Showing 3434 Documents for "securities"

Filter by
Sort by

    • MAS
    • Forms and Templates

    Last revised date:

    • ",,,,, 10,3.4.1,A comprehensive IT security awareness training program is established to enhance the overall IT security awareness level in the organisation. ,,,,, ,,The training program includes information on IT security policies and standards as well as individual responsibility in respect of IT
    • ",,,,, ,,Implementation timeframe for each category of security patches is established.,,,,, 23,9.5.2,Security patches are rigorously tested before deployment into the production environment.,,,,, 24,9.6.1,Security monitoring systems and processes are established to facilitate prompt detection of
    • ,,, 10,F.3.4,Customers are advised to adopt the following security precautions and practices:,,,,, ,,"a.
    • MAS
    • Circulars

    Last revised date:

    • FIs should be cognisant of the heightened security risks associated with BYOD due to challenges in securing, monitoring and controlling employees personal devices.
    • Although many of the technology and security concepts in the desktop environment can be adapted for mobility, such security solutions are generally still in the nascent stage.
    • Maturity of Mobile Security Solutions Many of the security solutions for desktop and laptop have been around for a number of decades, and are well tried and tested.
    • MAS
    • Forms and Templates

    Last revised date:

    • (SFA 04-G07), where applicable, before completing this Form.
    • Specified securities-based derivatives contract is defined in section 2 of the Act to mean securities-based derivatives contract that is not a futures contract.
    • Specified products are defined in section 2 of the Act to mean securities, specified securities-based derivatives contracts or units in a collective investment scheme.
    • MAS
    • Circulars

    Last revised date:

    • FIs could refer to resources such as the Open Web Application Security Project (OWASP) to stay updated of common and emergent security vulnerabilities. -------- 4 FIs are reminded that the above would similarly apply to outsourced activities.
    • coding practice. 1 Common security vulnerabilities include injections, security mis-configurations, sensitive data exposure, components with known vulnerabilities, and cross-site scripting / cross-site request forgery.
    • This makes FIs today more vulnerable to security breaches such as unauthorised system access, data theft, system outages and website defacement. 2 Under the MAS Technology Risk Management Guidelines, FIs are expected to implement robust security measures to ensure that
    • MAS
    • Circulars

    Last revised date:

    • Pte Ltd DBS Asset Management Ltd DBS Vickers Securities (Singapore) Pte Ltd Deutsche Asset Management (Asia) Ltd Deutsche Securities Asia Ltd G.K.
    • Preventive and deterrent measures should be commensurate with the different stages of security threat levels. This may include the implementation of more stringent security measures (e.g.
    • physical security measures), pre-activating alternate sites and redeployment of key personnel and operations during specific periods of heightened security threat levels. 9.
    • MAS
    • Circulars

    Last revised date:

    • Such a programme may comprise of periodic briefings conducted by in-house cyber security professionals or external specialists.
    • SRD TR 03/2015 9 Oct 2015 The Chief Executive Officers of All Financial Institutions Dear Sir / Madam TECHNOLOGY RISK AND CYBER SECURITY TRAINING FOR BOARD Information Technology (IT) is a key business enabler, and is increasingly integral to Financial Institutions
    • cyberattacks have increased, and the failure of critical systems today often has severe and immediate repercussions on FIs and their customers. 2 The FIs board of directors (the Board) and senior management are responsible for the oversight of technology risks and cyber security
    • MAS
    • Circulars

    Last revised date:

    • Guidance to all financial institutions on early detection of cyber security intrusions. Circular No.
    • Such delays in detecting cyber intrusions have compromised the interests of organisations and their customers. 3 Strong cyber resilience therefore requires that FIs not only secure their perimeters from a potential breach, but also have robust capabilities to promptly
    • MAS
    • Exemptions

    Last revised date:

    • Sets out the saving and transitional provisions for certain applications, notifications, arrangements and exemptions in relation to the amendments made to the SFA.
    • MAS

    Last revised date:

    • Notification to commence Sections 2 to 54, 60 to 73, 75 to 197, 199 to 202 and 204 to 212 of the Securities and Futures (Amendment) Act 2017.
    • MAS
    • Orders

    Last revised date:

    • Specification of the type of institutional, professional or business investor under section 278(1) of the SFA who is deemed a non-resident and who has sufficient expertise to understand any risk involved in buying or selling debentures.