JSE NETWORK SERVICE PROVIDER (NSP) POLICY DOCUMENT
|
|
|
- Garey Short
- 10 years ago
- Views:
Transcription
1 JSE NETWORK SERVICE PROVIDER (NSP) POLICY DOCUMENT September 2014 JSE Limited Reg No: 2005/022939/06 Member of the World Federation of Exchanges JSE Limited I 2014 Page 1 of 8 JSE Network Service Provider (NSP) Policy V2.0
2 Table of Contents 1. Introduction Document Purpose Applicability Services Documentation And Agreements NSP Review And Approval Process NSP Renewal NSP Change Notification JSE NSP Committee NSP obligations NSP Policy Principles Security (Confidentiality / Integrity / Availability) Capacity Management Monitoring and support Change Management Business Continuity / Resilience / Redundancy Agreements / Legal (Obligations And Service Levels) Contact Information... 8 Page 2 of 8 JSE Network Service Provider (NSP) Policy V2.0
3 1. INTRODUCTION The Johannesburg Stock Exchange (JSE) is a licensed exchange in terms of the Financial Markets Act (FMA) and must maintain fair and orderly markets in order to ensure market integrity. The JSE recognizes that telecommunications providers are a key player in the provisioning of network connectivity to, and on behalf of, JSE clients to the JSE to enable JSE clients to subscribe to the various JSE Systems or JSE services. In order to facilitate such external connectivity to the JSE Primary Data Centre, the JSE established a Meet-Me-Room (MMR) environment on the JSE Premises. For the sake of clarity, including without limitation: NSPs who will provide only network connectivity for external JSE clients wishing to connect to the JSE, must host their networking equipment in the JSE MMR. Network monitoring and network management equipment can be hosted in the JSE MMR for management of the NSP s infrastructure or network monitoring and management on behalf of their clients. Order, Trade and any other related trading and business applications or platforms (including but not limited to Smart Order Routing, Execution Management Systems, Order Management Systems, Algorithmic applications) may not be hosted in the JSE MMR. The JSE MMR is not a Point of Presence (PoP) for providing connectivity for any other purpose than that of connectivity to JSE services or JSE Systems access. NSP s who wish to provide Time Sync Services from the Meet me Room will be allowed to install their own GPS Antenna and equipment at their own cost for an initial period of 12 month from 1 March 2015 until 29 February 2016 after which the GPS Antenna must be removed and all NSP s providing Time Sync Services will be required to make use of the JSE s GPS Antennas. Page 3 of 8 JSE Network Service Provider (NSP) Policy V2.0
4 2. DOCUMENT PURPOSE This policy which forms part of the Services Documentation (as defined in the JSE Network Services Provider Agreement entered into by Network Service Providers (NSPs) and the JSE Limited (NSP Agreement)), sets out the principles that NSPs need to adhere to in order to be accredited by the JSE, PRIOR to providing network services to JSE clients (Policy). A NSP is defined as a legal entity that is (i) a licensed telecommunications provider recognised by the Independent Communications Authority of South Africa (ICASA) or any international equivalent thereof, and (ii) whose core business function relates to the telecommunications industry, such as the provisioning of bandwidth and/or network connectivity services to, or on behalf of, JSE clients to enable JSE clients to subscribe to the various JSE services or JSE Systems as set out in the JSE Services Agreement (JSA), such as Client Access Network (CAN), Colocation Network (CN) and the Remote Disaster Recovery site (RDR) in Bryanston. This Policy is not intended to define a complete set of governance principles or controls but only addresses the aspects related to JSE market integrity. Good governance and control must be applied by the NSPs as well as JSE clients. There is specific guidance on effective IT Governance contained in King III, guidance from IOSCO contained in Principles on Outsourcing of Financial Services for Market Intermediaries, as well as guidance in the Electronic Communications Facilities Leasing Regulations from ICASA. Page 4 of 8 JSE Network Service Provider (NSP) Policy V2.0
