IMAS Regulatory Roundup - Outsourcing, Technology and Data Protection How does it impact fund management companies?



Similar documents
the Financing of Terrorism

NOTICE TO BANKS MONETARY AUTHORITY OF SINGAPORE ACT, CAP. 186 PREVENTION OF MONEY LAUNDERING AND COUNTERING THE FINANCING OF TERRORISM - BANKS

NOTICE ON OUTSOURCING

GUIDELINES ON OUTSOURCING

Singapore Diamond Investment Exchange Pte Ltd SDiX Depository Pte Ltd Application for Membership -- Approved Supplier

Financial Advisers (Amendment) Bill

Statement of Guidance: Outsourcing All Regulated Entities

PREVENTION OF MONEY LAUNDERING AND COUNTERING THE FINANCING OF TERRORISM - BANKS

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES

10 Shenton Way MAS Building Singapore Telephone: (65) Facsimile: (65)

GUIDANCE NOTE ON OUTSOURCING

Supervisory Policy Manual

Privacy Statement Relating to the Collection, Use and Disclosure of Personal Data & Customer Information

10 Shenton Way MAS Building Singapore Telephone: (65) Facsimile: (65)

GUIDELINES ON COMPLIANCE FUNCTION FOR FUND MANAGEMENT COMPANIES

RESPONSE TO FEEDBACK RECEIVED CONSULTATION ON ANTI- MONEY LAUNDERING AND COUNTERING THE FINANCING OF TERRORISM (AML/CFT) NOTICES AND GUIDELINES

PART I - PRELIMINARY...1 Objective...1 Applicability...2 Legal and Regulatory Provision...2

ATMD Bird & Bird. Singapore Personal Data Protection Policy

Insurance Guidance Note No. 14 System of Governance - Insurance Transition to Governance Requirements established under the Solvency II Directive

Managing General Agents (MGAs) Guideline

POV on Draft Guidelines on Managing Risks and Code of Conduct in Outsourcing of Financial Services by NBFCs

Technology Risk Management

Guidance note on Outsourcing/Delegation of Functions and inward outsourcing

Risk Management of Outsourced Technology Services. November 28, 2000

Financial Services Guidance Note Outsourcing

[To All Financial Institutions Exempt from Holding Capital Markets Services Licence]

I loved reading the terms & conditions! said no one, ever. term deposit terms + conditions

The Cloud and Cross-Border Risks - Singapore

GUIDANCE NOTE OUTSOURCING OF FUNCTIONS BY ENTITIES LICENSED UNDER THE PROTECTION OF INVESTORS (BAILIWICK OF GUERNSEY) LAW, 1987

SECURITIES AND FUTURES ACT (CAP. 289)

DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY

Business Associate Agreement

GROUP POLICY TO COMBAT MONEY LAUNDERING AND TERRORIST FINANCING. Anti-Money Laundering Policy

GUIDELINE ON THE APPLICATION OF THE OUTSOURCING REQUIREMENTS UNDER THE FSA RULES IMPLEMENTING MIFID AND THE CRD IN THE UK

SUPERVISORY AND REGULATORY GUIDELINES: PU GUIDELINES ON MINIMUM STANDARDS FOR THE OUTSOURCING OF MATERIAL FUNCTIONS

PHYSICIANS REIMBURSEMENT FUND, INC. A Risk Retention Group. APPLICATION MD & DO Locum Tenens. 1. First Name: Middle Initial: Last Name:

STATE OF NEVADA DEPARTMENT OF HEALTH AND HUMAN SERVICES BUSINESS ASSOCIATE ADDENDUM

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Third Party Security Requirements Policy

TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel

HIPAA PRIVACY AND SECURITY RULES BUSINESS ASSOCIATE AGREEMENT BETWEEN. Stewart C. Miller & Co., Inc. (Business Associate) AND

Privacy Risk Assessments

Business Associate Agreement (BAA) Guidance

This Statement of Investment Principles is produced to meet the requirements of the Pensions Act 2004 and to reflect the Government s voluntary code

2015 No FINANCIAL SERVICES AND MARKETS. The Small and Medium Sized Businesses (Credit Information) Regulations 2015

LegalBytes. Take That Back: Drivers and Considerations for Insourcing. Special Edition

States of Jersey Police & Customs Joint Financial Crimes Unit. Guide to compiling a Suspicious Activity Report (SAR)

Operational Risk Publication Date: May Operational Risk... 3

The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations

CMC Markets Cash Account

CUSTOMS SINGAPORE. Financial Action Task Force (FATF) and Review of Zero-GST Warehouse Licensing Conditions. 23 Sep 2015

Anti-Money Laundering and Counter- Terrorism Financial Policy

Client Alert September 2015

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Cloud Computing: Legal Risks and Best Practices

Code of Conduct for Mobile Money Providers

PERSONAL DATA PROTECTION CHECKLIST FOR ORGANISATIONS

GUERNSEY FINANCIAL SERVICES COMMISSION

Mitigating and managing cyber risk: ten issues to consider

This form may not be modified without prior approval from the Department of Justice.

