Showing 3434 Documents for "securities"
Filter by
Sort by
- MAS
- Media Releases
Last revised date:
- (i) Has equity securities listed on SGX or a recognised securities exchange (ii) Has listed, or guaranteed the issuance of, bonds listed on SGX for at for at least 5 years; or least 5 years.
- Such offers are exempted from prospectus requirements under sections 274 and 275 of the Securities and Futures Act (Cap 289). 2 Please refer to http://www.sgx.com/wps/portal/sgxweb/home/regulation/consult_pub/consult_papers and http://rulebook.sgx.com/ . 3 For example, an issuer under the Bond Seasoning
- MAS
- Speeches
Last revised date:
- Covid-19 has shown that the ability to leverage the cloud to store and access data is critical for business continuity and cyber security, amid travel restrictions and office closures.
- Harmonising and digitising trade documents and putting them through a seamless digital platform will help to make trade more efficient and secure. Food safety will be an area of high priority as we emerge from the Covid-19 pandemic.
- We need to put in place agreements to enable cross-border data flows in a secure and seamless manner, so that digital transactions can be consummated efficiently. Digital connectivity and trusted data corridors are to the digital economy what free trade agreements were to the traditional economy.
- PDPC
- Help & Resources
Last revised date:
- Sensitive payment card data such as card security code (CVV/CVC/CAV/CVN) are encoded on the magnetic stripes of payment cards. Retail merchants should not store such data.
- Merchants must protect any personal data collected by making reasonable security arrangements to prevent unauthorised access, collection, use, disclosure, copying, modification, disposal, or similar risks.
- The card security code goes by different names under the various Card Schemes as follows: Card Identification Number (CID) American Express; -------- Card Authentication Value (CAV) JCB; Card Verification Code (CVC) MasterCard; Card Verification Number (CVN) UnionPay; Card Verification Value
- MAS
- Speeches
Last revised date:
- I am delighted to be here, to deliver the opening address at this FOW's Asia-Pacific Derivatives & Securities World Conference. 2 Let me begin by saying some things about the exponential growth in derivatives markets over the last few years. 3 To cite a couple of statistics.
- Currently, financial derivatives fall under the purview of the Securities and Futures Act administered by MAS, while most commodity derivatives are regulated under the Commodities Trading Act administered by the International Enterprise Singapore, or IE Singapore.
- In recognition of the rigidity of this all-or-nothing model, we have introduced the Recognised Trading Systems (or ReTS) provider regime in the Securities and Futures Act, to give us the flexibility to apply regulatory requirements consistent with the risk profile of an individual Recognised Trading
- MAS
- Speeches
Last revised date:
- Companies are increasingly focusing on cyber security issues. 63% of boards today actively address computer and information security, up from 33% in 2012. The sharp increase is likely driven by the recent high-profile and well-publicized cyber incidents.
- The MAS will pursue this with the industry on two complementary fronts – a calibrated regulatory approach conducive to innovation while fostering security, twinned with development initiatives to augment the Fintech ecosystem here.
- New or alternative capital continues to increase its share in the global reinsurance industry, as alternative risk transfer solutions in the form of insurance-linked securities (ILS) such as catastrophe bonds, collateralised reinsurance and sidecars, among others, gain acceptance.
- PDPC
- Commission's Decisions
Last revised date:
- The Commission therefore considered whether Xirlynx had made reasonable security arrangements to prevent the data breach from taking place.
- A warning was issued to Challenger Technologies and its data intermediary, Xirlynx Innovations, for failing to make reasonable security arrangements to prevent unauthorised disclosure of Challenger members’ personal data while sending out emails to some 165,000 members.
- Sample proof-reading was a reasonable security arrangement that could have been conducted by Xirlynx given the nature of the services it provided, and which would likely have either averted the data leak or greatly reduced the number of individuals affected.
- MAS
- Speeches
Last revised date:
- For example if a bank takes a stake in an insurance company or securities firm, then the insurance company or securities firm would not be allowed to hold a stake in the bank. The Companies Act already prohibits subsidiaries of banks from owning shares in the bank.
- Furthermore, each equity portfolio investment will be subject to a single security limit of 2% of the bank's capital funds. We will amend Section 31 of the Banking Act to remove the existing aggregate limit on portfolio investments, and replace it with this new single security limit.
- company belonging to its shareholders, and the insurance funds managed by the company but belonging to the policyholders, for example the life fund of life insurance companies. 49 Portfolio investments made using the shareholders' funds of the insurance companies will be subject to the same single security
- MAS
- Speeches
Last revised date:
- Despite some strategic and security risks in the region, the political situation is generally stable and positive.
- RIDING ON ASIA'S GROWTH 29 This backdrop gives hope that the strategic and security environment in Asia will remain stable.
- The region initially struggled as political and security concerns deterred foreign investments and distracted governments from tackling serious economic problems. But Southeast Asia has stabilised considerably in recent years.
- MAS
- Speeches
Last revised date:
- Growing adoption of ICT and automated customer platforms by corporates are expected to boost demand for various ICT and business services, including cloud storage, data security, and IT consultancy.
- The annual report summarises our many regulatory and supervisory initiatives – to make derivatives markets safer, to enhance cyber security, to promote a good risk culture in our financial institutions.
- And we are making a push into alternative risk solutions such as risk pools and insurance-linked securities or ILS. Foreign exchange trading declined last year although we remain the third largest FX centre globally.
- PDPC
- Public Consultations
Last revised date:
- rst name and last name in combination with social security number, drivers licence number, account number, medical information, health insurance information, etc.17 3.39.
- Singtel notes that organisations are, by default, in favour of providing their customers the security of knowing whether their personal data is safe and therefore, will adopt a framework of voluntarily informing them where there are possible breaches.
- For example, it is proposed that under the Cyber Security Bill, the Commissioner of Cybersecurity may designate computers or computer systems designated as critical information infrastructure (CII) during times of national emergency. Designation as C11 is an of?cial secret under the Of?