 

62. INTERNAL REVIEW, MONITORING AND ASSURANCE

62.1 Safeguarding must be subject to periodic internal review.

62.2 Such review may occur through:

  • first-line control review

  • compliance monitoring

  • risk review

  • internal audit

  • thematic or issue-based review

62.3 Review activity should assess not only whether safeguarding documentation exists, but whether:

  • reconciliations are occurring as required

  • breaks are being managed appropriately

  • MI is reliable

  • records are accurate

  • remediation actions are effective

62.4 Findings should be documented and tracked.

 

63. TRAINING, AWARENESS AND CONTROL CULTURE

63.1 Safeguarding effectiveness depends not only on process, but also on understanding and control culture.

63.2 Staff relevant to safeguarding must understand:

  • why safeguarding matters

  • how customer funds differ from firm funds

  • how reconciliation works

  • when discrepancies must be escalated

  • what constitutes a serious safeguarding issue

  • how customer-facing descriptions must remain accurate and balanced

63.3 The firm should promote a control culture in which safeguarding issues are raised early and not minimised.

 

64. CUSTOMER COMMUNICATION IN THE EVENT OF ISSUES

64.1 Where a safeguarding-related issue has actual or potential customer impact, Digital Capital must consider whether customer communication is required, taking into account:

  • legal obligations

  • regulatory expectations

  • customer fairness

  • the need for accuracy and consistency

  • the need not to mislead or overstate the issue

64.2 Communications should be coordinated with compliance, legal and senior management where appropriate.

64.3 The firm must avoid speculative or incomplete customer messaging that could create further confusion or conduct risk.

 

65. DOCUMENTATION AND RETENTION

65.1 Digital Capital retains safeguarding-related documentation and evidence in accordance with legal, regulatory and operational requirements.

65.2 Retained documentation may include:

  • safeguarding methodology documents

  • reconciliation procedures

  • reconciliation outputs

  • break logs

  • review and sign-off records

  • MI packs

  • incident or issue records

  • remediation records

  • governance papers

  • change assessments affecting safeguarding

65.3 Such records must be sufficiently organised to support:

  • internal assurance

  • regulatory requests

  • bank diligence

  • audit review

  • insolvency-readiness considerations

 

66. REVIEW OF THIS DOCUMENT

66.1 This safeguarding document must be reviewed periodically and whenever a material change occurs in:

  • regulation

  • safeguarding methodology

  • products or services

  • payment flows

  • banking arrangements

  • Partner model

  • internal systems or records

  • control incidents or audit findings

66.2 Updates must be version controlled and approved through appropriate governance channels.


67. FINAL POSITIONING

67.1 Digital Capital Ltd safeguards relevant customer funds in accordance with applicable legal and regulatory requirements.

67.2 Safeguarding is supported not only by legal structure, but by:

  • operational segregation

  • reconciliation

  • issue escalation

  • governance oversight

  • management information

  • evidence and record integrity

67.3 The effectiveness of safeguarding depends on the strength of the firm’s full operating model, and Digital Capital therefore treats safeguarding as a core control priority across legal, operational, governance and supervisory dimensions.

1. PURPOSE

1.1 This document sets out how Digital Capital Ltd safeguards customer funds in accordance with applicable laws and regulatory requirements.

1.2 It explains:

  • how funds are protected

  • how safeguarding operates in practice

  • how risks are managed

  • how safeguarding is governed

 

2. REGULATORY FRAMEWORK

2.1 Digital Capital Ltd safeguards customer funds in accordance with:

  • Electronic Money Regulations 2011

  • applicable FCA requirements

2.2 Safeguarding is a core regulatory obligation.

 

3. NATURE OF CUSTOMER FUNDS

3.1 Funds held by Digital Capital:

  • are electronic money

  • represent a claim on Digital Capital

3.2 These funds:

  • are not deposits

  • are not covered by FSCS


4. SAFEGUARDING PRINCIPLE

4.1 Customer funds must:

  • be segregated from corporate funds

  • be protected in insolvency

 

5. SAFEGUARDING METHOD

5.1 Digital Capital safeguards funds by:

  • holding funds in segregated safeguarding accounts

 

6. SEGREGATION OF FUNDS

6.1 Customer funds are:

  • separated from company funds

  • not used for operational purposes

 

7. SAFEGUARDING ACCOUNTS

7.1 Safeguarding accounts are:

  • held with authorised credit institutions

 

8. OWNERSHIP AND RESPONSIBILITY

8.1 Digital Capital retains full responsibility for safeguarding.

 

9. GOVERNANCE

9.1 Safeguarding is overseen by:

  • senior management

  • finance / safeguarding function

 

10. RISK MANAGEMENT

10.1 Safeguarding risks include:

  • reconciliation errors

  • operational failures

  • banking dependency

 

11. INTERNAL CONTROLS

11.1 Controls include:

  • segregation

  • reconciliation

  • monitoring

 

12. PARTNER MODEL

12.1 Partners do not:

  • hold funds

  • control safeguarding

 

13. TRANSPARENCY

13.1 Customers are informed that:

  • funds are safeguarded

  • not insured

 

14. LIMITATIONS

14.1 Safeguarding:

  • is not equivalent to deposit protection

 

15. CONTACT

15.1 For safeguarding queries:

info@digi-capital.co.uk

 

16. OPERATIONAL SAFEGUARDING FRAMEWORK

16.1 Digital Capital operates a structured safeguarding framework designed to ensure that customer funds are identified, segregated, reconciled, monitored and protected on an ongoing basis.

16.2 The operational safeguarding framework is intended to ensure that:

  • the amount of funds that should be safeguarded is accurately determined

  • safeguarded funds are held in the correct accounts

  • discrepancies are identified promptly

  • exceptions are escalated and resolved without undue delay

  • records remain sufficiently accurate to support customer fund protection

  • management has visibility over safeguarding effectiveness and exceptions

16.3 Safeguarding is treated as a live operational control environment and not as a static legal concept.


17. SAFEGUARDING OPERATING MODEL

17.1 Digital Capital maintains an operating model under which:

  • customer funds received in exchange for electronic money or otherwise subject to safeguarding requirements are identified through the firm’s systems and records

  • those funds are held in designated safeguarding accounts

  • safeguarding balances are compared against internal records through reconciliation processes

  • any safeguarding discrepancies are escalated, investigated and resolved

  • governance and management information support regular oversight of safeguarding effectiveness

17.2 The safeguarding operating model must be documented and kept under review.

17.3 The safeguarding model must remain consistent with:

  • the firm’s product set

  • payment flows

  • card arrangements

  • account structures

  • banking arrangements

  • geographic footprint

  • operational dependencies

 

18. IDENTIFICATION OF RELEVANT FUNDS

18.1 Digital Capital identifies funds that are subject to safeguarding requirements through its internal books, records and transaction systems.

18.2 This includes funds which:

  • have been received from or for a customer in connection with the issuance of electronic money

  • remain owed to customers in connection with regulated services

  • must be protected pending redemption, payment execution or other lawful disposition

18.3 The identification logic must be sufficiently robust to ensure that:

  • customer liabilities are not understated

  • corporate funds are not incorrectly treated as safeguarded funds

  • relevant pending and settled flows are properly captured

  • timing differences are understood and controlled

18.4 The firm must ensure that the basis on which relevant funds are identified is documented and consistently applied.

 

19. CUSTOMER FUND RECORDS

19.1 Digital Capital maintains books and records sufficient to determine:

  • the amount owed to customers

  • the balance that should be safeguarded

  • the relationship between customer liabilities and safeguarded balances

19.2 Customer fund records must be:

  • accurate

  • complete

  • current

  • capable of supporting reconciliation and exception investigation

19.3 Record integrity is a critical component of safeguarding.

19.4 If record accuracy is in doubt, the matter must be treated as a safeguarding risk and escalated appropriately.

 

20. SAFEGUARDING ACCOUNTS — OPERATIONAL EXPECTATIONS

20.1 Safeguarding accounts must be clearly designated and distinguishable from Digital Capital’s own corporate or operating accounts.

