Updated 22/10/2024
In force

Initial Legal Act
Amendments
Search within this legal act

Article 75 - IT tools

Article 75

IT tools

1.   A CSD shall ensure that its information technology (IT) systems are well-documented and that they are designed to cover the CSD's operational needs and the operational risks that the CSD faces.

The CSD IT systems shall be:

(a)

resilient, including in stressed market conditions;

(b)

have sufficient capacity to process additional information as a result of increasing settlement volumes;

(c)

achieve the service level objectives of the CSD.

2.   A CSD systems shall have sufficient capacity to process all transactions before the end of the day even in circumstances where a major disruption occurs.

A CSD shall have procedures for ensuring sufficient capacity of its IT systems, including in the case of the introduction of new technology.

3.   A CSD shall base its IT systems on internationally recognised technical standards and industry best practices.

4.   A CSD's IT systems shall ensure that any data at the disposal of the CSD is protected from loss, leakage, unauthorised access, poor administration, inadequate record-keeping, and other processing risks.

5.   A CSD's information security framework shall outline the mechanisms that the CSD have in place to detect and prevent cyber-attacks. The framework shall also outline the CSD's plan in response to cyber-attacks.

6.   The CSD shall subject its IT systems to stringent testing by simulating stressed conditions before those systems are used for the first time, after making significant changes to the systems and after a major operational disruption has occurred. A CSD shall, as appropriate, involve in the design and conduct of these tests:

(a)

users;

(b)

critical utilities and critical service providers;

(c)

other CSDs;

(d)

other market infrastructures;

(e)

any other institutions with which interdependencies have been identified in the business continuity policy.

7.   The information security framework shall include:

(a)

access controls to the system;

(b)

adequate safeguards against intrusions and data misuse;

(c)

specific devices to preserve data authenticity and integrity, including cryptographic techniques;

(d)

reliable networks and procedures for accurate and prompt data transmission without major disruptions; and

(e)

audit trails.

8.   The CSD shall have arrangements for the selection and substitution of IT third party service providers, CSD's timely access to all necessary information, as well as proper controls and monitoring tools.

9.   The CSD shall ensure that the IT systems and the information security framework concerning the CSD's core services are reviewed at least annually and are subject to audit assessments. The results of the assessments shall be reported to the CSD's management body and to the competent authority.