Showing 3434 Documents for "securities"

Filter by
Sort by

    • MAS
    • Guidelines

    Last revised date:

    • Act (Cap. 289) (SFA).
    • In these Guidelines issuer means (a) in relation to an offer of securities or securities-based derivatives contracts, the entity that issues or will be issuing the securities or securities-based derivatives contracts being offered; or in relation to an offer
    • as defined in the SFA and the Exemption Regulations.
    • MAS
    • Notices

    Last revised date:

    • debt security or sukuk.
    • (including commercial papers), sovereign debt securities, PSE debt securities and ordinary shares.
    • MAS
    • Consultations

    Last revised date:

    • Execution activities refer to any or all of the following activities as defined in section 2(1) of the Securities and Futures Act: (a) dealing in securities (other than collective investment schemes) quoted on a securities exchange, overseas securities exchange or recognised trading
    • SFA 04-N12] (SFA 04-N12) as a review of a customers knowledge and experience in derivatives for the purpose of opening an account for the customer to trade in an SIP which is listed for quotation or quoted on a securities market or a futures market. 5 CKA is defined in SFA 04-N12
    • Securities, derivative financing contracts securities-based and CIS 4. Fund management in 5. Providing relation to securities, securities- based derivative contracts and units in a CIS custodial services 6. Real estate investment trust management 7.
    • MAS
    • Guidelines

    Last revised date:

    • Key Features of the Securities Key Features of the Securities Key Features of the Securities Key Features of the Securities Key Features of the Securities WHAT ARE YOU INVESTING IN?
    • of these other securities.]
    • PDPC
    • Commission's Decisions

    Last revised date:

    • in the security audit; (d) Develop an IT security policy to guide its employees on the security of personal data on its mobile applications and accompanying IT systems within 60 days from the date of completion of the above-mentioned security audit; (e) Within 120 days of this decision,
    • reasonably have prevented could 7 While the Organisation has in its Application asserted that its IT vendor undertook a security review and testing at regular intervals, such a security review was only conducted for the purposes of testing the security of the
    • In particular: (a) The Incident was not a result of a deliberate security breach on the hosting service for the Organisations System (as defined in the Decision) or a result of any security vulnerabilities at the infrastructure or hosting layer.
    • PDPC
    • Commission's Decisions

    Last revised date:

    • (1) Inadequate security policies and processes 22. Having in place adequate security policies and processes is the cornerstone for protecting personal data in the IT setting.
    • This security vulnerability exposed the hosting the credentials be environment intercepted.
    • The need to have a strong password is fundamental to the security of the database system.
    • MAS
    • Consultations

    Last revised date:

    • Parliament passed the Securities and 1 Futures Act (SFA).
    • The SFA was enacted after a comprehensive review of Singapores securities and futures legislation by the Monetary Authority of Singapore (MAS).
    • PROPOSED LEGISLATIVE AMENDMENTS TO THE SFA As part of its on-going effort to improve its regulatory 3 framework, MAS intends to amend the SFA in two phases.
    • MAS
    • Consultations

    Last revised date:

    • The FAA definition of securities references section 2(1) of the SFA.
    • SECTION 13: Amending the Definitions of Securities and Futures Contract in the SFA and the FAA MAS had proposed amending the definition of securities to enable MAS to prescribe new products as securities in the SFA and the FAA, and to also 5 -------- exclude products as securities
    • excluded as securities.
    • PDPC
    • Help & Resources

    Last revised date:

    • Secure portable computing devices and removable storage media used to store personal data when not in use (e.g. under lock and key or attaching them to a fixture with a security cable).
    • Keep the encryption keys secure and separate from where the encrypted data are.
    • WAFs can act as another layer of security in addition to the application code level. 8 Refer to OWASPs website. -------- GUIDE TO DATA PROTECTION PRACTICES FOR ICT SYSTEMS 21 ICT security and testing Organisations should always ensure that the protection of the personal data and the security
    • MAS
    • Forms and Templates

    Last revised date:

    • Securities A/c No. - - Securities A/c No.
    • SUB-ACCOUNT(S) MAINTAINED WITH THE SAME DEPOSITORY AGENT; OR (B) SUCCESSORS / NOMINEES WISH TO TRANSFER SECURITIES TO OTHER SECURITIES ACCOUNT(S) / SUB-ACCOUNTS MAINTAINED WITH OTHER DEPOSITORY AGENTS.