20.2 The firm must maintain a clear internal record of:

  • each safeguarding account

  • the institution with which it is held

  • its intended purpose

  • associated operational dependencies

  • authorised internal users and approval controls

20.3 Access to safeguarding accounts and associated banking operations must be appropriately restricted.

20.4 Any change to safeguarding account arrangements must be subject to governance review and controlled implementation.


21. SEGREGATION IN PRACTICE

21.1 Segregation is not satisfied solely by legal description; it must also be reflected in operational reality.

21.2 Digital Capital therefore operates controls intended to ensure that:

  • customer funds are not mixed with general operating funds other than to the limited extent permitted by the safeguarding framework and timing mechanics of payments operations

  • transfers into and out of safeguarding accounts are controlled and traceable

  • operational personnel understand the distinction between safeguarded funds and firm funds

  • finance, operations and compliance are aligned on the treatment of balances and exceptions

21.3 Any actual or suspected failure of segregation must be treated as a serious safeguarding incident.

 

22. RECONCILIATION OBJECTIVE

22.1 The objective of safeguarding reconciliation is to verify that the amount held in safeguarding accounts appropriately matches the amount that ought to be safeguarded for customers.

22.2 Reconciliation exists to:

  • detect under-safeguarding

  • detect over-safeguarding

  • identify timing mismatches and record errors

  • support prompt remediation

  • provide management assurance that safeguarding is functioning effectively

22.3 Reconciliation is one of the most important operational safeguards within the safeguarding framework.

 

23. RECONCILIATION FREQUENCY

23.1 Digital Capital performs safeguarding reconciliations on a regular basis consistent with regulatory requirements, the scale of the business, volume of customer funds and operational risk profile.

23.2 As a minimum expectation for a mature control environment, safeguarding should be treated as a daily operational control where relevant balances and flows justify it.

23.3 The reconciliation cycle must be sufficiently frequent to ensure that:

  • discrepancies are identified promptly

  • management does not rely on stale information

  • operational issues do not remain undetected for prolonged periods

 

24. RECONCILIATION DATA SOURCES

24.1 Safeguarding reconciliation may involve comparison between:

  • internal customer liability records

  • ledger balances

  • safeguarding account balances

  • pending movement records

  • settlement or timing adjustment records

24.2 The firm must understand the origin, quality and timing of each data source used in reconciliation.

24.3 Where reconciliation depends on extracts, uploads, interfaces or reports, those dependencies must be controlled and monitored.


25. RECONCILIATION METHODOLOGY

25.1 The reconciliation methodology must be documented in sufficient detail to explain:

  • what balances are included

  • what balances are excluded

  • how timing differences are treated

  • how exceptions are identified

  • who performs the reconciliation

  • who reviews it

  • how it is evidenced

25.2 The methodology must be consistent with the firm’s actual product and transaction flows.

25.3 If the product set or payment flow logic changes, the reconciliation methodology must be reviewed accordingly.

 

26. RECONCILIATION PREPARATION

26.1 Before each reconciliation, the relevant data inputs should be checked for reasonableness and completeness.

26.2 This may include:

  • confirming ledger integrity

  • confirming availability of banking balances

  • confirming completion of relevant processing cycles

  • identifying known system issues that may affect the comparison

26.3 Material uncertainty affecting reconciliation accuracy must be escalated.

 

27. PERFORMANCE OF RECONCILIATION

27.1 The reconciliation must be performed by appropriately trained personnel using the approved methodology.

27.2 The reconciliation process must produce a clear comparison between:

  • the required safeguarded amount

  • the actual safeguarded amount

  • any difference or break identified

27.3 The output must be recorded in a manner that is auditable and retrievable.

 

28. REVIEW OF RECONCILIATION

28.1 Reconciliations must be subject to review by an appropriately authorised reviewer.

28.2 The reviewer should assess:

  • whether the reconciliation appears complete

  • whether unusual movements or unexplained items exist

  • whether any differences have been identified

  • whether the explanation of differences is reasonable

  • whether escalation is required

28.3 Review evidence must be retained.

 

29. SAFEGUARDING BREAKS

29.1 A safeguarding break is any discrepancy between the amount that should be safeguarded and the amount actually safeguarded, or any other material failure in the safeguarding control process.

29.2 Safeguarding breaks may arise from:

  • reconciliation error

  • ledger error

  • delayed transfer

  • banking issue

  • operational process failure

  • system issue

  • data integrity weakness

  • misclassification of balances

  • manual error

29.3 A safeguarding break may indicate:

  • under-safeguarding

  • over-safeguarding

  • uncertainty in records

  • unresolved timing mismatch

  • process weakness requiring remediation


30. UNDER-SAFEGUARDING

30.1 Under-safeguarding arises where the amount held in safeguarding accounts is less than the amount that should be safeguarded.

30.2 Under-safeguarding is treated as a serious matter because it may indicate that customer funds are not fully protected in the manner required.

30.3 Any under-safeguarding position must be escalated promptly and addressed with urgency.

30.4 The firm must document:

  • the amount of the break

  • the cause or suspected cause

  • when it arose or was identified

  • interim actions taken

  • final resolution steps

 

31. OVER-SAFEGUARDING

31.1 Over-safeguarding arises where the amount held in safeguarding accounts exceeds the amount that should be safeguarded.

31.2 While generally less severe than under-safeguarding from a customer protection perspective, over-safeguarding may still indicate:

  • record inaccuracy

  • process weakness

  • misclassification

  • inefficient liquidity management

  • unresolved operational error

31.3 Over-safeguarding must therefore also be investigated and resolved.


32. TIMING DIFFERENCES

32.1 Some reconciliation differences may arise due to timing differences between systems, settlement cycles, banking movements or payment processing cut-offs.

32.2 Timing differences must not be assumed to be acceptable merely because they are common.

32.3 The firm must maintain a documented basis for distinguishing:

  • acceptable and understood timing differences

  • unexplained or suspicious discrepancies

  • breaks requiring escalation or remediation

32.4 Ageing of timing differences must be monitored.

 

33. BREAK LOG

33.1 Digital Capital maintains a safeguarding break log or equivalent exception register.

33.2 The break log should record, at minimum:

  • date identified

  • reference ID

  • amount

  • type of break

  • root cause category

  • owner

  • current status

  • escalation status

  • target resolution date

  • actual resolution date

  • control remediation required, if any

33.3 The break log must support management oversight and auditability.


34. BREAK INVESTIGATION

34.1 Each safeguarding break must be investigated to determine:

  • what happened

  • how material it is

  • whether customer funds were or may have been exposed

  • whether the issue is isolated or systemic

  • whether an interim control is required

  • whether a regulatory or governance escalation is required

34.2 Investigations must be documented.

34.3 Repeated similar breaks must trigger root cause analysis and control review.

 

35. ESCALATION OF SAFEGUARDING BREAKS

35.1 Safeguarding breaks must be escalated according to severity and nature.

35.2 Escalation criteria should take into account:

  • amount of the discrepancy

  • duration of the discrepancy

  • whether the break indicates under-safeguarding

  • whether customer protection may have been compromised

  • whether the cause is unknown

  • whether the issue is recurring

  • whether a system or third-party dependency is implicated

35.3 Escalation may include:

  • finance / safeguarding operations

  • compliance

  • risk

  • senior management

  • legal or regulatory engagement where required


36. INTERIM ACTIONS

36.1 Where a safeguarding discrepancy or control failure is identified, Digital Capital may take interim actions to reduce risk.

