XXXXXXXXXX XXXXXXXX XXXXXXXXX XXXXX (XX) 2021/1758
xx xxx 21.&xxxx;xxxx 2021,
kterým xx mění xxxxxxxxxx XXX/2007/7 x&xxxx;xxxxxxxxxx TARGET2-ECB (XXX/2021/43)
XXXXXXX XXXX XXXXXXXX XXXXXXXXX BANKY,
s ohledem na Xxxxxxx x&xxxx;xxxxxxxxx Xxxxxxxx xxxx, a zejména na xxxxx a čtvrtou xxxxxxx xx.&xxxx;127 xxxx.&xxxx;2 této xxxxxxx,
x&xxxx;xxxxxxx xx xxxxxx Xxxxxxxxxx xxxxxxx xxxxxxxxxxx xxxx a Evropské centrální xxxxx, x&xxxx;xxxxxxx xx xxxxxx&xxxx;11.6 x&xxxx;xxxxxx 17, 22 a 23 xxxxxx xxxxxxx,
xxxxxxxx k těmto xxxxxxx:
|
(1) |
Xxxx xxxxxxxxx xxxxxxx&xxxx;(1) xxx 20.&xxxx;xxxxxxxx 2021 obecné xxxxxx Xxxxxxxx xxxxxxxxx xxxxx XXX/2012/27&xxxx;(2) s cílem: x) xxxxxxxx, xx xxxxxxxx XXXX XXX xxxxx k TARGET2 xxxxxxxxx xxxxxxxxxxxxxxx xxxxxxxxxx xxxxxxx xxxxx xxxxxxxxxxxxxx Xxxxxxxxxxx (Xxxxxxxxxx Xxxxxx Xxxxxx Xxxxxxxxxxxxxx Xxxxxxx) od xxxxxxxxx 2021 x&xxxx;xxxxxxxx X2X XXX budou x&xxxx;XXXXXX2 xxxxxxxxxxxxxxx xxxxxx xxxxxxx připojeni xx xxxxxx 2022; x) xxxxxxxx x&xxxx;xxxxxxxx xxxxxxxx xxxxxxxx xx xxxxxxxxxx xxxxxxxxx xx xxxxxxxxxx xxxxxxxxx xxxx XXXXXX2, xxx se xxxxxxxxx, xx xx xxxxxx XXXXXX2 bude dále xxxxxxx xxx, xxx xxx schopen čelit xxxxxxx x&xxxx;xxxxxxx kybernetické xxxxxxxxxxx; c) xxxxxx xxxxxxxxx, aby majitelé xxxx XX, xxxxxx xxxxxxx xxxxxxxxx a adresovatelní xxxxxxxx kódu BIC, xxxxx přistoupili x&xxxx;xxxxxxxxxxx xxxxxxx XXX Xxxx xxxxxxxx xxxxxx o dodržování xxxxxxx xxx xxxxxxxx xxxxxxxxxxxxx xxxxxxx SEPA, xxxx x&xxxx;xxxxxxx trvale xxxxxxxxxxx na platformě XXXX xxxxxxxxxxxxxxx XXXX XXX, xxx aby xx xxxxxxxxx xxxxxxxxxx xxxxxxxxxx plateb x&xxxx;xxxx Xxxx; x) zavést xxxxxxxxxxxxxxx, xxxxx xxx x&xxxx;xxxxxxx převodu zůstatků x&xxxx;xxxx xxxxxxxxx x&xxxx;XXXXXX2 xx xxxxxxxxxxxx nástupnické xxxx x&xxxx;xxxxxxxx xxxxxxx XXXXXX, xxx xxxx xxxxxxxxx xxxxxx xxxxxxx, x&xxxx;x) xxxxxxxx a aktualizovat xxxxxxx xxxxx xxxxxxx xxxxxxxx xxxxx ECB/2012/27. |
|
(2) |
Jakmile xxxx zprovozněn xxxxxxx xxxxxxxxxxx X2-X2X, xxxx x&xxxx;xxxxx xxxxxx xxxxxxx xxxxxx nezbytné xxxxxxxx xxxxxxxxxxxxxxx, xxxxx xxx x&xxxx;xxxxxxx xxxxxxx xxxxxxxx x&xxxx;xxxx účastníků x&xxxx;XXXXXX2-XXX xx odpovídající xxxxxxxxxxx xxxx. |
|
(3) |
Xxxxx xxxxxxxx xxxxx XXX/2012/27, xxxxx xxxx xxxx xx xxxxxxxx XXXXXX2-XXX, xx xxxxx xxxxxxxxx x&xxxx;xxxxxxxxxx Xxxxxxxx xxxxxxxxx xxxxx XXX/2007/7&xxxx;(3). |
|
(4) |
Xxxxxxxxxx XXX/2007/7 xx xxxxx xxxxx xxxxxxxxxxxxx xxxxxxxx xxxxxx, |
XXXXXXX XXXX ROZHODNUTÍ:
Xxxxxx&xxxx;1
Xxxxx
Xxxxxxx I, II x&xxxx;XXX xxxxxxxxxx XXX/2007/7 xx xxxx v souladu x&xxxx;xxxxxxxxx xxxxxx xxxxxxxxxx.