5 3. APPLICABILITY Any NSP that intends providing network services to, and on behalf of, JSE clients must be accredited by the JSE in terms of this Policy. Application for accreditation must be done annually or as and when changes are made to the NSP solution or service. From 1 March 2015, JSE clients may only use JSE accredited NSP for the provision of network services to enable JSE clients to subscribe to the various JSE services and JSE Systems. 4. SERVICES DOCUMENTATION AND AGREEMENTS An accredited NSP will be required to sign the NSP Agreement (prior to offering any network services to, or on behalf of, any JSE clients) and meet such requirements as set out in the Services Documentation. 5. NSP REVIEW AND APPROVAL PROCESS The NSP requiring initial JSE accreditation must formally apply to the JSE by submitting an application to [email protected]. The application must indicate with sufficient detail how the NSP will comply with the principles as set out in this Policy. Initial accreditation is valid for one year from the date of JSE accreditation. The NSP Agreement must be signed by the NSP prior to the NSP offering any network services to, or on behalf of, any JSE clients. NSP fees will be applicable for the initial JSE accreditation request as well as annually thereafter for each renewal. These fees are set out in the JSE Equity Market Price list available at this link: JSE Price List 6. NSP RENEWAL NSPs are required to renew their accreditation annually in July to ensure that the NSP is still complying with the principles as set out in this Policy as updated by the JSE from time to time. The JSE may need to adjust this Policy in line with requirements that are seen to be in the best interests of maintaining market integrity. Renewals must be submitted to [email protected] at least one month prior to the accreditation expiry. 7. NSP CHANGE NOTIFICATION A NSP must immediately notify the JSE in writing of any changes: 7.1. made by the NSP that reduces compliance with any of the principles as set out in this Policy; and 7.2. to the list of JSE clients that the NSP is providing network services to. Changes must be submitted to [email protected]. Page 5 of 8 JSE Network Service Provider (NSP) Policy V2.0
6 8. JSE NSP COMMITTEE A JSE NSP Committee exists consisting of JSE employees with business and technical expertise across the JSE markets and services and is responsible for, inter alia: 8.1. Review and approval of new applications; 8.2. Approval of annual renewal applications; 8.3. Review of notification of changes; 8.4. Consideration of any non-compliance to this Policy; and 8.5. Ongoing review of this Policy in accordance with changing requirements to ensure ongoing market integrity. 9. NSP OBLIGATIONS 9.1. NSP Meet-Me-Room (MMR) rental will include 2kW of power usage per rack which equates to a maximum power usage of 1488kWh for any given month Power will only be measured on an ad-hoc basis when required by the JSE and any additional power usage fees will be passed through to the NSP as per the JSE Price List Power usage fees shall be subject to any revised charges or rates as notified by the Municipality of the City of Johannesburg or the National Energy Regulator of South Africa or any other authorised body from time to time as applicable to the JSE Premises A NSP must provide their own rack with the following dimensions: 800 x 600 x 43U or 1000 x 600 x 43U A NSP is responsible for power distribution inside the rack and must connect to a 32Amp single phase caravan plug supplied under floor A NSP must ensure dual power distribution inside their rack for A and B power for all devices. Where a device is installed with only 1 power supply the NSP must install a static switch to ensure redundancy on the single power supply device 9.7. A NSP should ensure that they have the necessary skills to manage connectivity to the JSE s Systems and services e.g. management of multicast data A NSP should ensure that JSE Clients are treated fairly in relation to one another for the same service. Page 6 of 8 JSE Network Service Provider (NSP) Policy V2.0
