ROZHODNUTÍ EVROPSKÉ XXXXXXXXX XXXXX (XX) 2021/1758
ze xxx 21. září 2021,
xxxxxx xx mění rozhodnutí XXX/2007/7 o podmínkách XXXXXX2-XXX (XXX/2021/43)
XXXXXXX RADA XXXXXXXX XXXXXXXXX XXXXX,
x&xxxx;xxxxxxx xx Xxxxxxx x&xxxx;xxxxxxxxx Xxxxxxxx xxxx, a zejména xx xxxxx x&xxxx;xxxxxxx odrážku xx.&xxxx;127 odst. 2 xxxx xxxxxxx,
x&xxxx;xxxxxxx xx statut Xxxxxxxxxx xxxxxxx xxxxxxxxxxx xxxx a Evropské xxxxxxxxx xxxxx, a zejména xx xxxxxx&xxxx;11.6 x&xxxx;xxxxxx 17, 22 x&xxxx;23 xxxxxx xxxxxxx,
xxxxxxxx x&xxxx;xxxxx důvodům:
|
(1) |
Rada xxxxxxxxx změnila (1) xxx 20.&xxxx;xxxxxxxx 2021 xxxxxx xxxxxx Xxxxxxxx xxxxxxxxx xxxxx XXX/2012/27&xxxx;(2) s cílem: x) xxxxxxxx, že xxxxxxxx TIPS DCA xxxxx x&xxxx;XXXXXX2 připojeni xxxxxxxxxxxxxxx jednotného portálu xxxxx xxxxxxxxxxxxxx Xxxxxxxxxxx (Xxxxxxxxxx Xxxxxx Xxxxxx Xxxxxxxxxxxxxx Xxxxxxx) xx xxxxxxxxx 2021 a majitelé X2X XXX budou x&xxxx;XXXXXX2 xxxxxxxxxxxxxxx xxxxxx xxxxxxx připojeni xx xxxxxx 2022; x) xxxxxxxx a rozšířit pravidla xxxxxxxx xx dodržování xxxxxxxxx na bezpečnost xxxxxxxxx xxxx XXXXXX2, xxx xx zajistilo, xx se xxxxxx XXXXXX2 xxxx xxxx xxxxxxx xxx, aby xxx schopen xxxxx xxxxxxx x&xxxx;xxxxxxx xxxxxxxxxxxx xxxxxxxxxxx; x) xxxxxx xxxxxxxxx, xxx xxxxxxxx xxxx PM, xxxxxx xxxxxxx účastníci a adresovatelní xxxxxxxx xxxx BIC, xxxxx přistoupili x&xxxx;xxxxxxxxxxx xxxxxxx XXX Inst xxxxxxxx xxxxxx x&xxxx;xxxxxxxxxx xxxxxxx pro xxxxxxxx xxxxxxxxxxxxx xxxxxxx XXXX, xxxx a zůstali trvale xxxxxxxxxxx xx platformě XXXX prostřednictvím TIPS XXX, xxx aby xx zajistila xxxxxxxxxx xxxxxxxxxx plateb x&xxxx;xxxx Xxxx; d) xxxxxx xxxxxxxxxxxxxxx, xxxxx jde x&xxxx;xxxxxxx převodu xxxxxxxx x&xxxx;xxxx xxxxxxxxx x&xxxx;XXXXXX2 xx odpovídající xxxxxxxxxxx xxxx v budoucím xxxxxxx XXXXXX, xxx xxxx xxxxxxxxx právní jistota, x&xxxx;x) xxxxxxxx a aktualizovat xxxxxxx xxxxx xxxxxxx xxxxxxxx zásad XXX/2012/27. |
|
(2) |
Xxxxxxx xxxx xxxxxxxxxx projekt xxxxxxxxxxx T2-T2S, xxxx x&xxxx;xxxxx právní xxxxxxx xxxxxx xxxxxxxx zajistit xxxxxxxxxxxxxxx, pokud xxx x&xxxx;xxxxxxx xxxxxxx zůstatků x&xxxx;xxxx xxxxxxxxx x&xxxx;XXXXXX2-XXX xx xxxxxxxxxxxx nástupnické xxxx. |
|
(3) |
Xxxxx obecných xxxxx XXX/2012/27, xxxxx mají xxxx xx xxxxxxxx XXXXXX2-XXX, je třeba xxxxxxxxx v rozhodnutí Evropské xxxxxxxxx xxxxx XXX/2007/7&xxxx;(3). |
|
(4) |
Xxxxxxxxxx XXX/2007/7 xx proto xxxxx xxxxxxxxxxxxx xxxxxxxx xxxxxx, |
XXXXXXX XXXX XXXXXXXXXX:
Xxxxxx&xxxx;1
Xxxxx
Xxxxxxx X, II x&xxxx;XXX xxxxxxxxxx ECB/2007/7 xx xxxx x&xxxx;xxxxxxx x&xxxx;xxxxxxxxx xxxxxx xxxxxxxxxx.
Xxxxxx&xxxx;2
Xxxxxxxxx xxxxxxxxxx
Xxxx rozhodnutí xxxxxxxx x&xxxx;xxxxxxxx pátým xxxx po xxxxxxxxxx x&xxxx;Xxxxxxx xxxxxxxx Xxxxxxxx xxxx.
Xxxxxxx xx xxx xxx 21. listopadu 2021, x&xxxx;xxxxxxxx xxxx.&xxxx;1 písm. x) x&xxxx;xxxxxxxx 7 x&xxxx;9 přílohy II xxxxxx xxxxxxxxxx, xxxxx xx xxxxxxx xxx xxx 13.&xxxx;xxxxxx 2022.
Xx Xxxxxxxxxx nad Xxxxxxx xxx 21.&xxxx;xxxx 2021.
Xxxxxxxxxxx ECB
Christine XXXXXXX
(1)&xxxx;&xxxx;Xxxxxx xxxxxx Xxxxxxxx xxxxxxxxx xxxxx (XX) 2021/1759 xx dne 20.&xxxx;xxxxxxxx 2021, xxxxxxx xx xxxx obecné xxxxxx XXX/2012/27 x&xxxx;xxxxxxxxxxxxxx expresním xxxxxxxxxxxxxxx xxxxxxx zúčtování xxxxxx x&xxxx;xxxxxxx čase (XXXXXX2) (ECB/2021/30) [(xxx xxxxxx 45 x&xxxx;xxxxx xxxxx Xxxxxxxx xxxxxxxx).
(2)&xxxx;&xxxx;Xxxxxx xxxxxx Evropské xxxxxxxxx xxxxx XXX/2012/27 xx xxx 5.&xxxx;xxxxxxxx 2012 x&xxxx;xxxxxxxxxxxxxx xxxxxxxxx xxxxxxxxxxxxxxx xxxxxxx zúčtování xxxxxx x&xxxx;xxxxxxx čase (XXXXXX2) (Xx. xxxx. X&xxxx;30, 30.1.2013, x. 1).
(3)&xxxx;&xxxx;Xxxxxxxxxx Xxxxxxxx xxxxxxxxx xxxxx XXX/2007/7 xx dne 24.&xxxx;xxxxxxxx 2007 x&xxxx;xxxxxxxxxx XXXXXX2-XXX (Úř. věst. X&xxxx;237, 8.9.2007, x. 71).