Xxxxxx&xxxx;2
Xxxxxxxxx ustanovení
Toto rozhodnutí xxxxxxxx v platnost xxxxx xxxx xx xxxxxxxxxx x&xxxx;Xxxxxxx xxxxxxxx Xxxxxxxx xxxx.
Xxxxxxx se xxx xxx 21.&xxxx;xxxxxxxxx 2021, x&xxxx;xxxxxxxx xxxx.&xxxx;1 písm. x) x&xxxx;xxxxxxxx 7 x&xxxx;9 xxxxxxx XX xxxxxx xxxxxxxxxx, které xx xxxxxxx ode xxx 13. června 2022.
Xx Frankfurtu nad Xxxxxxx dne 21.&xxxx;xxxx 2021.
Xxxxxxxxxxx XXX
Xxxxxxxxx LAGARDE
(1) Obecné xxxxxx Xxxxxxxx centrální xxxxx (EU) 2021/1759 xx xxx 20.&xxxx;xxxxxxxx 2021, kterými xx xxxx xxxxxx zásady XXX/2012/27 o transevropském xxxxxxxxx xxxxxxxxxxxxxxx xxxxxxx zúčtování xxxxxx v reálném xxxx (XXXXXX2) (ECB/2021/30) [(xxx xxxxxx 45 x&xxxx;xxxxx xxxxx Úředního xxxxxxxx).
(2)&xxxx;&xxxx;Xxxxxx xxxxxx Xxxxxxxx xxxxxxxxx xxxxx XXX/2012/27 ze xxx 5. prosince 2012 x&xxxx;xxxxxxxxxxxxxx xxxxxxxxx automatizovaném xxxxxxx zúčtování plateb x&xxxx;xxxxxxx xxxx (XXXXXX2) (Xx. věst. X&xxxx;30, 30.1.2013, s. 1).
(3) Rozhodnutí Xxxxxxxx xxxxxxxxx xxxxx XXX/2007/7 xx xxx 24.&xxxx;xxxxxxxx 2007 o podmínkách XXXXXX2-XXX (Úř. xxxx. X&xxxx;237, 8.9.2007, s. 71).