7 10. NSP POLICY PRINCIPLES SECURITY (CONFIDENTIALITY / INTEGRITY / AVAILABILITY) A NSP must ensure that it protects confidential, proprietary, client and other information of the entities they provide services to, from any unauthorized disclosure to person or entities A NSP must ensure it has adequate policies and procedures in place to manage authorized staff or agents who have access to the platform infrastructure that they use to provide services to, or on behalf of, the JSE clients A NSP must ensure adequate controls are in place to preserve the integrity and availability for the services to their clients (e.g. policies and capabilities to protect against logical threats such as wire sniffing, Denial of Service attacks and hacking of the network infrastructure) A NSP should clarify any network peering included within their services to, or on behalf of, JSE clients CAPACITY MANAGEMENT A NSP must have adequate capacity to accommodate the aggregated peak bandwidth requirements of, or on behalf of, the JSE clients they provide services to MONITORING AND SUPPORT A NSP must implement proactive monitoring capabilities with support policies and procedures that mitigate disruption to the JSE clients they provide services to A NSP must ensure that the appropriate escalation, business and technical support services are in place in order to assist JSE clients they provide services to and or the JSE with efficient problem resolution CHANGE MANAGEMENT A formal change management process must be practiced by the NSP to ensure minimal disruption and / or no negative impact or risk to the operations of the entities that they provide services to and JSE services and JSE Systems BUSINESS CONTINUITY / RESILIENCE / REDUNDANCY A NSP must have appropriate contingency (reduces impact in the event of a failure), and resilience (prevents failures) arrangements to ensure minimal disruption and / or negative impact to the operations of the entities they provide services to and JSE services and JSE Systems AGREEMENTS / LEGAL (OBLIGATIONS AND SERVICE LEVELS) A NSP must provide JSE clients they provide services to with a legally binding written contract, which is appropriate to the materiality of the services provided. Page 7 of 8 JSE Network Service Provider (NSP) Policy V2.0
8 11. CONTACT INFORMATION JSE Limited One Exchange Square Gwen Lane, Sandown South Africa Tel: JSE Data Centre Manager Tel: Enquiries: Nic Cronje JSE Data Centre Manager Tel: Page 8 of 8 JSE Network Service Provider (NSP) Policy V2.0
JSE CLIENT CONNECTIVITY STANDARDS AND REQUIREMENTS DOCUMENT
JSE CLIENT CONNECTIVITY STANDARDS AND REQUIREMENTS DOCUMENT December 2014 Version 2.3 JSE Limited Reg No: 2005/022939/06 Member of the World Federation of Exchanges JSE Limited I 2014 Page 1 of 23 Disclaimer:
JSE EQUITY MARKET. Price List
JSE EQUITY MARKET Price List 2015 JSE Limited Reg No: 2005/022939/06 Member of the World Federation of Exchanges JSE Limited I 2015 Page 1 of 14 Equity Market Price List 2015 v1 4 1. Membership Fees...
COLOCATION. The Lowest Latency Connectivity. www.jse.co.za www.jse.co.za
COLOCATION The Lowest Latency Connectivity Copyright JSE Limited 2009 1 Agenda Agenda Agenda Progress to-date Colocation ecosystem Colocation concept Colocation principles Benefits Latency Measurement
ASX CLEAR (FUTURES) OPERATING RULES Guidance Note 10
BUSINESS CONTINUITY AND DISASTER RECOVERY The purpose of this Guidance Note The main points it covers To assist participants to understand the disaster recovery and business continuity arrangements they
ASX SETTLEMENT OPERATING RULES Guidance Note 10
BUSINESS CONTINUITY AND DISASTER RECOVERY The purpose of this Guidance Note The main points it covers To assist participants to understand the disaster recovery and business continuity arrangements they
SCHEDULE 1 SERVICE DESCRIPTION
SCHEDULE 1 SERVICE DESCRIPTION . Introduction Service Description a) Accreditation Process The Service Provider ( SP ) wishing to be approved by Borsa Italiana as an accredited Service Provider who can
AUSTRACLEAR REGULATIONS Guidance Note 10
BUSINESS CONTINUITY AND DISASTER RECOVERY The purpose of this Guidance Note The main points it covers To assist participants to understand the disaster recovery and business continuity arrangements they
GUIDANCE NOTE OUTSOURCING OF FUNCTIONS BY ENTITIES LICENSED UNDER THE PROTECTION OF INVESTORS (BAILIWICK OF GUERNSEY) LAW, 1987
GUIDANCE NOTE OUTSOURCING OF FUNCTIONS BY ENTITIES LICENSED UNDER THE PROTECTION OF INVESTORS (BAILIWICK OF GUERNSEY) LAW, 1987 CONTENTS Page 1. Introduction 3-4 2. The Commission s Policy 5 3. Outsourcing
Technical Standards for Information Security Measures for the Central Government Computer Systems
Technical Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 2.1 General...