XXXXXXX X
Xxxxxxx X&xxxx;xxxxxxxxxx XXX/2007/7 xx xxxx xxxxx:
|
1. |
Xxxxxx&xxxx;1 xx xxxx xxxxx:
|
|
2. |
V článku 2 xxxxxx odstavci xx xxxxxxxx xxxx text, xxxxx zní:
|
|
3. |
Xxxxxx&xxxx;3 se xxxx xxxxx:
|
|
4. |
Xxxxxx&xxxx;5 xx xxxxxxxxx xxxxx: „Xxxxxxx&xxxx;5 Xxxxxx xxxxxxxxxxxx XX xxxxxxx xxxxxxx xx TARGET2-ECB xxx xxxxxx xxxxxxxxxxxx xxx shall comply xxxx xxx xxxxxxxxxxxx xxx xxx xx Xxxxxxx&xxxx;8(1) and (2). They xxxxx xxxx at xxxxx xxx PM xxxxxxx with the XXX. XX xxxxxxx xxxxxxx xxxx xxxx xxxxxxx xx xxx XXX Inst xxxxxx xx xxxxxxx the XXXX Xxxxxxx Xxxxxx Xxxxxxxx Xxxxxxxxx Xxxxxxxxx xxxxx be xxx xxxxx xxxxxx xxxxxxxxx xx xxx XXXX Xxxxxxxx xx all xxxxx, either xx x&xxxx;XXXX XXX xxxxxx xx as x&xxxx;xxxxxxxxx xxxxx xxx a TIPS XXX holder.“; |
|
5. |
Článek 22 xx xxxxxxxxx xxxxx: „Xxxxxxx&xxxx;22 Xxxxxxxx Xxxxxxxxxxxx xxx Xxxxxxx Xxxxxxxxxx 1.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx xxxxx implement xxxxxxxx xxxxxxxx controls xx xxxxxxx xxxxx systems xxxx unauthorised access xxx xxx. Xxxxxxxxxxxx xxxxx xx exclusively xxxxxxxxxxx xxx xxx xxxxxxxx xxxxxxxxxx xx xxx xxxxxxxxxxxxxxx, xxxxxxxxx xxx xxxxxxxxxxxx of xxxxx xxxxxxx. 2.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx xxxxx xxxxxx the XXX xx any security-related xxxxxxxxx in xxxxx xxxxxxxxx infrastructure xxx, xxxxx xxxxxxxxxxx, xxxxxxxx-xxxxxxx xxxxxxxxx xxxx xxxxx xx the xxxxxxxxx xxxxxxxxxxxxxx of the xxxxx party xxxxxxxxx. Xxx XXX xxx xxxxxxx xxxxxxx xxxxxxxxxxx xxxxx the xxxxxxxx xxx, xx necessary, xxxxxxx xxxx the xxxxxxxxxxx take xxxxxxxxxxx xxxxxxxx to prevent x&xxxx;xxxxxxxxxx xx such xx xxxxx. 3.&xxxx;&xxxx;&xxxx;Xxx XXX xxx impose xxxxxxxxxx xxxxxxxx xxxxxxxxxxxx, in xxxxxxxxxx with xxxxxx xx xxxxxxxxxxxxx xx xxx xxxxxxxxxx xx xxxxx, xx all xxxxxxxxxxxx and/or xx xxxxxxxxxxxx xxxx xxx xxxxxxxxxx critical xx xxx ECB. 4. Participants xxxxx xxxxxxx the XXX xxxx: (x) xxxxxxxxx xxxxxx to xxxxx xxxxxxxxxxx xx xxxxxxxxx xx xxxxx xxxxxx xxxxxxx xxxxxxx xxxxxxxx’x xxxxxxxx xxxxxxxx xxxxxxxxxxxx, xxx (ii) xx xx xxxxxx basis xxx XXXXXX2 self-certification xxxxxxxxx xx published xx xxx ECB’s xxxxxxx in Xxxxxxx. 4x.&xxxx;&xxxx;&xxxx;Xxx XXX xxxxx xxxxxx xxx participant’s self-certification xxxxxxxxx(x) on xxx xxxxxxxxxxxx level of xxxxxxxxxx xxxx xxxx xx xxx xxxxxxxxxxxx xxx xxx in xxx XXXXXX2 self-certification xxxxxxxxxxxx. These xxxxxxxxxxxx xxx listed in Xxxxxxxx VII, xxxxx xx xxxxxxxx to xxx other Appendices xxxxxx in Xxxxxxx&xxxx;2(1), xxxxx xxxx an xxxxxxxx part xx xxxxx Conditions. 4b. The xxxxxxxxxxx’x xxxxx of xxxxxxxxxx xxxx xxx xxxxxxxxxxxx xx the TARGET2 xxxx-xxxxxxxxxxxxx xxxxx xx xxxxxxxxxxx xx follows, xx increasing order xx xxxxxxxx: ‘xxxx xxxxxxxxxx’; ‘minor xxx-xxxxxxxxxx’; xx ‘major non-compliance’. Xxx xxxxxxxxx criteria xxxxx: full xxxxxxxxxx xx reached where xxxxxxxxxxxx xxxxxxx 100% xx xxx requirements; xxxxx non-compliance xx xxxxx x&xxxx;xxxxxxxxxxx xxxxxxxxx xxxx xxxx 100% xxx xx xxxxx 66% of xxx xxxxxxxxxxxx xxx xxxxx xxx-xxxxxxxxxx xxxxx x&xxxx;xxxxxxxxxxx xxxxxxxxx xxxx xxxx 66% xx xxx xxxxxxxxxxxx. Xx x&xxxx;xxxxxxxxxxx xxxxxxxxxxxx xxxx x&xxxx;xxxxxxxx xxxxxxxxxxx xx xxx xxxxxxxxxx xx xx, xx xxxxx xx xxxxxxxxxx as xxxxxxxxx xxxx the xxxxxxxxxx xxxxxxxxxxx for xxx xxxxxxxx xx xxx xxxxxxxxxxxxxx. X&xxxx;xxxxxxxxxxx xxxxx xxxxx xx reach ‘xxxx xxxxxxxxxx’ xxxxx xxxxxx xx action xxxx demonstrating xxx xx xxxxxxx xx xxxxx full xxxxxxxxxx. Xxx XXX xxxxx xxxxxx xxx relevant xxxxxxxxxxx xxxxxxxxxxx xx xxx xxxxxx xx xxxx xxxxxxxxxxx’x compliance. 4c. If xxx participant refuses xx xxxxx xxxxxxxxx xxxxxx to its xxxxxxxxxxx xx xxxxxxxxx xx xxxxx xxxxxx XXXx xxxxxxxx security xxxxxxxxxxxx xx does xxx provide xxx XXXXXX2 self-certification xxx xxxxxxxxxxx’x level of xxxxxxxxxx shall xx xxxxxxxxxxx xx ‘major xxx-xxxxxxxxxx’. 4x.&xxxx;&xxxx;&xxxx;Xxx XXX shall xxxxxxxx xxxxxxxxxx xx xxxxxxxxxxxx xx an xxxxxx xxxxx. 4x.&xxxx;&xxxx;&xxxx;Xxx XXX xxx xxxxxx xxx xxxxxxxxx measures xx xxxxxxx on xxxxxxxxxxxx xxxxx xxxxx xx xxxxxxxxxx was xxxxxxxx xx xxxxx xx xxxxx non-compliance, in xxxxxxxxxx xxxxx xx xxxxxxxx:
|
|
6. |
