Showing 3434 Documents for "securities"

Filter by
Sort by

    • PDPC
    • Commission's Decisions

    Last revised date:

    • administrative security, which encompass policies and training regarding privacy is another important component of the obligation to make reasonable security arrangements.6 the Privacy Commissioner of Canada (OPC) explained that whilst security policies and procedures are essential
    • [i]t is vital that your staff understand the importance of protecting personal data; that they are familiar with your organisations security policy; and that they put its security procedures into practice.
    • The Organisations security arrangements at the material time 14. Security arrangements to protect personal data may take various forms, including administrative, physical, technical measures or a combination of these.
    • PDPC
    • Commission's Decisions

    Last revised date:

    • The Organisation encountered a similar incident due to the lack of security arrangements surrounding its enveloping process but failed to take any heed from the prior incident 18 The Organisations failure to implement any reasonable security arrangements in respect of the enveloping process
    • is specific to the administrative staffs role in handling personal data may in certain circumstances be a security measure, it does not detract from the necessity and relevance for operational safeguards in the form of the security measures introduced following the Prior Incident.
    • The Department made an assessment of the risks and decided not to implement the security measures introduced following the Prior Incident.
    • MAS
    • Consultations

    Last revised date:

    • MAS is now consulting on draft Regulations in support of amendments contained in the SF(A) Act 2012 relating to the new Part IIA and Part III of the Securities and Futures Act (Cap. 289) (SFA).
    • AND FUTURES ACT FOR TRADE REPOSITORIES AND CLEARING FACILITIES 1 Introduction 1.1 On 10 January 2013, MAS issued a consultation paper inviting comments on the proposed Securities and Futures (Trade Repositories) Regulations 2013 [SF(TR)R] and Securities and Futures
    • and Futures (Markets) Regulations 2005 and Securities and Futures (Clearing Facilities) Regulations 2005.
    • PDPC
    • Commission's Decisions

    Last revised date:

    • However, by Finantech’s own admission, Finantech did not do any system monitoring in terms of IT security, security testing or regular IT security audits at the time of the breach and prior to 17 September 2014. 11.
    • As noted at paragraph 10 above, Finantech admitted that it did not carry out any system monitoring in terms of IT security, security testing or regular IT security audits at the time of the breach and prior to 17 September 2014. 27.
    • its possession or under its control by making reasonable security arrangements to prevent unauthorised access, collection, use, disclosure, copying, modification, disposal or similar risks.” in to make reasonable security arrangements 25.
    • MAS
    • Media Releases

    Last revised date:

    • the active trading, market or price of securities is prohibited under the SFA.
    • and Futures Act (SFA): i.
    • These perpetrators may do so by setting up positions in certain securities. They then use social media chat groups to incite investors to buy these securities in a manner similar to how individual investors collectively pushed up certain share prices in the US. ii.
    • MAS
    • Media Releases

    Last revised date:

    • Mr Rohan Amin Managing Director, Global Chief Information Security Officer, JPMorgan Chase & Co 4. Mr Adrian Asher Group Chief Information Security Officer, London Stock Exchange Group 5. Mr Mikko Hypponen Chief Research Officer, F-Secure 6. 
    • Ms Valerie Abend Managing Director, Financial Services North America Security & Global Cyber Regulatory Lead, Accenture Security 2. Mr Keith Alexander Founder and Chief Executive Officer, IronNet Cybersecurity Inc. 3. 
    • We look forward to tapping on the CSAP’s expertise to help ensure that Singapore’s financial sector remains dynamic and secure in an increasingly digital world.” *** Annex A - Composition of Cyber Security Advisory Panel 1. 
    • MAS
    • Media Releases

    Last revised date:

    • the active trading, market or price of securities is prohibited under the SFA.
    • and Futures Act (SFA): i.
    • These perpetrators may do so by setting up positions in certain securities. They then use social media chat groups to incite investors to buy these securities in a manner similar to how individual investors collectively pushed up certain share prices in the US. ii.
    • MAS
    • Consultations

    Last revised date:

    • c) exclude securities it has received through collateral swaps if those securities do 26 Where a bank has encumbered securities in repos or other securities financing transactions, but has retained beneficial ownership, and those assets remain on the banks balance sheet, the bank shall
    • Performing loans and securities are the sum of rows 18, 19, 20, 22 and 24.
    • efficiency given the central role of secured lending in the financial system.
    • MAS
    • FAQs

    Last revised date:

    • Does the minimum academic entry requirement under the FAA apply to representatives conducting regulated activities under the Securities and Futures Act (SFA)?
    • However, where the FA representative is also an appointed representative under the SFA, the higher of the requirements under the FAA and SFA will apply.
    • The Capital Markets and Financial Advisory Services Examination (CMFAS Exam) requirements are introduced to accommodate the new modular licensing framework under the Securities and Futures Act (SFA) and the Financial Advisers Act (FAA).
    • PDPC
    • Commission's Decisions

    Last revised date:

    • Data with higher security implications (such as the Chef Key) ought to be secured to a higher degree than other types of data. It is, of course, open to the Organisation to secure all data in its GitHub Repositories at the higher level.
    • (t) Implemented security monitoring to detect creation of any new cloud instance (u) Enabled Virtual Private Cloud (VPC) logs for security monitoring.
    • This principle was also espoused in GitHubs own Secure Design Principles7.