HIPAA Privacy and Business Associate Agreement

HIPAA BUSINESS ASSOCIATE AGREEMENT

This TEPL Data Protection Policy is effective from 2 July Updated on 31 Jul 2015

CODE GOVERNANCE COMMITTEE CHARTER. 1 Functions and responsibilities of the Code Governance Committee

Health Plan Select, Inc. Business Associate Privacy Addendum To The Service Agreement

Application for Status as a Registered Bank:

Exhibit 2. Business Associate Addendum

BUSINESS ASSOCIATE AGREEMENT

New Zealand Institute of Chartered Accountants

Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES

GUIDELINES ON OUTSOURCING

INSURANCE ACT 2008 CORPORATE GOVERNANCE CODE OF PRACTICE FOR REGULATED INSURANCE ENTITIES

Infinedi HIPAA Business Associate Agreement RECITALS SAMPLE

Data Protection Act 1998 Subject Access Request - Application Form

BUSINESS ASSOCIATE AGREEMENT

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10

BUSINESS ASSOCIATE AGREEMENT

Align Technology. Data Protection Binding Corporate Rules Controller Policy Align Technology, Inc. All rights reserved.

Requirements made under the Intermediaries Byelaw

Part A OVERVIEW Introduction Applicability Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...

Data Processing Agreement for Oracle Cloud Services

HIPAA BUSINESS ASSOCIATE ADDENDUM (Privacy & Security) I. Definitions

BUSINESS ASSOCIATE AGREEMENT BETWEEN AND COMMISSION ON ACCREDITATION, AMERICAN PSYCHOLOGICAL ASSOCIATION

1. (a) Full name of proposer including trading names if any (if not a limited company include full names of partners) Date established

Services Providers. Ivan Soto

HIPAA BUSINESS ASSOCIATE AGREEMENT

EXHIBIT C BUSINESS ASSOCIATE AGREEMENT

HSBC Personal Loan Contract. Standard Terms And Conditions

Transcription:

IMAS Regulatory Roundup - Outsourcing, Technology and Data Protection How does it impact fund management companies? IMAS Seminar 20 January 2015 Ken Chia Baker & McKenzie.Wong & Leow is incorporated with limited liability and is a member firm of Baker & McKenzie International, a Swiss Verein with member law firms around the world. In accordance with the common terminology used in professional service organizations, reference to a "partner" means a person who is a partner, or equivalent, in such a law firm. Similarly, reference to an "office" means an office of any such law firm.

Agenda New updates MAS Circular on System Vulnerability Assessments and Penetration Testing May 2014 MAS Circular on IT security risks posed by personal mobile devices September 2014 MAS consultation exercise on Notice and Guidelines on Outsourcing September 2014 MAS Notice On Technology Risk Management PDPA and MAS Amendments to Notices on Prevention of Money Laundering and Countering the Financing of Terrorism 2

MAS outsourcing and technology updates

MAS Circular on System Vulnerability Assessments and Penetration Testing - Circular No. SRD TR 01/2014 21 May 2014 As vulnerability assessments and penetration testing would only enable FIs to identify security deficiencies in their IT systems at a particular point in time, FIs should institute a robust regime of prompt system patching and hardening, as well as adopt secure software coding practice. Where an outsourcing arrangement involves the handling of sensitive customer data by the service provider, FIs shall ensure that the data is accorded the same level of protection as if it is processed in-house. Where applicable, stringent requirements for regular vulnerability assessments and penetration testing must be applied to the service providers environment 4

MAS Circular on IT security risks posed by personal mobile devices - Circular No. SRD TR 02/2014 26 Sep 2014 FIs must conduct a comprehensive risk assessment on BYOD implementation to ensure that measures adopted sufficiently mitigate the security risks associated with Bring Your Own Device (BYOD) Impingement of privacy and personal use, Diverse device portfolio, Lack of control over device updates, Maturity of Mobile Security Solutions Consider common ways to address BYOD Security such as use of Mobile Device Management and Virtualisation solutions Regular vulnerability assessment and penetration testing must be carried out on the BYOD infrastructure to ensure that any security gaps are identified and rectified promptly. 5

MAS Outsourcing Notice and Guidelines As with TRM, the new Outsourcing Notice will be binding defines a set of minimum standards for outsourcing management sets out requirements for the assessment of service providers, access to information, conduct of audits on a service provider, protection of customer data, and termination of and exiting from an outsourcing arrangement. 6

Notice v Guidelines Notice Material Outsourcing Arrangements minimum standards early termination Protection of Customer Data Outsourcing to overseas regulated financial institutions Guidelines Parts also apply to non-material outsourcings 7