PŘÍLOHA I
Příloha X&xxxx;xxxxxxxxxx XXX/2007/7 se xxxx xxxxx:
|
1. |
Xxxxxx&xxxx;1 xx xxxx xxxxx:
|
|
2. |
V článku 2 xxxxxx xxxxxxxx xx xxxxxxxx nový text, xxxxx xxx:
|
|
3. |
Xxxxxx&xxxx;3 xx xxxx xxxxx:
|
|
4. |
Xxxxxx&xxxx;5 xx xxxxxxxxx xxxxx: „Xxxxxxx&xxxx;5 Xxxxxx participants PM xxxxxxx xxxxxxx in XXXXXX2-XXX xxx xxxxxx xxxxxxxxxxxx xxx xxxxx xxxxxx xxxx xxx xxxxxxxxxxxx xxx xxx in Xxxxxxx&xxxx;8(1) xxx&xxxx;(2). Xxxx xxxxx xxxx at xxxxx xxx XX xxxxxxx xxxx the XXX. XX account xxxxxxx xxxx have xxxxxxx xx the XXX Inst xxxxxx xx xxxxxxx xxx XXXX Xxxxxxx Xxxxxx Xxxxxxxx Adherence Xxxxxxxxx xxxxx be and xxxxx remain xxxxxxxxx xx the XXXX Xxxxxxxx xx all xxxxx, either xx x&xxxx;XXXX XXX xxxxxx xx xx x&xxxx;xxxxxxxxx xxxxx xxx x&xxxx;XXXX XXX holder.“; |
|
5. |
Článek 22 xx xxxxxxxxx xxxxx: „Xxxxxxx&xxxx;22 Xxxxxxxx Xxxxxxxxxxxx xxx Xxxxxxx Xxxxxxxxxx 1.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx xxxxx xxxxxxxxx adequate xxxxxxxx controls to xxxxxxx xxxxx xxxxxxx xxxx xxxxxxxxxxxx xxxxxx xxx xxx. Participants xxxxx be xxxxxxxxxxx xxxxxxxxxxx xxx xxx xxxxxxxx xxxxxxxxxx xx xxx xxxxxxxxxxxxxxx, integrity xxx availability xx xxxxx xxxxxxx. 2.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx shall xxxxxx the ECB xx xxx security-related xxxxxxxxx xx xxxxx xxxxxxxxx xxxxxxxxxxxxxx xxx, xxxxx xxxxxxxxxxx, xxxxxxxx-xxxxxxx xxxxxxxxx xxxx xxxxx xx xxx technical xxxxxxxxxxxxxx xx xxx xxxxx xxxxx xxxxxxxxx. Xxx XXX xxx xxxxxxx further xxxxxxxxxxx xxxxx the incident xxx, xx xxxxxxxxx, xxxxxxx that the xxxxxxxxxxx xxxx xxxxxxxxxxx xxxxxxxx xx xxxxxxx x&xxxx;xxxxxxxxxx xx xxxx xx xxxxx. 3.&xxxx;&xxxx;&xxxx;Xxx ECB xxx xxxxxx additional xxxxxxxx xxxxxxxxxxxx, xx xxxxxxxxxx with xxxxxx xx cybersecurity or xxx xxxxxxxxxx xx xxxxx, xx all xxxxxxxxxxxx and/or xx xxxxxxxxxxxx xxxx are xxxxxxxxxx critical by xxx XXX. 4.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx xxxxx xxxxxxx xxx XXX xxxx: (x) permanent xxxxxx xx their xxxxxxxxxxx xx xxxxxxxxx xx their xxxxxx xxxxxxx service provider’s xxxxxxxx security xxxxxxxxxxxx, xxx (xx) xx xx xxxxxx xxxxx xxx XXXXXX2 xxxx-xxxxxxxxxxxxx xxxxxxxxx as xxxxxxxxx xx xxx XXX’x xxxxxxx xx Xxxxxxx. 4x.&xxxx;&xxxx;&xxxx;Xxx XXX xxxxx xxxxxx xxx xxxxxxxxxxx’x xxxx-xxxxxxxxxxxxx xxxxxxxxx(x) on xxx xxxxxxxxxxxx level xx xxxxxxxxxx xxxx xxxx xx the requirements xxx out xx xxx XXXXXX2 self-certification xxxxxxxxxxxx. These xxxxxxxxxxxx xxx xxxxxx in Xxxxxxxx XXX, xxxxx xx xxxxxxxx xx xxx xxxxx Xxxxxxxxxx xxxxxx xx Xxxxxxx&xxxx;2(1), xxxxx xxxx xx xxxxxxxx xxxx xx xxxxx Xxxxxxxxxx. 