Electronic Payment Schemes Guidelines
BANK OF TANZANIA Electronic Payment Schemes Guidelines Bank of Tanzania May 2007 Bank of Tanzania- Electronic Payment Schemes and Products Guidleness page 1 Bank of Tanzania, 10 Mirambo Street, Dar es
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
ZAR Including VAT. API Service Fee R 9 131.15 R 10 409.51 $ 1 160. Additional per Slot R 19 198.39 R 21 886.17 $ 2 439
Equity Market Price List v1.0 2014 Membership Fees Category A R 41 278.64 R 47 057.65 Category B R 24 732.70 R 28 195.28 Category C R 19 787.58 R 22 557.84 Category D R 16 544.76 R 18 861.02 Category E
KEY INFORMATION DOCUMENT
KEY INFORMATION DOCUMENT PSG WEALTH OFFSHORE SHARE TRADING ACCOUNT PAGE 0 This document is a summary of key information about the PSG Wealth offshore share trading account. It will help you understand
Technology Risk Management
1 Monetary Authority of Singapore Technology Risk Guidelines & Notices New Requirements for Financial Services Industry Mark Ames Director, Seminar Program ISACA Singapore 2 MAS Supervisory Framework Impact
PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES
PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS FEBRUARY 2005 Preamble The IOSCO Technical Committee
Statement of Guidance: Outsourcing All Regulated Entities
Statement of Guidance: Outsourcing All Regulated Entities 1. STATEMENT OF OBJECTIVES 1.1. 1.2. 1.3. 1.4. This Statement of Guidance ( Guidance ) is intended to provide guidance to regulated entities on
MTN MPLS-VPN Service. Description of Service
MTN MPLS-VPN Service Description of Service 1. Description of Service a. MTN MPLS-VPN Service ("Service") is a wide area data networking service providing any to any connectivity to transport Customer
7QUESTIONSYOUNEEDTOASKBEFORE CHOOSINGACOLOCATIONFACILITY FORYOURBUSINESS
7QUESTIONSYOUNEEDTOASKBEFORE CHOOSINGACOLOCATIONFACILITY FORYOURBUSINESS ExecutiveBrief P a g e 1 Executive Brief 7 Questions You Need to Ask Before Choosing a Colocation Facility for Your Business Choosing
ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES
ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES THIS POLICY SETS OUT THE REQUIREMENTS FOR SAFEGUARDING COMPANY ASSETS AND RESOURCES TO PROTECT PATIENTS, STAFF, PRODUCTS, PROPERTY AND
Regulations on Information Systems Security. I. General Provisions
Riga, 7 July 2015 Regulations No 112 (Meeting of the Board of the Financial and Capital Market Commission Min. No 25; paragraph 2) Regulations on Information Systems Security Issued in accordance with
ICT SUPPORT SERVICES
ICT SUPPORT SERVICES SERVICE LEVEL AGREEMENT 2008 2009 Period of agreement: This document will run from 1st April 2008 to 31 st March 2009 and remains valid until superseded by a revised document. The
Does it state the management commitment and set out the organizational approach to managing information security?