X&xxxx;xxxxxx&xxxx;33 xx odstavec 1 xxxxxxxxx tímto: „1. Participants xxxxx xx deemed xx xx xxxxx xx, xxxxx xxxxxx xxxx, xxx xxxxx xx able xx xxxxxxxxxxx xxxx compliance xx xxx xxxxxxxx xxxxxxxxx authorities with xxx xxxxxxxxxxx xx xxxx xxxxxxxx xx xxxxxxxxxxx xx data xxxxxxxxxx. Xxxx shall xx xxxxxx xx xx xxxxx xx, xxx xxxxx xxxxxx xxxx all obligations xx xxxx xxxxxxxx xx xxxxxxxxxxx xx xxxxxxxxxx xx xxxxx xxxxxxxxxx xxx the xxxxxxxxx xx xxxxxxxxx, xxxxxxxxxxxxx-xxxxxxxxx nuclear activities xxx the xxxxxxxxxxx xx xxxxxxx xxxxxxx xxxxxxxx systems, in xxxxxxxxxx in terms xx implementing xxxxxxxxxxx xxxxxxxx concerning xxx xxxxxxxx xxxxxxx xx xxxxxxxx xx their XX xxxxxxxx. Xxxxxxxxxxxx xxxxx xxxxxx that xxxx are informed xxxxx xxx TARGET2 xxxxxxx xxxxxxx provider’s xxxx retrieval xxxxxx xxxxx xx xxxxxxxx xxxx the xxxxxxxxxxx xxxxxxxxxxxx with xxx XXXXXX2 xxxxxxx service xxxxxxxx.“; |
|
7. |
Xxxxxx xx nový xxxxxx&xxxx;39x, xxxxx xxx: „Xxxxxxx&xxxx;39x Xxxxxxxxxxxx xxxxxxxxxx 1.&xxxx;&xxxx;&xxxx;Xxxx the XXXXXX xxxxxx xx operational xxx XXXXXX2 xxx xxxxxx xxxxxxxxx, XX xxxxxxx xxxxxxxx xxxxx xx xxxxxxxxxxx xx xxx xxxxxxx xxxxxx’x xxxxxxxxxxxxx successor xxxxxxxx xx xxx XXXXXX xxxxxx. 2.&xxxx;&xxxx;&xxxx;Xxx requirement xxxx XX xxxxxxx xxxxxxx, xxxxxxxx Xxxxxxxxxxxx xxx xxxxxxxxxxx XXX holders xxxxxxxx xx xxx XXX Xxxx scheme xx reachable xx xxx TIPS Xxxxxxxx xxxxxxxx to Xxxxxxx&xxxx;5 xxxxx apply xx xx 25 Xxxxxxxx 2022.“; |
|
8. |
X&xxxx;xxxxxxx X&xxxx;xx x&xxxx;xxxx.&xxxx;8 xxxxxxx. 4 nahrazuje xxxxxxx x) xxxxx:
|
|
9. |
X&xxxx;xxxxxxx XX se x&xxxx;xxxxxxxx 6 xxxxxxxxx xxxxxxx x) xxxxx:
|
|
10. |
Xxxxxxxx se nový xxxxxxx VII, xxxxx xxx: „Xxxxxxxx XXX Xxxxxxxxxxxx xxxxxxxxx xxxxxxxxxxx xxxxxxxx xxxxxxxxxx xxx xxxxxxxx continuity xxxxxxxxxx Xxxxxxxxxxx xxxxxxxx xxxxxxxxxx Xxxxx xxxxxxxxxxxx xxx applicable xx each participant, xxxxxx xxx xxxxxxxxxxx xxxxxxxxxxxx that x&xxxx;xxxxxxxx xxxxxxxxxxx xx xxx xxxxxxxxxx to it. Xx establishing xxx xxxxx of xxxxxxxxxxx xx xxx xxxxxxxxxxxx xxxxxx xxx xxxxxxxxxxxxxx, xxx xxxxxxxxxxx xxxxxx xxxxxxxx the xxxxxxxx xxxx xxx xxxx xx the Xxxxxxx Xxxxxxxxxxx Chain (XXX). Xxxxxxxxxxxx, the PTC xxxxxx xx x&xxxx;Xxxxx xx Xxxxx (XxX), x.x. a system xxxxxxxx xx the xxxxxxxx xx xxxxxxxxxxxx (x.x. xxxxxxxxxxxx, xxxxx-xxxxxx xxx xxxx-xxxxxx xxxxxxxxxxxx, xxxxxxxxxx), xxx xxxx xx xxx system xxxxxxxxxxx xx xxxx xxx xxxxxxx xx XXXXX (x.x. XXXXX XXX Xxx) xx Internet (xxxx xxx latter xxxxxxxxxx xx Xxxxxxxx-xxxxx Xxxxxx). Xxxxxxxxxxx 1.1: Xxxxxxxxxxx xxxxxxxx policy The xxxxxxxxxx xxxxx set x&xxxx;xxxxx xxxxxx xxxxxxxxx xx xxxx with business xxxxxxxxxx xxx xxxxxxxxxxx xxxxxxx xxx xxx xxxxxxxxxx to information xxxxxxxx xxxxxxx the xxxxxxxx, approval xxx xxxxxxxxxxx xx xx xxxxxxxxxxx security xxxxxx xxxxxx xx managing xxxxxxxxxxx security xxx xxxxx resilience xxxxxx xxx xxxxxxxxxxxx in xxxxx xx xxxxxxxxxxxxxx, xxxxxxxxxx xxx treatment xx xxxxxxxxxxx xxxxxxxx xxx cyber xxxxxxxxxx xxxxx. The xxxxxx xxxxxx contain xx xxxxx the xxxxxxxxx xxxxxxxx: xxxxxxxxxx, xxxxx (xxxxxxxxx xxxxxxx xxxx xx organisation, xxxxx xxxxxxxxx, xxxxx management xxx.), xxxxxxxxxx and xxxxxxxxxx xx xxxxxxxxxxxxxxxx. Xxxxxxxxxxx 1.2: Xxxxxxxx organisation An xxxxxxxxxxx xxxxxxxx framework xxxxx xx xxxxxxxxxxx xx xxxxxxxxx xxx xxxxxxxxxxx xxxxxxxx xxxxxx xxxxxx xxx organisation. Xxx management shall xxxxxxxxxx and xxxxxx xxx xxxxxxxxxxxxx xx xxx xxxxxxxxxxx xxxxxxxx xxxxxxxxx to xxxxxx xxx implementation xx xxx xxxxxxxxxxx security xxxxxx (xx per Xxxxxxxxxxx 1.1) xxxxxx xxx organisation, xxxxxxxxx xxx xxxxxxxxxx of xxxxxxxxxx xxxxxxxxx and xxxxxxxxxx xx security xxxxxxxxxxxxxxxx for xxxx xxxxxxx. Xxxxxxxxxxx 1.3: External xxxxxxx Xxx xxxxxxxx of xxx organisation’s xxxxxxxxxxx xxx information xxxxxxxxxx xxxxxxxxxx xxxxxx not xx xxxxxxx xx xxx xxxxxxxxxxxx of, xxx/xx xxx xxxxxxxxxx xx, xx external xxxxx/xxxxxxx xx xxxxxxxx/xxxxxxxx xxxxxxxx xx xxxx. Xxx access xx xxx organisation’s information xxxxxxxxxx xxxxxxxxxx by xxxxxxxx parties xxxxx xx xxxxxxxxxx. Xxxx xxxxxxxx xxxxxxx xx xxxxxxxx/xxxxxxxx of external xxxxxxx are xxxxxxxx xx access xxx xxxxxxxxxxxx’x information processing xxxxxxxxxx, x&xxxx;xxxx assessment xxxxx xx xxxxxxx xxx to determine xxx security implications xxx xxxxxxx requirements. Xxxxxxxx shall xx xxxxxx and xxxxxxx xx xx xxxxxxxxx xxxx each xxxxxxxx xxxxxxxx party. Requirement 1.4: Xxxxx xxxxxxxxxx Xxx xxxxxxxxxxx xxxxxx, the xxxxxxxx xxxxxxxxx and xxx xxxxxxxxxx information xxxxxxx, xxxx as xxxxxxxxx xxxxxxx, xxxxxxxxxxxxxxx, xxxxxxxx xxxxxxxxxxxx, xxx-xxx-xxxxx xxxxxxxx, xxxxxxxx xxx xxxx-xxxxxxxxx xxxxxxxxxxxx, xx xxx xxxxx xx xxx Xxxxxxx Xxxxxxxxxxx Xxxxx xxxxx xx xxxxxxxxx xxx xxx xxxx x&xxxx;xxxxxxxxx xxxxx. Xxx xxxxxxxxxxxxxx xxx xxx xxxxxxxxxxx xxx xxx xxxxxxxxx of xxxxxxxxxxx xxxxxxxx in xxx xxxxxxxx processes xxx xxx related XX xxxxxxxxxx to safeguard xxx information xxxxxx xxxxx xx xxxxxxxx. Xxxx: the xxxxx xxx xxxxxxxx the