36.2 Interim actions may include:

  • immediate funding or transfer action

  • additional reconciliations

  • temporary manual controls

  • increased review frequency

  • transaction or process restrictions

  • system workarounds pending permanent remediation

36.3 Interim actions must be documented and reviewed.

 

37. RESOLUTION OF BREAKS

37.1 A safeguarding break should only be treated as resolved when:

  • the discrepancy is corrected

  • the cause is understood to an appropriate level

  • any required remediation has been identified

  • evidence of resolution is retained

  • any necessary escalation or reporting has been completed

37.2 Closure of a break without adequate explanation is not acceptable.

 

38.ROOT CAUSE ANALYSIS

38.1 Significant or recurring safeguarding breaks must undergo root cause analysis.

38.2 Root cause analysis should assess whether the break arose from:

  • system design weakness

  • process gap

  • human error

  • inadequate review

  • incomplete records

  • third-party dependency

  • training deficiency

  • poor change implementation

38.3 Root cause analysis must result in:

  • specific remediation actions

  • assigned owners

  • timelines

  • follow-up validation where appropriate

 

39. SAFEGUARDING MANAGEMENT INFORMATION (MI)

39.1 Digital Capital maintains safeguarding MI to support governance and oversight.

39.2 Safeguarding MI may include:

  • total safeguarded balances

  • reconciliation completion status

  • number and value of breaks

  • ageing of unresolved breaks

  • under-safeguarding incidents

  • repeat issues by cause

  • time to resolve safeguarding discrepancies

  • unresolved control actions

  • dependency or banking issues affecting safeguarding

39.3 MI should be sufficiently clear to support challenge by management and, where relevant, the Board or equivalent governance body.


40. DAILY AND PERIODIC REPORTING

40.1 Daily or frequent operational reporting may be required for safeguarding teams or control owners.

40.2 Periodic management reporting should summarise:

  • current safeguarding position

  • open issues

  • trend analysis

  • remediation progress

  • material incidents or near misses

40.3 Reporting should be proportionate to the scale and complexity of operations but sufficiently robust to support governance.

 

41. EVIDENCE AND RECORD RETENTION

41.1 Digital Capital retains records sufficient to evidence the operation of the safeguarding framework.

41.2 This includes, where relevant:

  • reconciliation outputs

  • review sign-offs

  • break logs

  • investigation records

  • funding adjustments

  • management reports

  • escalation records

  • remediation actions

  • governance minutes or issue papers

41.3 Safeguarding evidence must be retrievable in a form suitable for:

  • internal review

  • audit

  • bank diligence

  • FCA requests


42. ACCESS CONTROLS AND SEGREGATION OF DUTIES

42.1 Safeguarding operations must be supported by appropriate segregation of duties.

42.2 This includes, where practicable:

  • separation between preparation and review of reconciliations

  • controlled access to safeguarding bank account operations

  • restricted approval rights for funding movements

  • controlled exception handling

42.3 Access permissions should be reviewed periodically.

 

43. SYSTEM AND THIRD-PARTY DEPENDENCIES

43.1 The safeguarding operating model may depend on systems, banks or service providers.

43.2 Digital Capital must understand and monitor such dependencies.

43.3 Where a third-party issue affects safeguarding, the matter must be treated with urgency and tracked as a safeguarding-related risk or incident where appropriate.

 

44. TRAINING AND COMPETENCE

44.1 Staff involved in safeguarding operations must be appropriately trained.

44.2 Training should cover:

  • safeguarding principles

  • reconciliation methodology

  • identification of breaks

  • escalation requirements

  • documentation standards

  • the distinction between customer funds and firm funds

44.3 Competence should be refreshed periodically and when material process changes occur.


45. REVIEW OF SAFEGUARDING OPERATIONS

45.1 The safeguarding operating model must be reviewed periodically to confirm that it remains appropriate.

45.2 Review triggers may include:

  • product changes

  • new payment flows

  • new banking arrangements

  • incidents or repeated breaks

  • regulatory developments

  • audit or compliance findings

45.3 Any material change to safeguarding operations must be subject to change governance and documented update.

 

46. INSOLVENCY PROTECTION — GENERAL POSITION

46.1 The purpose of safeguarding is to improve protection of customer funds if Digital Capital Ltd were to become insolvent.

46.2 Safeguarding is intended to ensure that relevant customer funds are protected from claims by the firm’s general creditors and are available to be returned to customers in accordance with applicable law and insolvency processes.

46.3 Safeguarding is a regulatory protection mechanism. It is not a guarantee that funds will be returned immediately, without process, delay, cost or legal complexity in every circumstance.

46.4 The firm must therefore ensure that its public and internal safeguarding descriptions are accurate, balanced and do not overstate the protection afforded by safeguarding.


47. INSOLVENCY SCENARIO — OPERATIONAL EXPECTATION

47.1 If Digital Capital were to fail or enter an insolvency-related process, customer funds that have been safeguarded should be distinguishable from the firm’s own funds through the safeguarding structure, books and records, and associated reconciliations.

47.2 In such a scenario, the return of safeguarded funds would ordinarily depend on matters including:

  • the accuracy and completeness of the firm’s books and records

  • the quality of segregation and reconciliation controls

  • the availability of safeguarding account balances

  • the speed and effectiveness of insolvency administration processes

  • the ability to identify customer entitlements

  • any legal, practical or operational issues arising at the point of failure

47.3 Digital Capital must not assume that insolvency protection is purely a legal drafting issue. It is heavily dependent on operational readiness and record integrity.

 

48. ROLE OF BOOKS AND RECORDS IN INSOLVENCY

48.1 The quality of the firm’s books and records is a critical safeguarding control because, in an insolvency scenario, those records may be relied upon to determine:

  • which funds are customer funds

  • how much is owed to each customer

  • whether a safeguarding shortfall or surplus exists

  • whether customer liabilities can be matched to safeguarded balances

48.2 Poor records, unresolved breaks, inconsistent classifications or weak data lineage may materially increase the complexity, delay and cost of returning funds.

48.3 For this reason, Digital Capital treats books and records as a core safeguarding issue rather than merely an accounting or operational matter.


49. INSOLVENCY PRACTITIONER AND DISTRIBUTION PROCESS

49.1 In an insolvency or administration scenario, an insolvency practitioner or similar officeholder may be appointed.

49.2 That person may be involved in:

  • identifying safeguarded funds

  • reconciling entitlements

  • managing distribution of available safeguarded amounts

  • dealing with operational issues, claims and records

49.3 The insolvency process may therefore involve administrative work, forensic review, legal interpretation and customer balance verification.

49.4 Digital Capital must ensure that its public disclosure accurately reflects that safeguarding improves customer protection but does not eliminate the practical realities of insolvency administration.

 

50. COSTS AND DEDUCTIONS

50.1 In certain circumstances, costs associated with the return of safeguarded funds may be incurred in connection with the insolvency process or the operation of the safeguarding framework.

50.2 Where permitted by law, such costs may affect the funds ultimately returned or the speed at which they are returned.

50.3 Digital Capital must ensure that customer-facing safeguarding disclosure does not imply that no costs, deductions, delays or process frictions could ever arise.

50.4 This point is particularly important because inaccurate statements about “full protection” or “guaranteed immediate return” may create regulatory and conduct risk.


51. LIMITATIONS OF SAFEGUARDING

51.1 Safeguarding does not provide the same protection as a bank deposit protection regime.

51.2 In particular, safeguarded funds:

  • are not deposits

  • are not protected by the Financial Services Compensation Scheme (FSCS) solely by reason of being safeguarded e-money or payment funds

  • may still be affected by insolvency process delays, records issues or related costs

51.3 Safeguarding also does not remove all operational risks. Its effectiveness depends on:

  • correct identification of relevant funds

  • robust segregation

  • accurate reconciliation

  • timely issue escalation

  • effective governance and oversight

51.4 Digital Capital must therefore present safeguarding as a strong regulatory protection mechanism, but not as an absolute or insurance-like promise.