Risk Assessment Check List Information Security Policy 1. Information security policy document Does an Information security policy exist, which is approved by the management, published and communicated
Security in Space: Intelsat Information Assurance
Security in Space: Intelsat Information Assurance 14/03/6997 Intelsat Information Assurance Intelsat maintains the highest standards of Information Assurance by assessing and building the Intelsat infrastructure,
IT Department. Circular No.: MCX-SX/IT/2845/2015 March 30, 2015. Market datafeed provided by the Exchange to the members
IT Department Circular No.: MCX-SX/IT/2845/2015 March 30, 2015 Market datafeed provided by the Exchange to the members In terms of the provisions of Rules, Bye-Laws and Regulations of the Exchange, Members
-17 2015 OUTSOURCING POLICY
Outsourcing Policy TABLE OF CONTENTS EXECUTIVE SUMMARY... 3 Aim & Introduction... 3 POLICY PARAMETERS... 4 Key Terms... 4 Outsourcing Agreement Requirements... 5 MATERIAL OUTSOURCING AGREEMENTS... 6 Board
Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)
Organizational risks 1 Lock-in Risk of not being able to migrate easily from one provider to another 2 Loss of Governance Control and influence on the cloud providers, and conflicts between customer hardening
Colocation. Scalable Solutions for a Shared IT Infrastructure. Enterprise. Colocation
Scalable Solutions for a Shared IT Infrastructure Global and domestic competition, rising real estate and power costs, and shrinking IT budgets are causing today s businesses to seek alternatives to building
Cloud Computing and Records Management
GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 [email protected] www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version
Intel Enhanced Data Security Assessment Form
Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized
BERMUDA MONETARY AUTHORITY
BERMUDA MONETARY AUTHORITY INSURANCE DEPARTMENT GUIDANCE NOTE # 17 COMMERCIAL INSURER RISK ASSESSMENT Commercial Insurer Risk Assessment Page 1 of 17 Introduction 1. The ( the Authority ) is introducing
PROPERTY OF THE SECURITIES COMMISSION OF THE BAHAMAS
SUPERVISORY AND REGULATORY GUIDE: APPLICABLE LEGISLATION: OUTSOURCING OF MATERIAL FUNCTIONS SIA, 2011; IFA, 2003; FCSPA, 2000. ISSUED: 15 MAY 2012 LAST AMENDED: REFERENCE NUMBER: 31 DECEMBER SPG1-0512
ICT SERVICE LEVEL AGREEMENT MANAGEMENT POLICY (EXTERNAL SERVICE PROVIDERS/VENDORS)
ICT SERVICE LEVEL AGREEMENT MANAGEMENT POLICY (EXTERNAL SERVICE PROVIDERS/VENDORS) TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIMS OF THE POLICY...
AMENDED GUIDELINE ON CALL CENTER LICENSING
BANGLADESH TELECOMMUNICATION REGULATORY COMMISSION IEB Bhaban, Ramna, Dhaka-1000 No. BTRC/LL/Call Center/Licensing Procedure(268)/2008-491 Date:06-07-2009 AMENDED GUIDELINE ON CALL CENTER LICENSING BANGLADESH
3 rd Party Vendor Risk Management
3 rd Party Vendor Risk Management Session 402 Tuesday, June 9, 2015 (11 to 12pm) Session Objectives The need for enhanced reporting on vendor risk management Current outsourcing environment Key risks faced
CAVAN AND MONAGHAN EDUCATION AND TRAINING BOARD. Data Breach Management Policy. Adopted by Cavan and Monaghan Education Training Board
CAVAN AND MONAGHAN EDUCATION AND TRAINING BOARD Data Breach Management Policy Adopted by Cavan and Monaghan Education Training Board on 11 September 2013 Policy Safeguarding personally identifiable information
GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012
GUIDANCE NOTE FOR DEPOSIT-TAKERS Operational Risk Management March 2012 Version 1.0 Contents Page No 1 Introduction 2 2 Overview 3 Operational risk - fundamental principles and governance 3 Fundamental