xxxxxxxxxxxxxx of xxxxxxxx xxxxxxxx as xxxxxxxxxxx, xxx xxxxxxx xxxxxxxxxxx xxx xxx proper xxxxxxxxxx xx the xxxxxx. Xxxxxxxxxxx 1.5: Xxxxxxxxxxx xxxxxx xxxxxxxxxxxxxx Xxxxxxxxxxx xxxxxx xxxxx xx classified xx terms xx xxxxx xxxxxxxxxxx xx xxx smooth delivery xx the service xx xxx xxxxxxxxxxx. Xxx xxxxxxxxxxxxxx xxxxx xxxxxxxx xxx xxxx, xxxxxxxxxx xxx degree xx xxxxxxxxxx xxxxxxxx xxxx handling xxx xxxxxxxxxxx xxxxx xx xxx xxxxxxxx xxxxxxxx xxxxxxxxx xxx xxxxx xxxx xxxx xxxx xxxxxxxxxxxxx xxx xxxxxxxxxx XX components. Xx xxxxxxxxxxx xxxxx xxxxxxxxxxxxxx xxxxxx xxxxxxxx by xxx xxxxxxxxxx xxxxx xx xxxx xx xxxxxx an xxxxxxxxxxx xxx of protection xxxxxxxx xxxxxxxxxx the xxxxxxxxxxx xxxxx xxxxxxxxx (xxxxxxxxx removal xxx xxxxxxxxxxx xx xxxxxxxxxxx xxxxxx) xxx to xxxxxxxxxxx xxx need xxx xxxxxxxx xxxxxxxx xxxxxxxx. Xxxxxxxxxxx 1.6: Human xxxxxxxxx xxxxxxxx Xxxxxxxx xxxxxxxxxxxxxxxx xxxxx xx xxxxxxxxx xxxxx xx employment xx xxxxxxxx xxx xxxxxxxxxxxx xxx xx xxxxx and xxxxxxxxxx xx xxxxxxxxxx. All xxxxxxxxxx xxx xxxxxxxxxx, xxxxxxxxxxx and third xxxxx xxxxx xxxxx xx adequately screened, xxxxxxxxxx xxx sensitive xxxx. Xxxxxxxxx, contractors xxx xxxxx xxxxx xxxxx of xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx xxxxx xxxx xx agreement xx xxxxx security xxxxx and responsibilities. Xx adequate xxxxx xx xxxxxxxxx shall xx ensured xxxxx xxx xxxxxxxxx, xxxxxxxxxxx xxx third party xxxxx, xxx xxxxxxxxx xxx xxxxxxxx xx xxxxxxxx procedures and xxx xxxxxxx use xx xxxxxxxxxxx processing xxxxxxxxxx xxxxx xx xxxxxxxx xx them xx xxxxxxxx possible xxxxxxxx xxxxx. X&xxxx;xxxxxx xxxxxxxxxxxx process for xxxxxxxx security xxxxxxxx xxxxx xx xxxxxxxxxxx xxx employees. Xxxxxxxxxxxxxxxx xxxxx xx xx xxxxx xx xxxxxx xxxx xx xxxxxxxx’x, xxxxxxxxxx’x or third xxxxx user’s exit xxxx or xxxxxxxx xxxxxx xxx xxxxxxxxxxxx xx xxxxxxx, and xxxx xxx return xx xxx xxxxxxxxx xxx the removal xx xxx xxxxxx xxxxxx xxx xxxxxxxxx. Xxxxxxxxxxx 1.7: Xxxxxxxx xxx xxxxxxxxxxxxx xxxxxxxx Xxxxxxxx xx xxxxxxxxx information processing xxxxxxxxxx xxxxx xx xxxxxx xx secure xxxxx, protected xx xxxxxxx security xxxxxxxxxx, xxxx xxxxxxxxxxx xxxxxxxx xxxxxxxx xxx xxxxx xxxxxxxx. Xxxx shall xx physically xxxxxxxxx xxxx xxxxxxxxxxxx xxxxxx, xxxxxx xxx xxxxxxxxxxxx. Xxxxxx shall xx xxxxxxx xxxx to xxxxxxxxxxx xxx fall xxxxxx xxx scope xx Xxxxxxxxxxx 1.6. Xxxxxxxxxx and standards xxxxx xx established xx xxxxxxx xxxxxxxx xxxxx xxxxxxxxxx information xxxxxx xxxx xx xxxxxxx. Xxxxxxxxx shall be xxxxxxxxx xxxx xxxxxxxx xxx environmental xxxxxxx. Xxxxxxxxxx of xxxxxxxxx (xxxxxxxxx equipment xxxx xxx-xxxx) and xxxxxxx xxx xxxxxxx xx xxxxxxxx is xxxxxxxxx xx xxxxxx the xxxx xx xxxxxxxxxxxx xxxxxx xx xxxxxxxxxxx xxx to guard xxxxxxx xxxx or xxxxxx xx xxxxxxxxx xx xxxxxxxxxxx. Xxxxxxx xxxxxxxx xxx xx xxxxxxxx xx xxxxxxx xxxxxxx xxxxxxxx xxxxxxx xxx to xxxxxxxxx xxxxxxxxxx xxxxxxxxxx xxxx xx xxx electrical xxxxxx xxx cabling xxxxxxxxxxxxxx. Xxxxxxxxxxx 1.8: Xxxxxxxxxx xxxxxxxxxx Xxxxxxxxxxxxxxxx and xxxxxxxxxx xxxxx be xxxxxxxxxxx xxx the xxxxxxxxxx xxx xxxxxxxxx of xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx xxxxxxxx xxx xxx xxxxxxxxxx xxxxxxx xx xxx Xxxxxxx Transaction Xxxxx end-to-end. As xxxxxxx xxxxxxxxx procedures, xxxxxxxxx xxxxxxxxx xxxxxxxxxxxxxx xx XX xxxxxxx, xxxxxxxxxxx xx duties xxxxx xx xxxxxxxxxxx, xxxxx xxxxxxxxxxx, xx xxxxxx xxx xxxx of xxxxxxxxx or xxxxxxxxxx xxxxxx xxxxxx. Where xxxxxxxxxxx xx xxxxxx xxxxxx xx xxxxxxxxxxx xxx xx documented xxxxxxxxx reasons, xxxxxxxxxxxx xxxxxxxx shall xx xxxxxxxxxxx xxxxxxxxx x&xxxx;xxxxxx xxxx xxxxxxxx. Xxxxxxxx xxxxx xx established xx xxxxxxx and xxxxxx xxx introduction xx malicious xxxx xxx xxxxxxx xx xxx Xxxxxxx Xxxxxxxxxxx Xxxxx. Xxxxxxxx shall xx also xxxxxxxxxxx (xxxxxxxxx xxxx xxxxxxxxx) xx xxxxxxx, xxxxxx xxx remove xxxxxxxxx xxxx. Xxxxxx code xxxxx xx xxxx xxxx from trusted xxxxxxx (x.x. xxxxxx Xxxxxxxxx COM xxxxxxxxxx xxx Xxxx Xxxxxxx). Xxx xxxxxxxxxxxxx xx xxx xxxxxxx (x.x. xxx xxx xx xxxxxxxxxx xxx xxxxxxx) xxxxx xx xxxxxxxx xxxxxxxxxx. Xxxx xxxxxx xxx xxxxxxxx policies xxxxx xx xxxxxxxxxxx xx xxx xxxxxxxxxx; those xxxxxxxx xxxxxxxx xxxxx xxxxxxx x&xxxx;xxxx xx xxx restoration xxxxxxx xxxxx xx xxxxxx xx xxxxxxx xxxxxxxxx xx least xxxxxxxx. Xxxxxxx xxxx xxx xxxxxxxx xxx xxx security xx payments xxxxx xx xxxxxxxxx and xxxxxx relevant xx xxxxxxxxxxx xxxxxxxx xxxxx xx xxxxxxxx. Xxxxxxxx xxxx xxxxx be xxxx xx xxxxxx xxxx information xxxxxx xxxxxxxx are identified. Xxxxxxxx xxxx xxxxx xx xxxxxxxxx reviewed xx x&xxxx;xxxxxx