 

52. CUSTOMER DISCLOSURE PRINCIPLES

52.1 Customer-facing safeguarding disclosure must be:

  • clear

  • accurate

  • balanced

  • not misleading

  • consistent across all public materials

52.2 Customer disclosure should explain, at a minimum:

  • that relevant funds are safeguarded in accordance with applicable rules

  • that safeguarded funds are not deposits

  • that safeguarded funds are not protected by the FSCS solely because they are safeguarded

  • that safeguarding is intended to protect customer funds if the firm fails

  • that insolvency processes may still involve administrative delay or costs

52.3 Customer-facing disclosure must avoid:

  • overstating protection

  • implying a guarantee of immediate access

  • using language that suggests safeguarding is equivalent to deposit insurance

  • using vague promotional language that weakens legal accuracy

 

53. CONSISTENCY OF PUBLIC DISCLOSURE

53.1 Safeguarding-related statements must be consistent across:

  • the safeguarding information page

  • account terms

  • website disclosures

  • FAQs

  • onboarding flows

  • customer support scripts, where relevant

  • complaint responses, where relevant

53.2 Inconsistency between documents may create:

  • customer confusion

  • conduct risk

  • FCA scrutiny

  • bank diligence concerns

  • legal interpretation risk

53.3 Digital Capital must therefore periodically review safeguarding language across all external materials.

 

54. GOVERNANCE OF SAFEGUARDING

54.1 Safeguarding must be subject to formal governance and oversight.

54.2 Governance should ensure that safeguarding is not treated as a narrow finance process only, but as a cross-functional control environment involving:

  • finance / safeguarding operations

  • compliance

  • risk

  • senior management

  • operations and systems stakeholders where relevant

54.3 Governance must be sufficiently robust to ensure that material safeguarding risks, issues and trends are visible to the appropriate management level.

 

55. SENIOR MANAGEMENT OVERSIGHT

55.1 Senior management is responsible for ensuring that the firm maintains an effective safeguarding framework.

55.2 Senior management responsibilities include:

  • ensuring adequate resourcing and capability

  • reviewing material safeguarding MI

  • ensuring that significant breaks or weaknesses are escalated

  • ensuring remediation is tracked and completed

  • ensuring that growth, product changes or new Partner arrangements do not undermine safeguarding integrity

55.3 Senior management must also ensure that safeguarding is properly reflected in the firm’s wider governance, risk and supervisory readiness model.

 

56. MANAGEMENT INFORMATION AND REPORTING

56.1 Safeguarding MI must be reported periodically to the appropriate governance level.

56.2 Reporting should include, where relevant:

  • current safeguarded balance

  • reconciliation completion status

  • open breaks and ageing

  • under-safeguarding incidents

  • over-safeguarding trends

  • repeat issues and root causes

  • unresolved remediation actions

  • banking or dependency issues affecting safeguarding

  • any incidents requiring heightened attention

56.3 MI should support meaningful challenge, not merely summary reporting.

56.4 If safeguarding MI is incomplete, delayed or unreliable, that itself should be treated as a control concern.


57. ESCALATION TO GOVERNANCE FORUMS

57.1 Material safeguarding issues must be escalated to the appropriate governance forum or senior management channel.

57.2 Escalation should occur where there is, for example:

  • under-safeguarding

  • a significant unresolved discrepancy

  • repeated or systemic reconciliation issues

  • unresolved dependency failure affecting safeguarding

  • uncertainty over records or entitlement calculations

  • a material governance, process or systems weakness

  • any safeguarding issue with potential regulatory significance

57.3 Escalation records must be retained.

 

58. INTERACTION WITH RISK, INCIDENT AND AUDIT FRAMEWORKS

58.1 Safeguarding does not operate in isolation.

58.2 Safeguarding issues may also fall within the scope of:

  • the Risk Management Framework

  • the Incident & Breach Management Policy

  • the Compliance Monitoring Plan

  • the Internal Audit Framework

  • the Board MI and governance reporting framework

58.3 Material safeguarding matters should therefore be reflected consistently across those frameworks where relevant.

58.4 This is important to ensure that safeguarding is treated as an enterprise control issue and not siloed within one function.

 

59. INTERACTION WITH PARTNER MODEL

59.1 In Digital Capital’s business model, Partners do not hold or control safeguarded funds.

59.2 Partners do not control safeguarding account arrangements, safeguarding reconciliations, or safeguarding governance decisions.

59.3 However, the business model, customer volumes, onboarding patterns and segmentation associated with Partners may affect the scale and operational profile of safeguarding.

59.4 For this reason, changes in Partner arrangements, customer cohorts, transaction patterns or product usage should be assessed for potential safeguarding impact.

 

60. BANKING AND DEPENDENCY RISK

60.1 Safeguarding depends in part on the operational reliability of banking and related infrastructure arrangements.

60.2 Digital Capital must therefore monitor and manage risks relating to:

  • banking dependencies

  • account availability

  • operational restrictions

  • delays in account operations

  • concentration risk where relevant

  • changes in banking arrangements

60.3 Material dependency issues affecting safeguarding must be escalated and reflected in management reporting where appropriate.


61. CHANGE MANAGEMENT

61.1 Material changes to products, payment flows, banking structure, ledger logic, reconciliation logic, system architecture or Partner operating model must be assessed for safeguarding impact before implementation.

61.2 Change approval should consider:

  • whether customer funds are identified correctly

  • whether reconciliation logic remains accurate

  • whether new timing differences are introduced

  • whether reporting or evidence outputs are affected

  • whether governance or review controls require adjustment

61.3 A material change should not be treated as complete until safeguarding impact has been considered and documented.

 

62. INTERNAL REVIEW, MONITORING AND ASSURANCE

62.1 Safeguarding must be subject to periodic internal review.

62.2 Such review may occur through:

  • first-line control review

  • compliance monitoring

  • risk review

  • internal audit

  • thematic or issue-based review

62.3 Review activity should assess not only whether safeguarding documentation exists, but whether:

  • reconciliations are occurring as required

  • breaks are being managed appropriately

  • MI is reliable

  • records are accurate

  • remediation actions are effective

62.4 Findings should be documented and tracked.

 

63. TRAINING, AWARENESS AND CONTROL CULTURE

63.1 Safeguarding effectiveness depends not only on process, but also on understanding and control culture.

63.2 Staff relevant to safeguarding must understand:

  • why safeguarding matters

  • how customer funds differ from firm funds

  • how reconciliation works

  • when discrepancies must be escalated

  • what constitutes a serious safeguarding issue

  • how customer-facing descriptions must remain accurate and balanced

63.3 The firm should promote a control culture in which safeguarding issues are raised early and not minimised.

 

64. CUSTOMER COMMUNICATION IN THE EVENT OF ISSUES

64.1 Where a safeguarding-related issue has actual or potential customer impact, Digital Capital must consider whether customer communication is required, taking into account:

  • legal obligations

  • regulatory expectations

  • customer fairness

  • the need for accuracy and consistency

  • the need not to mislead or overstate the issue

64.2 Communications should be coordinated with compliance, legal and senior management where appropriate.

64.3 The firm must avoid speculative or incomplete customer messaging that could create further confusion or conduct risk.

 

65. DOCUMENTATION AND RETENTION

65.1 Digital Capital retains safeguarding-related documentation and evidence in accordance with legal, regulatory and operational requirements.

65.2 Retained documentation may include:

  • safeguarding methodology documents

  • reconciliation procedures

  • reconciliation outputs

  • break logs

  • review and sign-off records

  • MI packs

  • incident or issue records

  • remediation records

  • governance papers

  • change assessments affecting safeguarding

65.3 Such records must be sufficiently organised to support:

  • internal assurance

  • regulatory requests

  • bank diligence

  • audit review

  • insolvency-readiness considerations

 

66. REVIEW OF THIS DOCUMENT

66.1 This safeguarding document must be reviewed periodically and whenever a material change occurs in:

  • regulation

  • safeguarding methodology

  • products or services

  • payment flows

  • banking arrangements

  • Partner model

  • internal systems or records

  • control incidents or audit findings

66.2 Updates must be version controlled and approved through appropriate governance channels.


67. FINAL POSITIONING

67.1 Digital Capital Ltd safeguards relevant customer funds in accordance with applicable legal and regulatory requirements.