4x.&xxxx;&xxxx;&xxxx;Xxx xxxxxxxxxxx’x xxxxx of xxxxxxxxxx xxxx xxx xxxxxxxxxxxx xx xxx TARGET2 xxxx-xxxxxxxxxxxxx shall xx xxxxxxxxxxx as follows, xx xxxxxxxxxx xxxxx xx xxxxxxxx: ‘xxxx xxxxxxxxxx’; ‘xxxxx non-compliance’; xx ‘xxxxx xxx-xxxxxxxxxx’. Xxx xxxxxxxxx xxxxxxxx xxxxx: full xxxxxxxxxx xx xxxxxxx xxxxx xxxxxxxxxxxx xxxxxxx 100% xx xxx xxxxxxxxxxxx; xxxxx xxx-xxxxxxxxxx xx xxxxx a participant xxxxxxxxx xxxx than 100% xxx at xxxxx 66% xx the xxxxxxxxxxxx xxx major xxx-xxxxxxxxxx xxxxx x&xxxx;xxxxxxxxxxx xxxxxxxxx less xxxx 66% of the xxxxxxxxxxxx. Xx x&xxxx;xxxxxxxxxxx xxxxxxxxxxxx that x&xxxx;xxxxxxxx xxxxxxxxxxx is not xxxxxxxxxx to xx, xx xxxxx xx xxxxxxxxxx xx compliant xxxx xxx xxxxxxxxxx xxxxxxxxxxx xxx xxx xxxxxxxx xx xxx xxxxxxxxxxxxxx. X&xxxx;xxxxxxxxxxx xxxxx xxxxx xx xxxxx ‘xxxx compliance’ shall xxxxxx xx action xxxx demonstrating xxx xx xxxxxxx to xxxxx full xxxxxxxxxx. Xxx XXX xxxxx xxxxxx xxx xxxxxxxx xxxxxxxxxxx xxxxxxxxxxx xx xxx xxxxxx xx xxxx xxxxxxxxxxx’x xxxxxxxxxx. 4x.&xxxx;&xxxx;&xxxx;Xx xxx xxxxxxxxxxx xxxxxxx xx xxxxx xxxxxxxxx xxxxxx xx xxx xxxxxxxxxxx xx xxxxxxxxx xx xxxxx xxxxxx XXXx xxxxxxxx xxxxxxxx xxxxxxxxxxxx xx xxxx xxx xxxxxxx xxx XXXXXX2 xxxx-xxxxxxxxxxxxx xxx xxxxxxxxxxx’x xxxxx xx xxxxxxxxxx shall be xxxxxxxxxxx xx ‘major xxx-xxxxxxxxxx’. 4x.&xxxx;&xxxx;&xxxx;Xxx XXX xxxxx xxxxxxxx compliance xx xxxxxxxxxxxx on xx xxxxxx basis. 4e. The XXX xxx impose the xxxxxxxxx measures xx xxxxxxx xx xxxxxxxxxxxx xxxxx xxxxx of xxxxxxxxxx was xxxxxxxx xx xxxxx xx xxxxx xxx-xxxxxxxxxx, xx xxxxxxxxxx order xx xxxxxxxx:
|
|
6. |
X&xxxx;xxxxxx&xxxx;33 se odstavec 1 xxxxxxxxx tímto: „1. Participants xxxxx xx deemed xx xx aware xx, xxxxx xxxxxx xxxx, and xxxxx xx xxxx xx xxxxxxxxxxx xxxx xxxxxxxxxx xx xxx xxxxxxxx xxxxxxxxx authorities xxxx xxx xxxxxxxxxxx on xxxx xxxxxxxx xx xxxxxxxxxxx on data xxxxxxxxxx. They xxxxx xx deemed xx xx xxxxx xx, xxx xxxxx comply xxxx xxx xxxxxxxxxxx xx xxxx xxxxxxxx xx xxxxxxxxxxx on xxxxxxxxxx xx xxxxx xxxxxxxxxx xxx xxx xxxxxxxxx xx xxxxxxxxx, xxxxxxxxxxxxx-xxxxxxxxx nuclear activities xxx xxx development xx xxxxxxx xxxxxxx xxxxxxxx xxxxxxx, xx xxxxxxxxxx xx terms xx xxxxxxxxxxxx xxxxxxxxxxx xxxxxxxx concerning any xxxxxxxx xxxxxxx xx xxxxxxxx xx xxxxx XX xxxxxxxx. Xxxxxxxxxxxx xxxxx xxxxxx xxxx xxxx xxx informed xxxxx xxx XXXXXX2 xxxxxxx xxxxxxx provider’s xxxx xxxxxxxxx policy xxxxx to xxxxxxxx xxxx xxx contractual xxxxxxxxxxxx xxxx xxx XXXXXX2 xxxxxxx service xxxxxxxx.“; |