xxxxx, xxxxx on xxx xxxxxxxxxxx of xxx xxxxxxxxxx. Xxxxxx monitoring xxxxx xx xxxx xx xxxxx xxx xxxxxxxxxxxxx xx xxxxxxxx xxxxx xxx xxxxxxxxxx xx xxxxxxxx xxx xxx xxxxxxxx xx xxxxxxxx and xx xxxxxx xxxxxxxxxx xx xx xxxxxx xxxxxx xxxxx. Xxxxxxxxx of xxxxxxxxxxx xxxxxxx xxxxxxxxxxxxx shall xx xxxxx xx x&xxxx;xxxxxx xxxxxxxx policy, xxxxxxx out xx xxxx with exchange xxxxxxxxxx xxxxx xxx xxxxxxxx xxxxxxx xxx xxxxx xx xxxxxxxxx xxxx xxx xxxxxxxx xxxxxxxxxxx. Xxxxx party xxxxxxxx xxxxxxxxxx employed xx xxx xxxxxxxx xx xxxxxxxxxxx with XXXXXX2 (xxxx xxxxxxxx xxxxxxxx xxxx x&xxxx;Xxxxxxx Xxxxxx xx xxxxxxxx 2 xx xxx xxxxx xxxxxxx xx xxx TARGET2 self-certification xxxxxxxxxxx xxxxxxxx) xxxx xx xxxx xxxxx x&xxxx;xxxxxx agreement xxxx xxx xxxxx xxxxx. Xxxxxxxxxxx 1.9: Xxxxxx xxxxxxx Xxxxxx xx information assets xxxxx xx xxxxxxxxx xx xxx basis xx xxxxxxxx xxxxxxxxxxxx (xxxx-xx-xxxx&xxxx;(1)) xxx xxxxxxxxx xx the xxxxxxxxxxx xxxxxxxxx of corporate xxxxxxxx (including the xxxxxxxxxxx security xxxxxx). Xxxxx access xxxxxxx xxxxx xxxxx xx xxxxxxx xxxxx xx xxx xxxxxxxxx of xxxxx xxxxxxxxx&xxxx;(2) xx xxxxxxx closely the xxxxx xx the xxxxxxxxxxxxx xxxxxxxx and XX xxxxxxxxx. Xxxxx xxxxxxxx (x.x. xxx xxxxxx management) xxxxxxx xxxxxx xxxxxxx xxxxxx xx consistent with xxxxxxxx xxxxxx xxxxxxx xxxxxx xxxxx xxx xxxxxxxx compensatory xxxxxxxx xx place (e.g. xxxxxxxxxx, xxxxxxxx xxxx xxxxxxxxxxxxx). Xxxxxx xxx xxxxxxxxxx xxxxxxxxxx xxxxx xx xx place xx xxxxxxx xxx allocation xx xxxxxx xxxxxx xx information xxxxxxx xxx services xxxx xxxx xxxxxx xxx xxxxx xx the Xxxxxxx Transaction Chain. Xxx xxxxxxxxxx xxxxx xxxxx all xxxxxx xx the xxxxxxxxx xx user access, xxxx xxx xxxxxxx xxxxxxxxxxxx of xxx xxxxx to the xxxxx xxxxxxxxxxxxxx xx xxxxx xxxx xx xxxxxx xxxxxxx xxxxxx. Xxxxxxx xxxxxxxxx xxxxx be xxxxx, xxxxx appropriate, xx the allocation xx xxxxxx xxxxxx xx xxxx criticality xxxx the abuse xx xxxxx xxxxxx xxxxxx xxxxx lead xx x&xxxx;xxxxxx xxxxxxx xxxxxx xx the xxxxxxxxxx xx xxx xxxxxxxxxxx (e.g. xxxxxx xxxxxx xxxxxxxx xxxxxx xxxxxxxxxxxxxx, xxxxxxxx of xxxxxx controls, xxxxxx xxxxxx xx xxxxxxxx xxxx). Xxxxxxxxxxx xxxxxxxx shall xx xxx xx xxxxx xx identify, xxxxxxxxxxxx and xxxxxxxxx xxxxx at xxxxxxxx xxxxxx xx xxx xxxxxxxxxxxx’x xxxxxxx, e.g. xxx local and xxxxxx access xx xxxxxxx in xxx Xxxxxxx Xxxxxxxxxxx Xxxxx. Xxxxxxxx xxxxxxxx shall xxx be shared xx xxxxx to xxxxxx accountability. For xxxxxxxxx, xxxxx shall xx xxxxxxxxxxx xxx xxxxxxxx xx xxxxxxxx xxxxxxxx xx ensure xxxx xxxxxxxxx cannot xx xxxxxx guessed, x.x. xxxxxxxxxx xxxxx and xxxxxxx-xxxx validity. X&xxxx;xxxx xxxxxxxx recovery and/or xxxxx xxxxxxxx shall xx xxxxxxxxxxx. X&xxxx;xxxxxx xxxxx xx xxxxxxxxx and xxxxxxxxxxx on the xxx xx xxxxxxxxxxxxx xxxxxxxx xx xxxxxxx xxx confidentiality, xxxxxxxxxxxx xxx xxxxxxxxx xx xxxxxxxxxxx. A key xxxxxxxxxx xxxxxx xxxxx xx xxxxxxxxxxx xx support xxx xxx of xxxxxxxxxxxxx controls. There xxxxx xx policy for xxxxxxx xxxxxxxxxxxx xxxxxxxxxxx xx xxxxxx xx xx xxxxx (x.x. x&xxxx;xxxxx xxxxxx, a clear xxxx policy) xx xxxxxx xxx xxxx xx xxxxxxxxxxxx xxxxxx. Xxxx xxxxxxx remotely, the xxxxx xx xxxxxxx xx xx xxxxxxxxxxx xxxxxxxxxxx xxxxx be xxxxxxxxxx xxx appropriate xxxxxxxxx xxx xxxxxxxxxxxxxx xxxxxxxx shall be xxxxxxx. Xxxxxxxxxxx 1.10: Xxxxxxxxxxx xxxxxxx xxxxxxxxxxx, xxxxxxxxxxx xxx xxxxxxxxxxx Xxxxxxxx xxxxxxxxxxxx xxxxx be xxxxxxxxxx xxx xxxxxx prior xx xxx development xxx/xx xxxxxxxxxxxxxx xx xxxxxxxxxxx xxxxxxx. Xxxxxxxxxxx xxxxxxxx xxxxx xx built xxxx applications, including xxxx-xxxxxxxxx xxxxxxxxxxxx, xx xxxxxx xxxxxxx processing. Xxxxx xxxxxxxx xxxxx xxxxxxx xxx validation xx input xxxx, xxxxxxxx processing xxx xxxxxx xxxx. Additional xxxxxxxx may be xxxxxxxx for xxxxxxx xxxx process, xx xxxx xx xxxxxx xx, xxxxxxxxx, xxxxxxxx xx critical xxxxxxxxxxx. Xxxx controls shall xx xxxxxxxxxx on xxx basis of xxxxxxxx xxxxxxxxxxxx and xxxx xxxxxxxxxx according xx xxx xxxxxxxxxxx xxxxxxxx (e.g. xxxxxxxxxxx xxxxxxxx xxxxxx, xxxxxxxxxxxxx xxxxxxx xxxxxx). Xxx xxxxxxxxxxx xxxxxxxxxxxx xx new xxxxxxx xxxxx be xxxxxxxxxxx, documented xxx xxxxxx xxxxx xx xxxxx xxxxxxxxxx xxx xxx. Xx xxxxxxx xxxxxxx xxxxxxxx, xxxxxxxxxxx xxxxxxxx, xxxxxxxxx xxxxxxxxxxxx xxx xxxxxx xxxxxxxxxx, xxxxxx be xxxxxxxxxxx xxxxx xx xxx xxxxxxxxxxx xx xxxx xxxxx xxx xxx xxxxx xx xxxx xx xxx network xxxxx xx xxx xxxxxxxxxxxx. There xxxxx xx xxxxxxxx xxxxxxxx xx xxxxxxx sensitive xxxxxxxxxxx passing over xxxxxx xxxxxxxx. Xxxxxx xx xxxxxx xxxxx and xxxxxxx xxxxxx xxxx xxxxx xx controlled xxx IT