67.2 Safeguarding is supported not only by legal structure, but by:

  • operational segregation

  • reconciliation

  • issue escalation

  • governance oversight

  • management information

  • evidence and record integrity

67.3 The effectiveness of safeguarding depends on the strength of the firm’s full operating model, and Digital Capital therefore treats safeguarding as a core control priority across legal, operational, governance and supervisory dimensions.

1. PURPOSE

1.1 This document sets out how Digital Capital Ltd safeguards customer funds in accordance with applicable laws and regulatory requirements.

1.2 It explains:

  • how funds are protected

  • how safeguarding operates in practice

  • how risks are managed

  • how safeguarding is governed

 

2. REGULATORY FRAMEWORK

2.1 Digital Capital Ltd safeguards customer funds in accordance with:

  • Electronic Money Regulations 2011

  • applicable FCA requirements

2.2 Safeguarding is a core regulatory obligation.

 

3. NATURE OF CUSTOMER FUNDS

3.1 Funds held by Digital Capital:

  • are electronic money

  • represent a claim on Digital Capital

3.2 These funds:

  • are not deposits

  • are not covered by FSCS


4. SAFEGUARDING PRINCIPLE

4.1 Customer funds must:

  • be segregated from corporate funds

  • be protected in insolvency

 

5. SAFEGUARDING METHOD

5.1 Digital Capital safeguards funds by:

  • holding funds in segregated safeguarding accounts

 

6. SEGREGATION OF FUNDS

6.1 Customer funds are:

  • separated from company funds

  • not used for operational purposes

 

7. SAFEGUARDING ACCOUNTS

7.1 Safeguarding accounts are:

  • held with authorised credit institutions

 

8. OWNERSHIP AND RESPONSIBILITY

8.1 Digital Capital retains full responsibility for safeguarding.

 

9. GOVERNANCE

9.1 Safeguarding is overseen by:

  • senior management

  • finance / safeguarding function

 

10. RISK MANAGEMENT

10.1 Safeguarding risks include:

  • reconciliation errors

  • operational failures

  • banking dependency

 

11. INTERNAL CONTROLS

11.1 Controls include:

  • segregation

  • reconciliation

  • monitoring

 

12. PARTNER MODEL

12.1 Partners do not:

  • hold funds

  • control safeguarding

 

13. TRANSPARENCY

13.1 Customers are informed that:

  • funds are safeguarded

  • not insured

 

14. LIMITATIONS

14.1 Safeguarding:

  • is not equivalent to deposit protection

 

15. CONTACT

15.1 For safeguarding queries:

info@digi-capital.co.uk

 

16. OPERATIONAL SAFEGUARDING FRAMEWORK

16.1 Digital Capital operates a structured safeguarding framework designed to ensure that customer funds are identified, segregated, reconciled, monitored and protected on an ongoing basis.

16.2 The operational safeguarding framework is intended to ensure that:

  • the amount of funds that should be safeguarded is accurately determined

  • safeguarded funds are held in the correct accounts

  • discrepancies are identified promptly

  • exceptions are escalated and resolved without undue delay

  • records remain sufficiently accurate to support customer fund protection

  • management has visibility over safeguarding effectiveness and exceptions

16.3 Safeguarding is treated as a live operational control environment and not as a static legal concept.


17. SAFEGUARDING OPERATING MODEL

17.1 Digital Capital maintains an operating model under which:

  • customer funds received in exchange for electronic money or otherwise subject to safeguarding requirements are identified through the firm’s systems and records

  • those funds are held in designated safeguarding accounts

  • safeguarding balances are compared against internal records through reconciliation processes

  • any safeguarding discrepancies are escalated, investigated and resolved

  • governance and management information support regular oversight of safeguarding effectiveness

17.2 The safeguarding operating model must be documented and kept under review.

17.3 The safeguarding model must remain consistent with:

  • the firm’s product set

  • payment flows

  • card arrangements

  • account structures

  • banking arrangements

  • geographic footprint

  • operational dependencies

 

18. IDENTIFICATION OF RELEVANT FUNDS

18.1 Digital Capital identifies funds that are subject to safeguarding requirements through its internal books, records and transaction systems.

18.2 This includes funds which:

  • have been received from or for a customer in connection with the issuance of electronic money

  • remain owed to customers in connection with regulated services

  • must be protected pending redemption, payment execution or other lawful disposition

18.3 The identification logic must be sufficiently robust to ensure that:

  • customer liabilities are not understated

  • corporate funds are not incorrectly treated as safeguarded funds

  • relevant pending and settled flows are properly captured

  • timing differences are understood and controlled

18.4 The firm must ensure that the basis on which relevant funds are identified is documented and consistently applied.

 

19. CUSTOMER FUND RECORDS

19.1 Digital Capital maintains books and records sufficient to determine:

  • the amount owed to customers

  • the balance that should be safeguarded

  • the relationship between customer liabilities and safeguarded balances

19.2 Customer fund records must be:

  • accurate

  • complete

  • current

  • capable of supporting reconciliation and exception investigation

19.3 Record integrity is a critical component of safeguarding.

19.4 If record accuracy is in doubt, the matter must be treated as a safeguarding risk and escalated appropriately.

 

20. SAFEGUARDING ACCOUNTS — OPERATIONAL EXPECTATIONS

20.1 Safeguarding accounts must be clearly designated and distinguishable from Digital Capital’s own corporate or operating accounts.

20.2 The firm must maintain a clear internal record of:

  • each safeguarding account

  • the institution with which it is held

  • its intended purpose

  • associated operational dependencies

  • authorised internal users and approval controls

20.3 Access to safeguarding accounts and associated banking operations must be appropriately restricted.

20.4 Any change to safeguarding account arrangements must be subject to governance review and controlled implementation.


21. SEGREGATION IN PRACTICE

21.1 Segregation is not satisfied solely by legal description; it must also be reflected in operational reality.

21.2 Digital Capital therefore operates controls intended to ensure that:

  • customer funds are not mixed with general operating funds other than to the limited extent permitted by the safeguarding framework and timing mechanics of payments operations

  • transfers into and out of safeguarding accounts are controlled and traceable

  • operational personnel understand the distinction between safeguarded funds and firm funds

  • finance, operations and compliance are aligned on the treatment of balances and exceptions

21.3 Any actual or suspected failure of segregation must be treated as a serious safeguarding incident.

 

22. RECONCILIATION OBJECTIVE

22.1 The objective of safeguarding reconciliation is to verify that the amount held in safeguarding accounts appropriately matches the amount that ought to be safeguarded for customers.

22.2 Reconciliation exists to:

  • detect under-safeguarding

  • detect over-safeguarding

  • identify timing mismatches and record errors

  • support prompt remediation

  • provide management assurance that safeguarding is functioning effectively

22.3 Reconciliation is one of the most important operational safeguards within the safeguarding framework.

 

23. RECONCILIATION FREQUENCY

23.1 Digital Capital performs safeguarding reconciliations on a regular basis consistent with regulatory requirements, the scale of the business, volume of customer funds and operational risk profile.

23.2 As a minimum expectation for a mature control environment, safeguarding should be treated as a daily operational control where relevant balances and flows justify it.

23.3 The reconciliation cycle must be sufficiently frequent to ensure that:

  • discrepancies are identified promptly

  • management does not rely on stale information

  • operational issues do not remain undetected for prolonged periods

 

24. RECONCILIATION DATA SOURCES

24.1 Safeguarding reconciliation may involve comparison between:

  • internal customer liability records

  • ledger balances

  • safeguarding account balances

  • pending movement records

  • settlement or timing adjustment records

24.2 The firm must understand the origin, quality and timing of each data source used in reconciliation.

24.3 Where reconciliation depends on extracts, uploads, interfaces or reports, those dependencies must be controlled and monitored.