HIGH-LEVEL EQUITY MEMBERSHIP REQUIREMENTS
HIGH-LEVEL EQUITY MEMBERSHIP REQUIREMENTS Membership Type An applicant for Equities Membership must apply for authorisation to perform the following regulated services with conditions as follows: Trading
Cloud Software Services for Schools
Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Please insert supplier details below Supplier name Address Isuz Ltd. trading as Schoolcomms
schedule 2f additional terms for internet services
1. SERVICE DESCRIPTION Interoute Internet Services comprises of the provision and supply of connectivity to the Internet via the Interoute IP Network. 2. DEFINITIONS ADSL refers to Asymmetric Digital Subscriber
Coláiste Pobail Bheanntraí
Coláiste Pobail Bheanntraí Seskin Bantry, Co. Cork. Principal: Dr. Kevin Healy B.A, H.D.E, M.Ed, Ed.D Deputy Principal: Mr. Denis O Sullivan, BSc. (Ed.), H.D.E Phone: 027 56434 Fax: 027 56439 E-mail: [email protected]
security in the cloud White Paper Series
security in the cloud White Paper Series 2 THE MOVE TO THE CLOUD Cloud computing is being rapidly embraced across all industries. Terms like software as a service (SaaS), infrastructure as a service (IaaS),
White Paper on Financial Institution Vendor Management
White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
BUSINESS BROADBAND SERVICE
BUSINESS BROADBAND SERVICE 1 DEFINITIONS AND INTERPRETATION 1.1 The following additional terms and conditions apply to the provision of the Business Broadband Service. TERM / EXPRESSION ADSL Annex A Annex
CoreSite A Carlyle Company. 70 Innerbelt Colocation Services
CoreSite A Carlyle Company 70 Innerbelt Colocation Services Independent Service Auditor s Report on s Placed in Operation and Tests of Operating Effectiveness For the Period of October 1, 2009, to March
Third-Party Access and Management Policy
Third-Party Access and Management Policy Version Date Change/s Author/s Approver/s Dean of Information Services 1.0 01/01/2013 Initial written policy. Kyle Johnson Executive Director for Compliance and
I S O I E C 2 7 0 0 2 2 0 1 3 I N F O R M A T I O N S E C U R I T Y A U D I T T O O L
15.1 ESTABLISH SECURITY AGREEMENTS WITH SUPPLIERS 15.1.1 EXPECT SUPPLIERS TO COMPLY WITH RISK MITIGATION AGREEMENTS Do you clarify the information security risks that exist whenever your suppliers have
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
Data Protection Breach Management Policy
Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
Market Data + Services. Advanced outsourcing solutions. IT Hosting and Managed Services
Market Data + Services Advanced outsourcing solutions IT Hosting and Managed Services Table of Contents 3 Table of Contents Introduction Market Data + Services powers the financial community with a range
APPENDIX 8 TO SCHEDULE 3.3
EHIBIT Q to Amendment No. 60 - APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT EHIBIT Q to Amendment No.
Official Journal of the European Communities DIRECTIVE 98/10/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL. of 26 February 1998
L 101/24 EN Official Journal of the European Communities 1.4.98 DIRECTIVE 98/10/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 26 February 1998 on the application of open network provision (ONP) to
FRCC NETWORK SERVICES REQUEST FOR PROPOSAL
FRCC NETWORK SERVICES REQUEST FOR PROPOSAL January 2013 TABLE OF CONTENTS A. INTRODUCTION AND INSTRUCTIONS TO VENDORS... 1 A.1 Introduction... 1 A.2 Background Information... 1 A.3 General Conditions...