xxxxxxxx xxx xxxxxxx xxxxxxxxxx xxxxxxxxx xx x&xxxx;xxxxxx xxxxxx. Xxxx shall xx taken xx xxxxx xxxxxxxx xx xxxxxxxxx data xx xxxx environments. Xxxxxxx xxx xxxxxxx xxxxxxxxxxxx xxxxx xx strictly xxxxxxxxxx. Xxxxxxxxxx xx xxxxxxx in production xxxxx xx xxxxxxxx xxxxxxxxxx. A risk xxxxxxxxxx xx the xxxxx xxxxxxx to xx xxxxxxxx xx xxxxxxxxxx xxxxx xx xxxxxxxxx. Xxxxxxx xxxxxxxx testing activities xx xxxxxxx in xxxxxxxxxx xxxxx xxxx xx xxxxxxxxx according xx x&xxxx;xxxxxxxxxx plan xxxxx xx the xxxxxxx xx x&xxxx;xxxx xxxxxxxxxx, xxx xxxxxxxx xxxxxxx shall xxxxxxx, xx xxxxx, vulnerability xxxxxxxxxxx. Xxx of xxx xxxxxxxxxxxx highlighted xxxxxx xxx xxxxxxxx xxxxxxx xxxxxxxxxx shall xx xxxxxxxx xxx xxxxxx plans to xxxxx xxx identified xxx shall xx xxxxxxxx and xxxxxxxx xx in a timely xxxxxxx. Xxxxxxxxxxx 1.11: Information xxxxxxxx xx supplier (3) xxxxxxxxxxxxx Xx xxxxxx protection xx xxx xxxxxxxxxxx’x xxxxxxxx information xxxxxxx xxxx are xxxxxxxxxx xx xxxxxxxxx, xxxxxxxxxxx xxxxxxxx xxxxxxxxxxxx xxx xxxxxxxxxx the xxxxx xxxxxxxxxx with supplier’s xxxxxx xxxxx xx xxxxxxxxxx xxx xxxxxxxx xxxxxx xxxx xxxx xxx xxxxxxxx. Xxxxxxxxxxx 1.12: Xxxxxxxxxx xx xxxxxxxxxxx xxxxxxxx xxxxxxxxx xxx xxxxxxxxxxxx Xx ensure x&xxxx;xxxxxxxxxx xxx xxxxxxxxx xxxxxxxx xx the management xx information security xxxxxxxxx, xxxxxxxxx xxxxxxxxxxxxx xx xxxxxxxx xxxxxx xxx xxxxxxxxxx, xxxxx, xxxxxxxxxxxxxxxx xxx xxxxxxxxxx, xx xxxxxxxx xxx xxxxxxxxx xxxxx, xxxxx xx established xxx xxxxxx to xxxxxx x&xxxx;xxxxx, effective xxx xxxxxxx and xxxxxx xxxxxxx xxxx xxxxxxxxxxx xxxxxxxx xxxxxxxxx including xxxxxxxxx related xx x&xxxx;xxxxx-xxxxxxx xxxxx (e.g. x&xxxx;xxxxx pursued xx xx xxxxxxxx xxxxxxxx xx by xx xxxxxxx). Personnel xxxxxxxx xx xxxxx procedures xxxxx xx adequately xxxxxxx. Xxxxxxxxxxx 1.13: Technical xxxxxxxxxx xxxxxx X&xxxx;xxxxxxxxxxx’x xxxxxxxx xxxxxxxxxxx xxxxxxx (x.x. xxxx xxxxxx xxxxxxx, xxxxxxxx xxxxxxxx and xxxxxxxx network xxxxxxxxxxxx) xxxxx xx regularly xxxxxxxx xxx compliance xxxx xxx organisation’s xxxxxxxxxxx framework xx xxxxxxxx (e.g. xxxxxxxxxxx xxxxxxxx xxxxxx, xxxxxxxxxxxxx xxxxxxx xxxxxx). Xxxxxxxxxxx 1.14: Xxxxxxxxxxxxxx Xxxxx xxxxxxx xxxxxxxx xxxxx xxxxxx xxxx xxx xxx xxxxxxxx xxxxxxxx that xxx xxx xxx physical xxxxxxxx xxx systems (x.x. xxxxxxxxx, logging). Xxxxxxxx relating xx xxxxxxxxxxx xxxx include: xxxxxxxxx of the xxxxxxxxxx xxx xxx xxxxxxx xxxxxxxxx xxxxxx, xxxxxxx patching, strict xxxxxxxxxx of xxxxxxxxx xxxxxxxxxxxx (x.x. production xxx development). Xxxxxxxxxxx xxxxxxxxxx, xxxxxxx xxx xxxxxxxxxx xx xxxx xx xxxxxxxx xx xxxxxx rights, xx xxxxxxxxxx xxx xxxx xxxxxxxxxx accounts, shall xx implemented based xx x&xxxx;xxxx xxxxxxxxxx. Xxxxx virtual xxxxxxxx xxxxxxx xx the xxxx hypervisor xxxxx xxxx a similar xxxx xxxxxxx. Xxxxxxxxxxx 1.15: Cloud xxxxxxxxx Xxx xxxxx of xxxxxx xxx/xx hybrid xxxxx solutions xx xxx Payment Xxxxxxxxxxx Xxxxx must xx xxxxx on x&xxxx;xxxxxx xxxx xxxxxxxxxx, xxxxxx xxxx xxxxxxx xxx xxxxxxxxx xxxxxxxx xxx xxx contractual xxxxxxx xxxxxxx xx xxx xxxxx xxxxxxxx. Xx hybrid xxxxx xxxxxxxxx are xxxx, it is xxxxxxxxxx xxxx xxx xxxxxxxxxxx xxxxx xx xxx overall xxxxxx xx the highest xxx of the xxxxxxxxx systems. All xx-xxxxxxxx xxxxxxxxxx xx xxx xxxxxx xxxxxxxxx xxxx xx segregated xxxx xxx xxxxx xx-xxxxxxxx xxxxxxx. Xxxxxxxx xxxxxxxxxx xxxxxxxxxx (xxxxxxxxxx xxxx xx xxxxxxxx xxxxxxxxxxxx) Xxx xxxxxxxxx xxxxxxxxxxxx (2.1 xx 2.6) xxxxxx xx xxxxxxxx xxxxxxxxxx xxxxxxxxxx. Xxxx TARGET2 xxxxxxxxxxx xxxxxxxxxx by xxx Xxxxxxxxxx xx xxxxx xxxxxxxx for xxx xxxxxx xxxxxxxxxxx xx xxx TARGET2 xxxxxx xxxxx have x&xxxx;xxxxxxxx xxxxxxxxxx xxxxxxxx xx place xxxxxxxxxx xxx xxxxxxxxx xxxxxxxx.
|
(1)&xxxx;&xxxx;Xxx xxxx-xx-xxxx xxxxxxxxx xxxxxx xx xxx xxxxxxxxxxxxxx xx xxx xxx xx xxxxxxxxxxx xxxx xx individual needs xxxxxx xx in xxxxx xx xxxxx xxx xxx/xxx duties.
(2) The xxxxxxxxx of least xxxxxxxxx refers xx xxxxxxxxx x&xxxx;xxxxxxx’x xxxxxx xxxxxxx xx xx XX xxxxxx xx xxxxx xx xxxxx xxx xxxxxxxxxxxxx business xxxx.
(3)&xxxx;&xxxx;X&xxxx;xxxxxxxx xx the xxxxxxx of xxxx xxxxxxxx xxxxxx xx xxxxxxxxxx xx xxx xxxxx party (xxx xxx xxxxxxxxx) xxxxx xx xxxxx contract (xxxxxxxxx), with xxx xxxxxxxxxxx, to provide x&xxxx;xxxxxxx and under xxx xxxxxxx xxxxxxxxx xxx xxxxx party (xxx its personnel) xx granted xxxxxx, xxxxxx xxxxxxxx xx xx-xxxx, xx xxxxxxxxxxx xxx/xx xxxxxxxxxxx systems xxx/xx information xxxxxxxxxx xxxxxxxxxx of xxx xxxxxxxxxxx xx xxxxx xx xxxxxxxxxx xx xxx xxxxx xxxxxxx xxxxx xxx xxxxxxxx xx xxx XXXXXX2 xxxx-xxxxxxxxxxxxx.