25. RECONCILIATION METHODOLOGY

25.1 The reconciliation methodology must be documented in sufficient detail to explain:

  • what balances are included

  • what balances are excluded

  • how timing differences are treated

  • how exceptions are identified

  • who performs the reconciliation

  • who reviews it

  • how it is evidenced

25.2 The methodology must be consistent with the firm’s actual product and transaction flows.

25.3 If the product set or payment flow logic changes, the reconciliation methodology must be reviewed accordingly.

 

26. RECONCILIATION PREPARATION

26.1 Before each reconciliation, the relevant data inputs should be checked for reasonableness and completeness.

26.2 This may include:

  • confirming ledger integrity

  • confirming availability of banking balances

  • confirming completion of relevant processing cycles

  • identifying known system issues that may affect the comparison

26.3 Material uncertainty affecting reconciliation accuracy must be escalated.

 

27. PERFORMANCE OF RECONCILIATION

27.1 The reconciliation must be performed by appropriately trained personnel using the approved methodology.

27.2 The reconciliation process must produce a clear comparison between:

  • the required safeguarded amount

  • the actual safeguarded amount

  • any difference or break identified

27.3 The output must be recorded in a manner that is auditable and retrievable.

 

28. REVIEW OF RECONCILIATION

28.1 Reconciliations must be subject to review by an appropriately authorised reviewer.

28.2 The reviewer should assess:

  • whether the reconciliation appears complete

  • whether unusual movements or unexplained items exist

  • whether any differences have been identified

  • whether the explanation of differences is reasonable

  • whether escalation is required

28.3 Review evidence must be retained.

 

29. SAFEGUARDING BREAKS

29.1 A safeguarding break is any discrepancy between the amount that should be safeguarded and the amount actually safeguarded, or any other material failure in the safeguarding control process.

29.2 Safeguarding breaks may arise from:

  • reconciliation error

  • ledger error

  • delayed transfer

  • banking issue

  • operational process failure

  • system issue

  • data integrity weakness

  • misclassification of balances

  • manual error

29.3 A safeguarding break may indicate:

  • under-safeguarding

  • over-safeguarding

  • uncertainty in records

  • unresolved timing mismatch

  • process weakness requiring remediation


30. UNDER-SAFEGUARDING

30.1 Under-safeguarding arises where the amount held in safeguarding accounts is less than the amount that should be safeguarded.

30.2 Under-safeguarding is treated as a serious matter because it may indicate that customer funds are not fully protected in the manner required.

30.3 Any under-safeguarding position must be escalated promptly and addressed with urgency.

30.4 The firm must document:

  • the amount of the break

  • the cause or suspected cause

  • when it arose or was identified

  • interim actions taken

  • final resolution steps

 

31. OVER-SAFEGUARDING

31.1 Over-safeguarding arises where the amount held in safeguarding accounts exceeds the amount that should be safeguarded.

31.2 While generally less severe than under-safeguarding from a customer protection perspective, over-safeguarding may still indicate:

  • record inaccuracy

  • process weakness

  • misclassification

  • inefficient liquidity management

  • unresolved operational error

31.3 Over-safeguarding must therefore also be investigated and resolved.


32. TIMING DIFFERENCES

32.1 Some reconciliation differences may arise due to timing differences between systems, settlement cycles, banking movements or payment processing cut-offs.

32.2 Timing differences must not be assumed to be acceptable merely because they are common.

32.3 The firm must maintain a documented basis for distinguishing:

  • acceptable and understood timing differences

  • unexplained or suspicious discrepancies

  • breaks requiring escalation or remediation

32.4 Ageing of timing differences must be monitored.

 

33. BREAK LOG

33.1 Digital Capital maintains a safeguarding break log or equivalent exception register.

33.2 The break log should record, at minimum:

  • date identified

  • reference ID

  • amount

  • type of break

  • root cause category

  • owner

  • current status

  • escalation status

  • target resolution date

  • actual resolution date

  • control remediation required, if any

33.3 The break log must support management oversight and auditability.


34. BREAK INVESTIGATION

34.1 Each safeguarding break must be investigated to determine:

  • what happened

  • how material it is

  • whether customer funds were or may have been exposed

  • whether the issue is isolated or systemic

  • whether an interim control is required

  • whether a regulatory or governance escalation is required

34.2 Investigations must be documented.

34.3 Repeated similar breaks must trigger root cause analysis and control review.

 

35. ESCALATION OF SAFEGUARDING BREAKS

35.1 Safeguarding breaks must be escalated according to severity and nature.

35.2 Escalation criteria should take into account:

  • amount of the discrepancy

  • duration of the discrepancy

  • whether the break indicates under-safeguarding

  • whether customer protection may have been compromised

  • whether the cause is unknown

  • whether the issue is recurring

  • whether a system or third-party dependency is implicated

35.3 Escalation may include:

  • finance / safeguarding operations

  • compliance

  • risk

  • senior management

  • legal or regulatory engagement where required


36. INTERIM ACTIONS

36.1 Where a safeguarding discrepancy or control failure is identified, Digital Capital may take interim actions to reduce risk.

36.2 Interim actions may include:

  • immediate funding or transfer action

  • additional reconciliations

  • temporary manual controls

  • increased review frequency

  • transaction or process restrictions

  • system workarounds pending permanent remediation

36.3 Interim actions must be documented and reviewed.

 

37. RESOLUTION OF BREAKS

37.1 A safeguarding break should only be treated as resolved when:

  • the discrepancy is corrected

  • the cause is understood to an appropriate level

  • any required remediation has been identified

  • evidence of resolution is retained

  • any necessary escalation or reporting has been completed

37.2 Closure of a break without adequate explanation is not acceptable.

 

38.ROOT CAUSE ANALYSIS

38.1 Significant or recurring safeguarding breaks must undergo root cause analysis.

38.2 Root cause analysis should assess whether the break arose from:

  • system design weakness

  • process gap

  • human error

  • inadequate review

  • incomplete records

  • third-party dependency

  • training deficiency

  • poor change implementation

38.3 Root cause analysis must result in:

  • specific remediation actions

  • assigned owners

  • timelines

  • follow-up validation where appropriate

 

39. SAFEGUARDING MANAGEMENT INFORMATION (MI)

39.1 Digital Capital maintains safeguarding MI to support governance and oversight.

39.2 Safeguarding MI may include:

  • total safeguarded balances

  • reconciliation completion status

  • number and value of breaks

  • ageing of unresolved breaks

  • under-safeguarding incidents

  • repeat issues by cause

  • time to resolve safeguarding discrepancies

  • unresolved control actions

  • dependency or banking issues affecting safeguarding

39.3 MI should be sufficiently clear to support challenge by management and, where relevant, the Board or equivalent governance body.


40. DAILY AND PERIODIC REPORTING

40.1 Daily or frequent operational reporting may be required for safeguarding teams or control owners.

40.2 Periodic management reporting should summarise:

  • current safeguarding position

  • open issues

  • trend analysis

  • remediation progress

  • material incidents or near misses

40.3 Reporting should be proportionate to the scale and complexity of operations but sufficiently robust to support governance.

 

41. EVIDENCE AND RECORD RETENTION

41.1 Digital Capital retains records sufficient to evidence the operation of the safeguarding framework.

41.2 This includes, where relevant:

  • reconciliation outputs

  • review sign-offs

  • break logs

  • investigation records

  • funding adjustments

  • management reports

  • escalation records

  • remediation actions

  • governance minutes or issue papers

41.3 Safeguarding evidence must be retrievable in a form suitable for:

  • internal review

  • audit

  • bank diligence

  • FCA requests


42. ACCESS CONTROLS AND SEGREGATION OF DUTIES

42.1 Safeguarding operations must be supported by appropriate segregation of duties.

42.2 This includes, where practicable:

  • separation between preparation and review of reconciliations

  • controlled access to safeguarding bank account operations

  • restricted approval rights for funding movements

  • controlled exception handling

42.3 Access permissions should be reviewed periodically.

 

43. SYSTEM AND THIRD-PARTY DEPENDENCIES

43.1 The safeguarding operating model may depend on systems, banks or service providers.

43.2 Digital Capital must understand and monitor such dependencies.

43.3 Where a third-party issue affects safeguarding, the matter must be treated with urgency and tracked as a safeguarding-related risk or incident where appropriate.

