Article 9
Information technology systems
The information technology architecture shall be well-documented. The systems shall be designed to deal with the CCP’s operational needs and the risks the CCP faces, be resilient, including in stressed market conditions, and be scalable, if necessary, to process additional information. The CCP shall provide for procedures and capacity planning as well as for sufficient redundant capacity to allow the system to process all remaining transactions before the end of the day in circumstances where a major disruption occurs. The CCP shall provide for procedures for the introduction of new technology including clear reversion plans.
The information security framework shall include at least the following features:
access controls to the system;
adequate safeguards against intrusions and data misuse;
specific devices to preserve data authenticity and integrity, including cryptographic techniques;
reliable networks and procedures for accurate and prompt data transmission without major disruptions;
audit trails.