XXXXXXX II
Příloha II xxxxxxxxxx XXX/2007/7 xx xxxx takto:
|
1. |
Článek 1 xx xxxx xxxxx:
|
|
2. |
V čl. 4 xxxx.&xxxx;2 xx xxxxxxx xx) xxxxxxxxx tímto:
|
|
3. |
X&xxxx;xx.&xxxx;4 odst. 2 se xxxxxx xxxx písmeno xx), které xxx:
|
|
4. |
X&xxxx;xxxxxx&xxxx;4 xx odstavec 3 xxxxxxxxx tímto: „3. TARGET2 xxxxxxxx xxxx-xxxx xxxxx xxxxxxxxxx xxx xxxxxxxx xx xxxx, xxxx xxxxxxxxxx xx central xxxx xxxxx across XX xxxxxxxx, X2X XXXx xxx XXXX XXXx. XXXXXX2 xx xxxxxxxxxxx xxx xxxxxxxxx xx xxx basis of xxx SSP xxxxxxx xxxxx xxxxxxx xxxxxx xxx xxxxxxxxx and xxxxxxxxx xxx xxxxxxx xxxxx payments xxx xxxxxxxxxx xxxxxxxx xx xxx same xxxxxxxxx xxxxxx. Xx xxx xx xxx technical xxxxxxxxx xx xxx X2X XXXx xx xxxxxxxxx, TARGET2 xx xxxxxxxxxxx xxxxxxxxxxx and xxxxxxxxx xx xxx xxxxx of the X2X Xxxxxxxx. As xxx xx xxx xxxxxxxxx xxxxxxxxx of xxx XXXX DCAs xxx XXXX XX xxxxxxxxx xxxxxxxx is xxxxxxxxx, XXXXXX2 is xxxxxxxxxxx xxxxxxxxxxx and xxxxxxxxx on xxx xxxxx of xxx XXXX Xxxxxxxx. Xxx XXX xx xxx xxxxxxxx of xxxxxxxx xxxxx xxxxx Xxxxxxxxxx. Xxxx and xxxxxxxxx xx the SSP-providing XXXx xxx xxx 4XXx xxxxx be xxxxxxxxxx xxxx xxx xxxxxxxxx of xxx XXX, xxx xxxxx xx xxxxx xxxxxx xxxxxxxxx in xxxxxxxxxx xxxx Xxxxxxx&xxxx;21 xx xxxx Annex. Xxxxxxxxxxxxx xxxxxxxx xx xxxxx Xxxxxxxxxx xxxxx xxx xxxxxx a contractual relationship xxxxxxx X2X XXX xxxxxxx xxx xxx XXX-xxxxxxxxx XXXx xx xxx 4CBs xxxx xxx xx xxx xxxxxx xxxx in xxxx xxxxxxxx. Xxxxxxxxxxxx, xxxxxxxx or xxxxxxxxxxx xxxxx x&xxxx;X2X XXX xxxxxx xxxxxxxx xxxx, xx sends to, xxx SSP or X2X Platform xx xxxxxxxx xx the xxxxxxxx xxxxxxxx xxxxx xxxxx Xxxxxxxxxx xxx xxxxxx xx xx xxxxxxxx from, or xxxx xx, xxx XXX.“; |
|
5. |
X&xxxx;xxxxxx&xxxx;8 xx xxxxxxxx 3 xxxxxxxxx tímto: „3. Where xxx ECB has xxxxxxx x&xxxx;xxxxxxx xx x&xxxx;X2X XXX xxxxxx xxxxxxxx xx xxxxxxxxx 1, that X2X XXX holder is xxxxxx to xxxx xxxxx xxx participating XXX(x) a mandate xx xxxxx xxx X2X XXX xxxx xxx xxxxxxx xxxxxxxx xx xxxxxxxxxx xxxxxxxxxxxx xxxxxxxx xx those securities xxxxxxxx.“; |
|
6. |
X&xxxx;xxxxxx&xxxx;28 se xxxxxxxx 1 nahrazuje xxxxx: „1.&xxxx;&xxxx;&xxxx;X2X XXX xxxxxxx xxxxx xx xxxxxx xx xx aware xx, xxxxx xxxxxx with, xxx xxxxx xx xxxx xx xxxxxxxxxxx xxxx xxxxxxxxxx to xxx relevant competent xxxxxxxxxxx with all xxxxxxxxxxx on xxxx xxxxxxxx xx legislation xx xxxx xxxxxxxxxx. Xxxx xxxxx be xxxxxx to be xxxxx xx, and xxxxx comply xxxx xxx xxxxxxxxxxx xx xxxx relating xx xxxxxxxxxxx xx xxxxxxxxxx xx xxxxx laundering xxx the xxxxxxxxx xx xxxxxxxxx, xxxxxxxxxxxxx-xxxxxxxxx xxxxxxx activities and xxx xxxxxxxxxxx xx xxxxxxx xxxxxxx delivery xxxxxxx, xx xxxxxxxxxx xx xxxxx xx xxxxxxxxxxxx appropriate xxxxxxxx xxxxxxxxxx any xxxxxxxx xxxxxxx or xxxxxxxx xx xxxxx X2X XXXx. Xxxxx xx xxxxxxxx xxxx xxx xxxxxxxxxxx xxxxxxxxxxxx xxxx xxx T2S network xxxxxxx xxxxxxxx, X2X XXX xxxxxxx xxxxx xxxxxx xxxx xxxx xxx informed xxxxx xxx data retrieval xxxxxx.“; |
|
7. |
Xxxxxx&xxxx;30 xx nahrazuje xxxxx: „Xxxxxxx&xxxx;30 Xxxxxxxxxxx relationship with xx NSP 1. T2S XXX xxxxxxx shall xxxxxx:
2.&xxxx;&xxxx;&xxxx;Xxx xxxxx xxxxxxxxxxxx xxxxxxx x&xxxx;X2X XXX holder xxx xxx XXX xxxxx be exclusively xxxxxxxx by the xxxxx xxx xxxxxxxxxx xx xxx xxxxxxxx xxxxxxxx xxxxxxxxx xxxx xx NSP xx xxxxxxxx xx xx xxxxxxxxx 1(a). 3. The xxxxxxxx xx xx xxxxxxxx xx xxx XXX xxxxx xxx xxxx xxxx xx xxx xxxxxxxx xx xx xxxxxxxxx xx the XXX xx xxxxxxx xx XXXXXX2. 4.&xxxx;&xxxx;&xxxx;Xxx XXX xxxxx xxx be xxxxxx xxx any xxxx, xxxxxx or xxxxxxxxx xx xxx XXX (xxxxxxxxx its xxxxxxxxx, xxxxx xxx xxxxxxxxxxxxxx), or for xxx xxxx, xxxxxx xx xxxxxxxxx of xxxxx xxxxxxx xxxxxxxx xx xxxxxxxxxxxx xx xxxx xxxxxx xx xxx NSP’s xxxxxxx.“; |
|
8. |
Xxxxxx xx xxxx xxxxxx&xxxx;34x, xxxxx xxx: „Xxxxxxx&xxxx;34x Xxxxxxxxxxxx xxxxxxxxxx Xxxx xxx XXXXXX xxxxxx xx xxxxxxxxxxx xxx XXXXXX2 xxx xxxxxx xxxxxxxxx, T2S XXX xxxxxxx xxxxx xxxxxx X2X XXX xxxxxxx xx the TARGET xxxxxx.“; |
|
9. |
Xxxxxx xx pojem „X2X xxxxxxx xxxxxxx xxxxxxxx“ (x&xxxx;xxxxxxxxx xxxx xxxxxxx xxxxx) x&xxxx;xx.&xxxx;6 xxxx.&xxxx;1 písm. x) xxxx i), čl. 9 xxxx.&xxxx;5, xx.&xxxx;10 odst. 6, xx.&xxxx;14 xxxx.&xxxx;1 xxxx. x), xx.&xxxx;22 xxxx.&xxxx;1, xx.&xxxx;22 odst. 2, xx.&xxxx;22 xxxx.&xxxx;3, xx.&xxxx;27 xxxx.&xxxx;5, xx.&xxxx;28 xxxx.&xxxx;1, xx.&xxxx;29 xxxx.&xxxx;1 xxxxxxx II x&xxxx;x&xxxx;xxxxxxxx 1 xxxxxxx X&xxxx;xx nahrazují xxxxxxx „XXX“; |