 

44. TRAINING AND COMPETENCE

44.1 Staff involved in safeguarding operations must be appropriately trained.

44.2 Training should cover:

  • safeguarding principles

  • reconciliation methodology

  • identification of breaks

  • escalation requirements

  • documentation standards

  • the distinction between customer funds and firm funds

44.3 Competence should be refreshed periodically and when material process changes occur.


45. REVIEW OF SAFEGUARDING OPERATIONS

45.1 The safeguarding operating model must be reviewed periodically to confirm that it remains appropriate.

45.2 Review triggers may include:

  • product changes

  • new payment flows

  • new banking arrangements

  • incidents or repeated breaks

  • regulatory developments

  • audit or compliance findings

45.3 Any material change to safeguarding operations must be subject to change governance and documented update.

 

46. INSOLVENCY PROTECTION — GENERAL POSITION

46.1 The purpose of safeguarding is to improve protection of customer funds if Digital Capital Ltd were to become insolvent.

46.2 Safeguarding is intended to ensure that relevant customer funds are protected from claims by the firm’s general creditors and are available to be returned to customers in accordance with applicable law and insolvency processes.

46.3 Safeguarding is a regulatory protection mechanism. It is not a guarantee that funds will be returned immediately, without process, delay, cost or legal complexity in every circumstance.

46.4 The firm must therefore ensure that its public and internal safeguarding descriptions are accurate, balanced and do not overstate the protection afforded by safeguarding.


47. INSOLVENCY SCENARIO — OPERATIONAL EXPECTATION

47.1 If Digital Capital were to fail or enter an insolvency-related process, customer funds that have been safeguarded should be distinguishable from the firm’s own funds through the safeguarding structure, books and records, and associated reconciliations.

47.2 In such a scenario, the return of safeguarded funds would ordinarily depend on matters including:

  • the accuracy and completeness of the firm’s books and records

  • the quality of segregation and reconciliation controls

  • the availability of safeguarding account balances

  • the speed and effectiveness of insolvency administration processes

  • the ability to identify customer entitlements

  • any legal, practical or operational issues arising at the point of failure

47.3 Digital Capital must not assume that insolvency protection is purely a legal drafting issue. It is heavily dependent on operational readiness and record integrity.

 

48. ROLE OF BOOKS AND RECORDS IN INSOLVENCY

48.1 The quality of the firm’s books and records is a critical safeguarding control because, in an insolvency scenario, those records may be relied upon to determine:

  • which funds are customer funds

  • how much is owed to each customer

  • whether a safeguarding shortfall or surplus exists

  • whether customer liabilities can be matched to safeguarded balances

48.2 Poor records, unresolved breaks, inconsistent classifications or weak data lineage may materially increase the complexity, delay and cost of returning funds.

48.3 For this reason, Digital Capital treats books and records as a core safeguarding issue rather than merely an accounting or operational matter.


49. INSOLVENCY PRACTITIONER AND DISTRIBUTION PROCESS

49.1 In an insolvency or administration scenario, an insolvency practitioner or similar officeholder may be appointed.

49.2 That person may be involved in:

  • identifying safeguarded funds

  • reconciling entitlements

  • managing distribution of available safeguarded amounts

  • dealing with operational issues, claims and records

49.3 The insolvency process may therefore involve administrative work, forensic review, legal interpretation and customer balance verification.

49.4 Digital Capital must ensure that its public disclosure accurately reflects that safeguarding improves customer protection but does not eliminate the practical realities of insolvency administration.

 

50. COSTS AND DEDUCTIONS

50.1 In certain circumstances, costs associated with the return of safeguarded funds may be incurred in connection with the insolvency process or the operation of the safeguarding framework.

50.2 Where permitted by law, such costs may affect the funds ultimately returned or the speed at which they are returned.

50.3 Digital Capital must ensure that customer-facing safeguarding disclosure does not imply that no costs, deductions, delays or process frictions could ever arise.

50.4 This point is particularly important because inaccurate statements about “full protection” or “guaranteed immediate return” may create regulatory and conduct risk.


51. LIMITATIONS OF SAFEGUARDING

51.1 Safeguarding does not provide the same protection as a bank deposit protection regime.

51.2 In particular, safeguarded funds:

  • are not deposits

  • are not protected by the Financial Services Compensation Scheme (FSCS) solely by reason of being safeguarded e-money or payment funds

  • may still be affected by insolvency process delays, records issues or related costs

51.3 Safeguarding also does not remove all operational risks. Its effectiveness depends on:

  • correct identification of relevant funds

  • robust segregation

  • accurate reconciliation

  • timely issue escalation

  • effective governance and oversight

51.4 Digital Capital must therefore present safeguarding as a strong regulatory protection mechanism, but not as an absolute or insurance-like promise.

 

52. CUSTOMER DISCLOSURE PRINCIPLES

52.1 Customer-facing safeguarding disclosure must be:

  • clear

  • accurate

  • balanced

  • not misleading

  • consistent across all public materials

52.2 Customer disclosure should explain, at a minimum:

  • that relevant funds are safeguarded in accordance with applicable rules

  • that safeguarded funds are not deposits

  • that safeguarded funds are not protected by the FSCS solely because they are safeguarded

  • that safeguarding is intended to protect customer funds if the firm fails

  • that insolvency processes may still involve administrative delay or costs

52.3 Customer-facing disclosure must avoid:

  • overstating protection

  • implying a guarantee of immediate access

  • using language that suggests safeguarding is equivalent to deposit insurance

  • using vague promotional language that weakens legal accuracy

 

53. CONSISTENCY OF PUBLIC DISCLOSURE

53.1 Safeguarding-related statements must be consistent across:

  • the safeguarding information page

  • account terms

  • website disclosures

  • FAQs

  • onboarding flows

  • customer support scripts, where relevant

  • complaint responses, where relevant

53.2 Inconsistency between documents may create:

  • customer confusion

  • conduct risk

  • FCA scrutiny

  • bank diligence concerns

  • legal interpretation risk

53.3 Digital Capital must therefore periodically review safeguarding language across all external materials.

 

54. GOVERNANCE OF SAFEGUARDING

54.1 Safeguarding must be subject to formal governance and oversight.

54.2 Governance should ensure that safeguarding is not treated as a narrow finance process only, but as a cross-functional control environment involving:

  • finance / safeguarding operations

  • compliance

  • risk

  • senior management

  • operations and systems stakeholders where relevant

54.3 Governance must be sufficiently robust to ensure that material safeguarding risks, issues and trends are visible to the appropriate management level.

 

55. SENIOR MANAGEMENT OVERSIGHT

55.1 Senior management is responsible for ensuring that the firm maintains an effective safeguarding framework.

55.2 Senior management responsibilities include:

  • ensuring adequate resourcing and capability

  • reviewing material safeguarding MI

  • ensuring that significant breaks or weaknesses are escalated

  • ensuring remediation is tracked and completed

  • ensuring that growth, product changes or new Partner arrangements do not undermine safeguarding integrity

55.3 Senior management must also ensure that safeguarding is properly reflected in the firm’s wider governance, risk and supervisory readiness model.

