Connect with us

Published

on

UK to require crypto firms to report every customer transaction

United Kingdom crypto companies will need to collect and report data from every customer trade and transfer beginning Jan. 1, 2026 as part of a broader effort to improve crypto tax reporting, the UK government said.

Everything from the user’s full name, home address and tax identification number will need to be collected and reported for every transaction, including the cryptocurrency used and the amount moved, the UK Revenue and Customs department said in a May 14 statement.

Details of companies, trusts and charities transacting on crypto platforms will also need to be reported.

Failure to comply or inaccurate reporting may incur penalties of up to 300 British pounds ($398.4) per user. The UK Revenue and Customs department said it would inform companies on how to comply with the incoming measures in due course.

However, UK authorities are encouraging crypto firms to start collecting data now to ensure compliance readiness.

The new rule is part of the UK’s integration of the Organisation for Economic Development’s Cryptoasset Reporting Framework to improve transparency in crypto tax reporting.

The changes reflect the UK government’s aim to establish a more robust regulatory framework that supports industry growth while ensuring consumer protection.

Related: Bitwise lists four crypto ETPs on London Stock Exchange

UK Chancellor Rachel Reeves also introduced a draft bill in late April to bring crypto exchanges, custodians and broker-dealers within its regulatory reach to combat scams and fraud.

“Today’s announcement sends a clear signal: Britain is open for business — but closed to fraud, abuse, and instability,” Reeves said at the time.

A study from the UK’s Financial Conduct Authority last November found that 12% of UK adults owned crypto in 2024 — a significant increase from the 4% reported in 2021.

UK’s approach contrasts with EU’s MiCA

The UK’s move to integrate the crypto rules into its existing financial framework contrasts with the European Union’s approach, which introduced the new Markets in Crypto-Assets Regulation framework last year.

According to the MiCA Crypto Alliance, one key difference is that the UK will allow foreign stablecoin issuers to operate in the UK without needing to register.

There will also be no cap on stablecoin volumes, unlike the EU’s approach, which may impose controls on stablecoin issuers to manage systemic risks.

UK to require crypto firms to report every customer transaction
Source: MiCA Crypto Alliance

Magazine: Crypto wanted to overthrow banks, now it’s becoming them in stablecoin fight

Continue Reading

Politics

Crypto to become UAE’s second-biggest sector in 5 years — Institutional investor

Published

on

By

Crypto to become UAE’s second-biggest sector in 5 years — Institutional investor

Crypto to become UAE’s second-biggest sector in 5 years — Institutional investor

The crypto industry is set to experience massive growth in the United Arab Emirates (UAE) due to its pro-tech and business regulations.

Continue Reading

Politics

Blockchain security must localize to stop Asia’s crypto crime wave

Published

on

By

Blockchain security must localize to stop Asia’s crypto crime wave

Blockchain security must localize to stop Asia’s crypto crime wave

Without localized risk detection and public–private cooperation, illicit capital will continue to flow unchecked, and trust in the system will collapse.

Continue Reading

Politics

Thousands more Afghans affected by second data breach, ministers say

Published

on

By

Thousands more Afghans affected by second data breach, ministers say

Thousands more Afghan nationals may have been affected by another data breach, the government has said.

Up to 3,700 Afghans brought to the UK between January and March 2024 have potentially been impacted as names, passport details and information from the Afghan Relocations and Assistance Policy has been compromised again, this time by a breach on a third party supplier used by the Ministry of Defence (MoD).

This was not an attack directly on the government but a cyber security incident on a sub-contractor named Inflite – The Jet Centre – an MoD supplier that provides ground handling services for flights at London Stansted Airport.

Please use Chrome browser for a more accessible video player

July: UK spies exposed in Afghan data breach

The flights were used to bring Afghans to the UK, travel to routine military exercises, and official engagements. It was also used to fly British troops and government officials.

Those involved were informed of it on Friday afternoon by the MoD, marking the second time information about Afghan nationals relocated to the UK has been compromised.

It is understood former Tory ministers are also affected by the hack.

Earlier this year, it emerged that almost 7,000 Afghan nationals would have to be relocated to the UK following a massive data breach by the British military that successive governments tried to keep secret with a super-injunction.

Defence Secretary John Healey offered a “sincere apology” for the first data breach in a statement to the House of Commons, saying he was “deeply concerned about the lack of transparency” around the data breach, adding: “No government wishes to withhold information from the British public, from parliamentarians or the press in this manner.”

Please use Chrome browser for a more accessible video player

July: Afghan interpreter ‘betrayed’ by UK govt

The previous Conservative government set up a secret scheme in 2023 to relocate Afghan nationals impacted by the data breach, but who were not eligible for an existing programme to relocate and help people who had worked for the British government in Afghanistan.

The mistake exposed personal details of close to 20,000 individuals, endangering them and their families, with as many as 100,000 people impacted in total.

Read more on Sky News:
Data breach victims sent spam emails
Afghan data leak timeline
MoD urged to reveal details of nuclear incident

A government spokesperson said of Friday’s latest breach: “We were recently notified that a third party sub-contractor to a supplier experienced a cyber security incident involving unauthorised access to a small number of its emails that contained basic personal information.

“We take data security extremely seriously and are going above and beyond our legal duties in informing all potentially affected individuals. The incident has not posed any threat to individuals’ safety, nor compromised any government systems.”

In a statement, Inflite – The Jet Centre confirmed the “data security incident” involving “unauthorised access to a limited number of company emails”.

“We have reported the incident to the Information Commissioner’s Office and have been actively working with the relevant UK cyber authorities, including the National Crime Agency and the National Cyber Security Centre, to support our investigation and response,” it said.

“We believe the scope of the incident was limited to email accounts only, however, as a precautionary measure, we have contacted our key stakeholders whose data may have been affected during the period of January to March 2024.”

Continue Reading

Trending