|
10. |
X&xxxx;xxxxxxx X&xxxx;xx x&xxxx;xxxx.&xxxx;8 xxxxxxx. 4 xxxxxxxxx xxxxxxx x) xxxxx:
|
XXXXXXX III
Příloha III xxxxxxxxxx ECB/2007/7 xx xxxx xxxxx:
|
1. |
Xxxxxx na xxxxx „TIPS network xxxxxxx xxxxxxxx“ (v jednotném xxxx xxxxxxx xxxxx) x&xxxx;xxxx příloze se xxxxxxxxx odkazem „NSP“; |
|
2. |
Článek 1 xx xxxx xxxxx:
|
|
3. |
X&xxxx;xx.&xxxx;3 xxxx.&xxxx;1 xx zrušuje xxxxx xx „Xxxxxxxx X: XXXX connectivity xxxxxxxxx requirements“; |
|
4. |
Článek 4 xx xxxx xxxxx:
|
|
5. |
X&xxxx;xx.&xxxx;6 xxxx.&xxxx;1 xxxx. x) xx xxx x) nahrazuje xxxxx:
|
|
6. |
Xxxxxx&xxxx;9 xx xxxxxxxxx xxxxx: „Xxxxxxx&xxxx;9 Xxxxxxxxxxx xxxxxxxxxxxx with xx NSP 1. Participants xxxxx xxxxxx:
2.&xxxx;&xxxx;&xxxx;Xxx xxxxx xxxxxxxxxxxx xxxxxxx a participant xxx xxx XXX xxxxx xx exclusively xxxxxxxx by the xxxxx xxx conditions xx their xxxxxxxx xxxxxxxx as xxxxxxxx xx in xxxxxxxxx 1(x). 3.&xxxx;&xxxx;&xxxx;Xxx services to xx xxxxxxxx xx xxx NSP xxxxx xxx xxxx part xx xxx xxxxxxxx xx xx xxxxxxxxx xx xxx ECB xx xxxxxxx xx XXXXXX2. 4.&xxxx;&xxxx;&xxxx;Xxx ECB xxxxx xxx be xxxxxx xxx any acts, xxxxxx xx xxxxxxxxx xx xxx XXX (xxxxxxxxx xxx xxxxxxxxx, xxxxx xxx xxxxxxxxxxxxxx), xx xxx any xxxx, xxxxxx or xxxxxxxxx xx xxxxx xxxxxxx xxxxxxxx by xxxxxxxxxxxx to gain xxxxxx to xxx XXX’x xxxxxxx.“; |
|
7. |
Xxxxxx&xxxx;10 xx xxxxxxx; |
|
8. |
Xxxxxx xx nový xxxxxx&xxxx;11x, který xxx: „Xxxxxxx&xxxx;11x XXX xxxxxxxxxx 1.&xxxx;&xxxx;&xxxx;Xxx xxxxxxx XXX xxxxxxxxxx contains xxx xxxxx – IBAN xxxxxxx xxxxx xxx xxx purposes of xxx XXX xxxxxxx. 2.&xxxx;&xxxx;&xxxx;Xxxx xxxxx xxx xx xxxxxx to xxxx xxx XXXX. Xx XXXX xxx xx xxxxxx to xxx xx xxxxxxxx xxxxxxx. 3.&xxxx;&xxxx;&xxxx;Xxxxxxx&xxxx;29 xxxxx xxxxx xx xxx data xxxxxxxxx xx the XXX xxxxxxxxxx.“; |
|
9. |
X&xxxx;xxxxxx&xxxx;12 xx xxxxxxx xxxxxxxx 9; |
|
10. |
Xxxxxx&xxxx;16 xx xxxxxxxxx xxxxx: „Xxxxxxx&xxxx;16 Xxxxx xx xxxxxxx xxxxxx xx XXXX XXX Xxx xxxxxxxxx xxx xxxxxxxxxx as xxxxxxx xxxxxx xxx xxx xxxxxxxx xx xxx TIPS xxxxxxx:
|
|
11. |
X&xxxx;xxxxxx&xxxx;18 xx xxxxxxxx 6 xxxxxxxxx xxxxx: „6.&xxxx;&xxxx;&xxxx;Xxxxx a TIPS XXX xx PM xxxxxxxxx xxxxxxxx xxxxx, a TIPS XXX to XXXX XX xxxxxxxxx xxxxxxx xxxxxxxxx xxxxxxxx xxxxx xx x&xxxx;XXXX XX xxxxxxxxx account to XXXX DCA xxxxxxxxx xxxxxxxx xxxxx xxx xxxx xxxxxxxx xx xxxxxxxx to in Xxxxxxx&xxxx;17, xxx XXXXXX2-XXX xxxxx xxxxx xxxxxxx xxxxxxxxxx funds xxx xxxxxxxxx xx xxx xxxxx'x account. If xxxxxxxxxx xxxxx xxx xxx available xxx xxxxxxxxx xxxxxxxx xxxxx xxxxx xx rejected. Xx sufficient xxxxx xxx xxxxxxxxx xxx xxxxxxxxx transfer xxxxx xxxxx xx xxxxxxx xxxxxxxxxxx.“; |
|
12. |
X&xxxx;xx.&xxxx;20 xxxx.&xxxx;1 xx xxxxxxx b) xxxxxxxxx xxxxx:
|
|
13. |
X&xxxx;xxxxxx&xxxx;30 xx xxxxxxxx 1 nahrazuje tímto: „1. TIPS XXX holders xxxxx xx deemed to xx aware xx, xxxxx xxxxxx xxxx xxx shall xx xxxx to demonstrate xxxx xxxxxxxxxx to xxx relevant competent xxxxxxxxxxx xxxx xxx xxxxxxxxxxx on them xxxxxxxx xx xxxxxxxxxxx xx data xxxxxxxxxx. Xxxx xxxxx xx xxxxxx xx be xxxxx xx, xxx xxxxx xxxxxx xxxx xxx xxxxxxxxxxx xx xxxx relating to xxxxxxxxxxx xx prevention xx xxxxx laundering xxx the xxxxxxxxx xx terrorism, proliferation-sensitive xxxxxxx xxxxxxxxxx xxx xxx xxxxxxxxxxx xx xxxxxxx xxxxxxx delivery xxxxxxx, in particular xx terms xx xxxxxxxxxxxx xxxxxxxxxxx xxxxxxxx xxxxxxxxxx xxx xxxxxxxx xxxxxxx xx credited xx their TIPS XXXx. XXXX XXX xxxxxxx ensure xxxx xxxx are xxxxxxxx xxxxx xxxxx xxxxxx XXX'x xxxx xxxxxxxxx xxxxxx prior xx xxxxxxxx into x&xxxx;xxxxxxxxxxx xxxxxxxxxxxx xxxx xxxx XXX.“; |
|
14. |
Xxxxxx xx xxxx xxxxxx&xxxx;35x, který xxx: „Xxxxxxx&xxxx;35x Xxxxxxxxxxxx xxxxxxxxx Xxxx xxx XXXXXX xxxxxx xx xxxxxxxxxxx xxx the XXXXXX2 xxx xxxxxx xxxxxxxxx, XXXX XXX xxxxxxx xxxxx xxxxxx XXXX XXX xxxxxxx xx xxx XXXXXX system.“; |
|
15. |
V dodatku X&xxxx;xx xxxxxxx x&xxxx;xxxxxxxx 2 nahrazuje tímto:
|
|
16. |
X&xxxx;xxxxxxx X&xxxx;xx x&xxxx;xxxx.&xxxx;6 xxxxxxx. 1 xxxxxxxxx xxxxxxx x) xxxxx:
|
|
17. |
X&xxxx;xxxxxxx XX xx xxxxxxx xxxxxxxx 2; |
|
18. |
Xxxxxxx X&xxxx;xx xxxxxxx. |