Showing 3434 Documents for "securities"
Filter by
Sort by
- MAS
- Monographs/Information Papers
Last revised date:
- Secure requirements consist of the following key points: Ensure patching updates are applied to address system security flaws in a timely manner; Deployment of security devices to restrict unauthorised network traffic; Implementation of measures that mitigate the risk of malware infections; Secure
- #3 Digital Tools and Connectivity Equipped with necessary connectivity tools and data security which allowed for a seamless move to WFH.
- STAFF INTEGRATION Challenges Faced A breakdown of social cohesion and workplace culture, as well as ensuring data and information security.
- MAS
- Enforcement Actions
Last revised date:
- 1 NBI hf. had contravened section 137 of the SFA, in force at the material time, which required substantial shareholders of listed companies to notify the securities exchange of changes in their shareholdings.
- On 9 June 2014, NBI hf. paid a composition amount of $4,250 in respect of the breach. 2 NBI hf. failed to notify the Singapore Exchange Securities Trading Limited of the change in its deemed shareholdings in Asia Environment Holdings Ltd which took place on 15 September 2010.
- MAS
- Annual Reports
Last revised date:
- these securities as appropriate.
- to Security and Fire Safety MAS received the National Safety & Security Watch Group Award from the Singapore Police Force and the Singapore Civil Defence Force for good security, safety, emergency preparedness and for sharing best practices and enhancing security
- Framework for issuing MAS book-entry securities and regulating primary dealers The framework for the issuance of book-entry securities by MAS and the appointment of primary dealers enables MAS to issue securities in its name, and to purchase, repurchase, sell and redeem
- MAS
- Media Releases
Last revised date:
- The Monetary Authority of Singapore ('MAS'), on the advice of the Securities Industry Council ('SIC'), today issued a revised Singapore Code on Take-overs and Mergers ('Take-over Code') pursuant to section 321 of the Securities and Futures Act.
- IMPLEMENTATION DATE AND TRANSITIONAL PROVISIONS 11 The revised Take-over Code will take effect on 1 Jan 2002, when Part VIII of the Securities and Futures Act on the Securities Industry Council and Take-over Offers is due to come into operation.
- MAS
- Speeches
Last revised date:
- Major initiatives on the regulatory front last year were the passage by Parliament of the Securities and Futures Act (SFA) and the Financial Advisors Act (FAA). The SFA and FAA will fully come into force by the third quarter of 2002.
- Larger holdings of Singapore Government Securities and currency notes were offset by a decrease in foreign assets.
- MAS
- Media Releases
Last revised date:
- Using Secretariums Secure-enclave Distributed Ledger Technology (SDLT) leveraging Intel SGX Chip for the secure enclaves, the solution aims to provide a high-performance DLT that is suited for highly secretive financial transactions, ultra large scale CBDCs.
- The Atomic CBDC solution is a digital currency platform that is safeguarded by hardware-based security. It supports anonymity and privacy for small transactions and offers traceability for large transactions for anti-money laundering and countering the financing of terrorism purposes.
- ConsenSys and Visa CBDCgo - digital currency, seamless acceptance Criteo Criteo SA, Secretarium Ltd. and Intel® Corporation The Atomic CBDC Solution Giesecke+Devrient advance52 GmbH Giesecke+Devrient advance52 GmbH G+D Filia 3 CBDCgo provides integration and coexistence with existing systems, along with security
- PDPC
- Commission's Decisions
Last revised date:
- similar risks. 8 In this regard, while the Organisation had instructed the Vendor to prevent the Documents from being ‘leaked’ online, it did not check with the Vendor what security arrangements had been put in place to ensure this.
- . -------- 7 Section 24 of the PDPA requires an organisation to protect personal data in its possession or under its control by taking reasonable security steps or arrangements to prevent unauthorised access, collection, use, disclosure, copying, modification, disposal or
- Since this was not done, it therefore follows that the Organisation did not conduct any tests, or verify whether the Vendor had conducted any tests, to ensure that the security arrangements were effective in protecting the Documents from unauthorised disclosure. 9 As observed in
- MAS
- Media Releases
Last revised date:
- Using Secretariums Secure-enclave Distributed Ledger Technology (SDLT) leveraging Intel SGX Chip for the secure enclaves, the solution aims to provide a high-performance DLT that is suited for highly secretive financial transactions, ultra large scale CBDCs.
- The Atomic CBDC solution is a digital currency platform that is safeguarded by hardware-based security. It supports anonymity and privacy for small transactions and offers traceability for large transactions for anti-money laundering and countering the financing of terrorism purposes.
- ConsenSys and Visa CBDCgo - digital currency, seamless acceptance Criteo Criteo SA, Secretarium Ltd. and Intel® Corporation The Atomic CBDC Solution Giesecke+Devrient advance52 GmbH Giesecke+Devrient advance52 GmbH G+D Filia 3 CBDCgo provides integration and coexistence with existing systems, along with security
- MAS
- Media Releases
Last revised date:
- Banks should also consider adopting additional security enhancements such as transaction alerts for any movement of funds from a customer’s account.
- MAS holds banks directly responsible for the safety and soundness of the services and systems they provide to their customers and will continue to work with the industry to enhance the security of payment systems." ***
- Singapore, 20 January 2012… MAS welcomes ABS' announcement of the new measures that banks will be implementing to enhance the security of the retail payment infrastructure. 2 Mr Wan Aik Chye, Director, Specialist Risk Department, MAS, said, ”Banks should implement the new measures as soon as
- PDPC
Last revised date:
- Generally, the security guard should inform visitors of the purposes for the collection, use and disclosure of their personal data and obtain their consent.
- Even if the visitor does not expressly consent, if the visitor has been informed that his personal data is required for a particular purpose (for example, security purposes for entry into the premises), and he voluntarily provides the data, the visitor may be deemed to have given his consent to the collection
The PDPA requires (amongst other things) that an organisation only collects, uses or discloses personal data for purposes that a reasonable person would consider appropriate in the circumstances and also make reasonable security arrangements to protect personal data collected in order to prevent