Content Options

Content Options

View Options

Status: Please note you should read all Brexit changes to the FCA Handbook and BTS alongside the main FCA transitional directions. Where these directions apply the 'standstill', firms have the choice between complying with the pre-IP completion day rules, or the post-IP completion day rules. To see a full list of Handbook modules affected, please see Annex B to the main FCA transitional directions.

You are viewing the version of the document as on 2021-01-01.

Status: In this content, we have included all amendments made by EU exit-related instruments up to end September 2020. There will be more amendments to be made later this year, further to the September QCP.

Article 9 Security

  1. (1)

    A data reporting services provider shall set up and maintain procedures and arrangements for physical and electronic security designed to:

    1. (a)

      protect its IT systems from misuse or unauthorised access;

    2. (b)

      minimise the risks of attacks against the information systems;

    3. (c)

      prevent unauthorised disclosure of confidential information;

    4. (d)

      ensure the security and integrity of the data.

  2. (2)

    Where an investment firm ("reporting firm") uses a third party ("submitting firm") to submit information to an ARM on its behalf, an ARM shall have procedures and arrangements in place to ensure that the submitting firm does not have access to any other information about or submitted by the reporting firm to the ARM which may have been sent by the reporting firm directly to the ARM or via another submitting firm.

  3. (3)

    A data reporting services provider shall set up and maintain measures and arrangements to promptly identify and manage the risks identified in paragraph 1.

  4. (4)

    In respect of breaches in the physical and electronic security measures referred to in paragraphs 1, 2 and 3, a data reporting services provider shall promptly notify:

    1. (a)

      the competent authority and provide an incident report, indicating the nature of the incident, the measures adopted to cope with the incident and the initiatives taken to prevent similar incidents;

    2. (b)

      its clients that have been affected by the security breach.