Showing 3434 Documents for "securities"

Filter by
Sort by

    • PDPC
    • Public Consultations

    Last revised date:

    • We recognize that those demands for cross-border data flows must be reconciled with the perceived threat to the security of personal data and we support achieving this in a manner most equitable to individuals, business and privacy needs.
    • This affords a great deal of comfort to data subjects and conscientious data controllers and data intermediaries who wish to ensure the security of the personal data for which they are responsible as well as facilitating the commercial business of their organisation.
    • Inter-company transfers of personal data out of the jurisdiction would be best secured through a system of data subject consents, supported by contractual arrangements, as well as the concept of adequacy which would then also place reliance for enforcement on local data protection authorities – most
    • MAS
    • Speeches

    Last revised date:

    • Just last month, the ASEAN Capital Markets Forum (ACMF) announced the introduction of the ASEAN and Plus Standards Scheme for cross-border offerings of securities, which brings ease and cost savings to issuers who issues securities in more than one ASEAN country.
    • Exchanges, clearing houses and securities depositories which are proactive in aligning their business with this long term trend will have the potential to reap the benefits of a more integrated financial system.
    • Because the flow of funds and securities across borders are still not entirely seamless.  Institutions with assets in one market or currency cannot easily use them to fund liabilities or even to meet margin requirements in another. 
    • PDPC
    • Commission's Decisions

    Last revised date:

    • These frameworks, policies and standards addressed various aspects of IT security (amongst other matters); and (c) CES was subject to Cigna Groups corporate audit and annual GCC assessment processes which include security and data protection, as well as external audits which may include
    • -N.V. was found not to be in breach of the PDPA in relation to allegation that it had failed to make reasonable security arrangements to prevent the unauthorised disclosure of the personal data of its policy members. Click here to find out more.
    • In this regard, section 24 of the PDPA requires organisations to protect personal data in their possession or under their control by making reasonable security arrangements to prevent unauthorised access, disclosure and similar risks. 7.
    • MAS
    • Consultations

    Last revised date:

    • Security deposit 18.
    • Safeguarding requirements and security deposit.
    • MAS
    • Media Releases

    Last revised date:

    • Symphony is the cloud-based messaging and collaboration platform that connects markets, organizations and individuals securely.
    • Solus is operating system and device-agnostic, and reduces the reliance on physical assets like CAP readers and dongles to is also developing improve security.
    • MyCash Online is offering easy, secure and convenient online services to the migrant workers, who do not have access to online banking or credit cards.
    • MAS
    • Consultations

    Last revised date:

    • period means a period of 30 calendar days (a) from the date of commencement of dealing in the stabilised securities on a securities exchange; or (b) where the stabilised securities are listed on both a securities exchange and an overseas securities exchange, from the earlier
    • and Futures Act; relevant securities has the same meaning as in regulation 2 of the Securities and Futures (Market Conduct) (Exemptions) Regulations 2006; securities and securities exchange have the same meanings as in section 2 of the Securities and Futures Act; specified
    • BNP Paribas Securities Services Singapore Branch Question 1.
    • SSO
    • Subsidiary Legislation

    Last revised date:

    • Any private key of or relating to the individual that is used or may be used — ( a ) to create a secure electronic record or secure electronic signature; ( b ) to verify the integrity of a secure electronic record; or ( c ) to verify the authenticity or integrity of a secure electronic signature. 8.
    • and Futures Act (Cap. 289); “child or young person” means a person below 18 years of age; “credit card” and “charge card” have the meanings given by section 56 of the Banking Act; “CYPA” means the Children and Young Persons Act (Cap. 38); “electronic record”, “secure electronic record” and “secure electronic
    • self‑neglect” and “vulnerable adult” have the meanings given by section 2(1) of the VAA; “accident and health policy”, “life policy” and “policy owner” have the meanings given by the First Schedule to the Insurance Act (Cap. 142); “capital markets products” has the meaning given by section 2(1) of the Securities
    • PDPC
    • Commission's Decisions

    Last revised date:

    • In the Commissions view, where a single string of numbers is the only security arrangement serving both to identify and authenticate access to personal data, the numbers can possibly constitute reasonable security arrangements depending on the sensitivity of the personal data being protected
    • These numbers were therefore the only security arrangement put in place by the Respondent to protect personal data on the Website.
    • A warning was issued to ABR Holdings for failing to make reasonable security arrangements to prevent unauthorised disclosure of personal data of members on Swensen’s Kids Club website. Click here to find out more.
    • PDPC
    • Commission's Decisions

    Last revised date:

    • A financial penalty of $8,000 was imposed on Fortytwo for failing to put in place reasonable security arrangements to protect the personal data in its possession.
    • In our Guide to Data Protection Practices for ICT Systems, the Commission had highlighted that organisations should perform system patching promptly to fix security vulnerabilities.
    • The situation is different when the organisation, as a data security or data 5. management measure, applies pseudonymisation or anonymisation techniques on personal data that is in their possession or under their control.
    • MAS
    • Speeches

    Last revised date:

    • Regulatory Efforts to Enhance Cyber Security 7.     Maritime regulatory authorities and international groups are taking steps to strengthen the cyber resilience of this sector.
    • The International Maritime Organization, or IMO, released Guidelines on Maritime Cyber Risk Management in 2017 and has mandated that cyber security be addressed in ships’ safety management systems by 2021.
    • Regulators, policymakers, and companies within the insurance, maritime and cyber security sectors can use this report to understand the scale, scope and extent of financial impact from a catastrophic cyber attack.