 

56. MANAGEMENT INFORMATION AND REPORTING

56.1 Safeguarding MI must be reported periodically to the appropriate governance level.

56.2 Reporting should include, where relevant:

  • current safeguarded balance

  • reconciliation completion status

  • open breaks and ageing

  • under-safeguarding incidents

  • over-safeguarding trends

  • repeat issues and root causes

  • unresolved remediation actions

  • banking or dependency issues affecting safeguarding

  • any incidents requiring heightened attention

56.3 MI should support meaningful challenge, not merely summary reporting.

56.4 If safeguarding MI is incomplete, delayed or unreliable, that itself should be treated as a control concern.


57. ESCALATION TO GOVERNANCE FORUMS

57.1 Material safeguarding issues must be escalated to the appropriate governance forum or senior management channel.

57.2 Escalation should occur where there is, for example:

  • under-safeguarding

  • a significant unresolved discrepancy

  • repeated or systemic reconciliation issues

  • unresolved dependency failure affecting safeguarding

  • uncertainty over records or entitlement calculations

  • a material governance, process or systems weakness

  • any safeguarding issue with potential regulatory significance

57.3 Escalation records must be retained.

 

58. INTERACTION WITH RISK, INCIDENT AND AUDIT FRAMEWORKS

58.1 Safeguarding does not operate in isolation.

58.2 Safeguarding issues may also fall within the scope of:

  • the Risk Management Framework

  • the Incident & Breach Management Policy

  • the Compliance Monitoring Plan

  • the Internal Audit Framework

  • the Board MI and governance reporting framework

58.3 Material safeguarding matters should therefore be reflected consistently across those frameworks where relevant.

58.4 This is important to ensure that safeguarding is treated as an enterprise control issue and not siloed within one function.

 

59. INTERACTION WITH PARTNER MODEL

59.1 In Digital Capital’s business model, Partners do not hold or control safeguarded funds.

59.2 Partners do not control safeguarding account arrangements, safeguarding reconciliations, or safeguarding governance decisions.

59.3 However, the business model, customer volumes, onboarding patterns and segmentation associated with Partners may affect the scale and operational profile of safeguarding.

59.4 For this reason, changes in Partner arrangements, customer cohorts, transaction patterns or product usage should be assessed for potential safeguarding impact.

 

60. BANKING AND DEPENDENCY RISK

60.1 Safeguarding depends in part on the operational reliability of banking and related infrastructure arrangements.

60.2 Digital Capital must therefore monitor and manage risks relating to:

  • banking dependencies

  • account availability

  • operational restrictions

  • delays in account operations

  • concentration risk where relevant

  • changes in banking arrangements

60.3 Material dependency issues affecting safeguarding must be escalated and reflected in management reporting where appropriate.


61. CHANGE MANAGEMENT

61.1 Material changes to products, payment flows, banking structure, ledger logic, reconciliation logic, system architecture or Partner operating model must be assessed for safeguarding impact before implementation.

61.2 Change approval should consider:

  • whether customer funds are identified correctly

  • whether reconciliation logic remains accurate

  • whether new timing differences are introduced

  • whether reporting or evidence outputs are affected

  • whether governance or review controls require adjustment

61.3 A material change should not be treated as complete until safeguarding impact has been considered and documented.

 

62. INTERNAL REVIEW, MONITORING AND ASSURANCE

62.1 Safeguarding must be subject to periodic internal review.

62.2 Such review may occur through:

  • first-line control review

  • compliance monitoring

  • risk review

  • internal audit

  • thematic or issue-based review

62.3 Review activity should assess not only whether safeguarding documentation exists, but whether:

  • reconciliations are occurring as required

  • breaks are being managed appropriately

  • MI is reliable

  • records are accurate

  • remediation actions are effective

62.4 Findings should be documented and tracked.

 

63. TRAINING, AWARENESS AND CONTROL CULTURE

63.1 Safeguarding effectiveness depends not only on process, but also on understanding and control culture.

63.2 Staff relevant to safeguarding must understand:

  • why safeguarding matters

  • how customer funds differ from firm funds

  • how reconciliation works

  • when discrepancies must be escalated

  • what constitutes a serious safeguarding issue

  • how customer-facing descriptions must remain accurate and balanced

63.3 The firm should promote a control culture in which safeguarding issues are raised early and not minimised.

 

64. CUSTOMER COMMUNICATION IN THE EVENT OF ISSUES

64.1 Where a safeguarding-related issue has actual or potential customer impact, Digital Capital must consider whether customer communication is required, taking into account:

  • legal obligations

  • regulatory expectations

  • customer fairness

  • the need for accuracy and consistency

  • the need not to mislead or overstate the issue

64.2 Communications should be coordinated with compliance, legal and senior management where appropriate.

64.3 The firm must avoid speculative or incomplete customer messaging that could create further confusion or conduct risk.

 

65. DOCUMENTATION AND RETENTION

65.1 Digital Capital retains safeguarding-related documentation and evidence in accordance with legal, regulatory and operational requirements.

65.2 Retained documentation may include:

  • safeguarding methodology documents

  • reconciliation procedures

  • reconciliation outputs

  • break logs

  • review and sign-off records

  • MI packs

  • incident or issue records

  • remediation records

  • governance papers

  • change assessments affecting safeguarding

65.3 Such records must be sufficiently organised to support:

  • internal assurance

  • regulatory requests

  • bank diligence

  • audit review

  • insolvency-readiness considerations

 

66. REVIEW OF THIS DOCUMENT

66.1 This safeguarding document must be reviewed periodically and whenever a material change occurs in:

  • regulation

  • safeguarding methodology

  • products or services

  • payment flows

  • banking arrangements

  • Partner model

  • internal systems or records

  • control incidents or audit findings

66.2 Updates must be version controlled and approved through appropriate governance channels.


67. FINAL POSITIONING

67.1 Digital Capital Ltd safeguards relevant customer funds in accordance with applicable legal and regulatory requirements.

67.2 Safeguarding is supported not only by legal structure, but by:

  • operational segregation

  • reconciliation

  • issue escalation

  • governance oversight

  • management information

  • evidence and record integrity

67.3 The effectiveness of safeguarding depends on the strength of the firm’s full operating model, and Digital Capital therefore treats safeguarding as a core control priority across legal, operational, governance and supervisory dimensions.

A connected financial platform for payments, wallets, card issuing, supplier payouts, and loyalty-driven QR payments.


info@digi-capital.co.uk

Digital Capital Ltd is authorised by the Financial Conduct Authority (FCA) as an electronic money institution under Firm Reference Number 900710. Registered in England and Wales, company number 10222334. Registered office: 3rd Floor, 86–90 Paul Street, London, EC2A 4NE, England.


The company is currently in a pre-operational phase and does not provide services or hold client funds. Funds held in e-money accounts are not covered by the Financial Services Compensation Scheme (FSCS).


© 2026 Digital Capital Ltd. All rights reserved.

A connected financial platform for payments, wallets, card issuing, supplier payouts, and loyalty-driven QR payments.


info@digi-capital.co.uk

Digital Capital Ltd is authorised by the Financial Conduct Authority (FCA) as an electronic money institution under Firm Reference Number 900710. Registered in England and Wales, company number 10222334. Registered office: 3rd Floor, 86–90 Paul Street, London, EC2A 4NE, England.


The company is currently in a pre-operational phase and does not provide services or hold client funds. Funds held in e-money accounts are not covered by the Financial Services Compensation Scheme (FSCS).


© 2026 Digital Capital Ltd. All rights reserved.

A connected financial platform for payments, wallets, card issuing, supplier payouts, and loyalty-driven QR payments.


info@digi-capital.co.uk

Digital Capital Ltd is authorised by the Financial Conduct Authority (FCA) as an electronic money institution under Firm Reference Number 900710. Registered in England and Wales, company number 10222334. Registered office: 3rd Floor, 86–90 Paul Street, London, EC2A 4NE, England.


The company is currently in a pre-operational phase and does not provide services or hold client funds. Funds held in e-money accounts are not covered by the Financial Services Compensation Scheme (FSCS).


© 2026 Digital Capital Ltd. All rights reserved.