Noitice - Material Outsourcings Policies and processes to identify material outsourcing arrangements Adequate risk management framework, systems, policies and processes to assess, control and monitor Ensure continued compliance Central register of all material outsourcing arrangements Maintain adequate documentation and furnish to MAS on request 8

Guidelines Material outsourcings Additional factors to consider impact should service provider.. encounter a breach of security, confidentiality or compromise of customer information; impact on the institution s customers, should the service provider fail to perform the service or encounter a breach of security or confidentiality cost of outsourcing failure, which will require in-sourcing or seeking similar service from another service provider, as a proportion of total operating costs of the institution; 9

Guidelines Additional examples of Outsourcings white-labelling arrangements such as for trading and hedging facilities information systems hosting (e.g., software-as-a-service, platform-as-a-service, infrastructure-as-a-service); management of policy issuance and claims operations by managing agents support services related to archival and storage of data and records 10

Notification Of Adverse Developments New Guidelines notification of any event that could potentially lead to prolonged service failure or disruption alternative arrangements or reintegration if An institution fails or is unable to demonstrate a satisfactory level of understanding of the nature and extent of risks involved or emerging from the outsourcing arrangement; The confidentiality of its customer information cannot be assured. 11

Guidelines - Responsibility Of The Board Added responsibilities setting a suitable risk appetite to define the nature and extent of risks that the institution is willing and able to assume from its outsourcing arrangements; ensuring that senior management establishes appropriate governance structures and processes for sound and prudent risk management, including a management body that reviews controls for consistency and alignment with a comprehensive institution-wide view of risk 12

Guidelines - Responsibility of Senior Management Added responsibilities ensuring that staff in the institution are made aware of these policies and procedures for its outsourcing arrangements; regularly reviewing.. standards.. to reflect changes in the institution s overall risk profile and risk environment monitoring and maintaining effective control of all risks from its material outsourcing arrangements on an institution-wide basis ensuring appropriate and timely remedial actions are taken to address audit findings 13

Guidelines other points self assessment within 2 months if become regulated or if M&A track record of service provider will need to be considered FI specific audits and metrics required (i.e. not aggregated with metrics or data belonging to other customers of the service provider) indemnification of MAS for inspections and audits 14

Circular No. SRD TR 01/2014 21 May 2014 PDPA updates 15

PDPA does not affect other laws PDPA sets out minimum standards; additional sector-specific requirements will continue to apply PDPA does not affect any authority, right, privilege or immunity conferred, or obligation or limitation imposed, under the law 2013 Baker & McKenzie 16 Performance of contractual obligation not excuse for contravening PDPA Cannot claim to be exempt from compliance with PDPA when performing a contractual obligation Provisions of other written law prevail over PDPA to the extent inconsistent Law vs written law? Includes directions, codes of practice, licence conditions, guidelines, common law?

Application to banking disclosures Disclosures required under written law (e.g. Corruption, Drug Trafficking and Other Serious Crimes (Confiscation of Benefits) Act or CDSA) Disclosures required under AML/CFT notices issued by MAS Disclosures required for compliance with laws of other jurisdictions (e.g. SDR under Dodd-Frank Act, FACTA) Is personal data disclosed? Is disclosure exempted under Third Schedule of Banking Act? NB: Disclosure in connection with the promotion of financial products and services to customers of any licensed financial institution deleted 2013 Baker & McKenzie 17

Other potential areas of overlap Collection of personal data for KYC Guidelines on outsourcing/ cloud computing Technology risk management 2013 Baker & McKenzie 18

Regulatory actions taken by MAS MAS Amendments to Notices on Prevention of Money Laundering and Countering the Financing of Terrorism Consultation Paper on Obligations of Financial Institutions under the Personal Data Protection Act 2012 issued 2 Jun 2014 Amendments effective 2 July 2014 19

Key points no need for consent for collection, use and disclosure of personal data to comply with Notice of an individual customer of someone appointed to act on behalf of a customer of an individual beneficial owner of a customer 20

Key points Access and correction right only in relation to a) full name, including any alias; (b) the unique identification number (such as an identity card number, birth certificate number or passport number); (c) the existing residential address and contact telephone number(s); (d) the date of birth; (e) the nationality; and (f) any other personal data of the respective individual provided by that individual to the [FI] No need to provide access, info on use and disclosure or right to correct any other information in possession or control of FI 21

Questions? Ken Chia Principal Baker & McKenzie.Wong & Leow 8 Marina Boulevard #05-01 Marina Bay Financial Centre Tower 1 Singapore 018981 Direct: +65 6434 2558 Main: +65 6338 1888 Fax: +65 6337 5100 ken.chia@bakermckenzie.com www.bakermckenzie.com 22