Annex B. The Proposed Amendments AMENDMENTS TO NATIONAL INSTRUMENT 21-101 MARKETPLACE OPERATION
Annex B The Proposed Amendments AMENDMENTS TO NATIONAL INSTRUMENT 21-101 MARKETPLACE OPERATION 1. National Instrument 21-101 Marketplace Operation is amended by this Instrument. 2. National Instrument
SFC ELECTRONIC TRADING REGIME
SFC ELECTRONIC TRADING REGIME CompliancePlus 2013 Year End Training 18 December 2013 Limited 801, Two Exchange Square, 8 Connaught Place, Central, Hong Kong Tel: (852) 3487 6903 www.complianceplus.hk Disclaimer
Guidelines for Financial Institutions Outsourcing of Business Activities, Functions, and Processes Date: July 2004
Guidelines for Financial Institutions Outsourcing of Business Activities, Functions, and Processes Date: July 2004 1. INTRODUCTION Financial institutions outsource business activities, functions and processes
GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK
SUPERVISORY AND REGULATORY GUIDELINES: PU-0412 Operational Risk 25 th November, 2013 GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK 1. INTRODUCTION 1.1. The Central Bank of The Bahamas ( the Central
Session 2. The economics of Cloud Computing
Session 2. The economics of Cloud Computing Cloud computing is the next step in the on-going evolution of Information Technology. From a technical standpoint, very little that currently is done on cloud
Authorisation Requirements and Standards for Debt Management Firms
2013 Authorisation Requirements and Standards for Debt Management Firms 2 Contents Authorisation Requirements and Standards for Debt Management Firms Contents Chapter Part A: Authorisation Requirements
Cork ETB Data Breach Management Policy and Procedures
Cork ETB Data Breach Management Policy and Procedures POLICY ON THE MANAGEMENT OF DATA BREACHES IN SCHOOLS/COLLEGES AND OTHER EDUCATION AND ADMINISTRATIVE CENTRES UNDER THE REMIT OF CORK EDUCATION AND
Vehicle Leasing & Fleet Management
Vehicle Leasing & Fleet Management Choosing a vehicle leasing provider can be a challenge, though with the right partner, a specialist service to business fleets can result in significant cost savings
Internet Trading Regulations Of the Karachi Stock Exchange (Guarantee) Limited
Internet Trading Regulations Of the Karachi Stock Exchange (Guarantee) Limited [Sent for Gazette Notification on July 02, 2012] PREAMBLE: WHEREAS the Karachi Stock Exchange (Guarantee) Limited has decided
SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA
SITA Information Security SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA September, 2012 Contents 1. Introduction... 3 1.1 Overview...
Injazat s Managed Services Portfolio
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
Smart Meters Programme Schedule 2.5. (Security Management Plan) (CSP South version)
Smart Meters Programme Schedule 2.5 (Security Management Plan) (CSP South version) Schedule 2.5 (Security Management Plan) (CSP South version) Amendment History Version Date Author Status v.1 Signature
Evaluating Datacenter Colocation
1/14 Evaluating Datacenter Colocation Flexibility and Security for Business Growth 2/14 The Advantages of Colocation Colocation is a service that allows customers to install and operate computer server
Risk Management of Outsourced Technology Services. November 28, 2000
Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
Colocation. Scalable Solutions for Shared IT Infrastructure. Enterprise. Colocation
Scalable Solutions for Shared IT Infrastructure Global competition, rising real estate and power costs, and shrinking IT budgets are causing today s businesses to seek alternatives to building their own
APPENDIX 8 TO SCHEDULE 3.3
APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE
Principles of Best Practice applicable to the distribution of Life Insurance Products on a Cross-border Basis within the EU or a Third Country
2015 Principles of Best Practice applicable to the distribution of Life Insurance Products on a Cross-border Basis within the EU or a Third Country 1 Principles of Best Practice applicable to the distribution
Consultative report. Committee on Payment and Settlement Systems. Board of the International Organization of Securities Commissions
Committee on Payment and Settlement Systems Board of the International Organization of Securities Commissions Consultative report Principles for financial market infrastructures: Assessment methodology
DATA CENTRE DATA CENTRE MAY 2015
DATA CENTRE DATA CENTRE MAY 2015 CONCERTHOUSE MUSIC Concerthouse Music Data Centre services are located in the Equinix Internet Business Exchange (IBX ) Centre at Mascot. This IBX offers the highest level
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
How To Assess A Critical Service Provider
Committee on Payments and Market Infrastructures Board of the International Organization of Securities Commissions Principles for financial market infrastructures: Assessment methodology for the oversight
APPLICATION HOSTING SERVICE AGREEMENT
APPLICATION HOSTING SERVICE AGREEMENT This Agreement is entered into by and between CLIENT (Municipality): And SERVICE PROVIDER: Seacoast Computer, Inc. dba Stone Hill Municipal Solutions 25 Old Dover