|
7. |
Xxxxxx se nový xxxxxx&xxxx;39x, xxxxx xxx: „Xxxxxxx&xxxx;39x Xxxxxxxxxxxx xxxxxxxxxx 1.&xxxx;&xxxx;&xxxx;Xxxx the TARGET xxxxxx xx xxxxxxxxxxx xxx TARGET2 xxx xxxxxx xxxxxxxxx, XX xxxxxxx balances xxxxx xx xxxxxxxxxxx xx xxx xxxxxxx holder’s xxxxxxxxxxxxx successor accounts xx xxx TARGET xxxxxx. 2.&xxxx;&xxxx;&xxxx;Xxx xxxxxxxxxxx xxxx XX xxxxxxx holders, xxxxxxxx Xxxxxxxxxxxx xxx xxxxxxxxxxx XXX xxxxxxx xxxxxxxx xx xxx XXX Xxxx scheme xx reachable xx xxx XXXX Platform xxxxxxxx to Xxxxxxx&xxxx;5 xxxxx xxxxx xx xx 25 Xxxxxxxx 2022.“; |
|
8. |
X&xxxx;xxxxxxx I se x&xxxx;xxxx.&xxxx;8 xxxxxxx. 4 nahrazuje xxxxxxx x) xxxxx:
|
|
9. |
X&xxxx;xxxxxxx XX xx v odstavci 6 xxxxxxxxx písmeno x) xxxxx:
|
|
10. |
Xxxxxxxx xx xxxx xxxxxxx XXX, který xxx: „Xxxxxxxx XXX Xxxxxxxxxxxx xxxxxxxxx xxxxxxxxxxx xxxxxxxx management xxx xxxxxxxx xxxxxxxxxx xxxxxxxxxx Xxxxxxxxxxx xxxxxxxx management These xxxxxxxxxxxx xxx applicable xx xxxx participant, xxxxxx the xxxxxxxxxxx xxxxxxxxxxxx that x&xxxx;xxxxxxxx xxxxxxxxxxx xx xxx xxxxxxxxxx xx xx. Xx xxxxxxxxxxxx xxx xxxxx xx xxxxxxxxxxx xx xxx xxxxxxxxxxxx xxxxxx xxx xxxxxxxxxxxxxx, xxx participant xxxxxx xxxxxxxx xxx elements xxxx xxx xxxx xx xxx Xxxxxxx Xxxxxxxxxxx Chain (PTC). Xxxxxxxxxxxx, xxx XXX xxxxxx at x&xxxx;Xxxxx xx Xxxxx (PoE), x.x. x&xxxx;xxxxxx xxxxxxxx xx xxx xxxxxxxx xx xxxxxxxxxxxx (x.x. xxxxxxxxxxxx, xxxxx-xxxxxx xxx xxxx-xxxxxx xxxxxxxxxxxx, middleware), xxx xxxx xx xxx xxxxxx xxxxxxxxxxx xx xxxx the xxxxxxx xx XXXXX (x.x. SWIFT XXX Xxx) or Xxxxxxxx (xxxx xxx xxxxxx xxxxxxxxxx xx Xxxxxxxx-xxxxx Xxxxxx). Xxxxxxxxxxx 1.1: Xxxxxxxxxxx xxxxxxxx xxxxxx Xxx xxxxxxxxxx xxxxx xxx x&xxxx;xxxxx xxxxxx xxxxxxxxx xx xxxx xxxx xxxxxxxx xxxxxxxxxx xxx demonstrate xxxxxxx xxx and xxxxxxxxxx to xxxxxxxxxxx xxxxxxxx xxxxxxx xxx xxxxxxxx, xxxxxxxx xxx xxxxxxxxxxx of xx xxxxxxxxxxx security policy xxxxxx xx xxxxxxxx xxxxxxxxxxx xxxxxxxx xxx xxxxx xxxxxxxxxx across xxx organisation xx xxxxx xx xxxxxxxxxxxxxx, xxxxxxxxxx xxx xxxxxxxxx xx information security xxx xxxxx xxxxxxxxxx xxxxx. Xxx xxxxxx xxxxxx xxxxxxx at xxxxx xxx xxxxxxxxx xxxxxxxx: objectives, xxxxx (xxxxxxxxx xxxxxxx xxxx xx xxxxxxxxxxxx, human xxxxxxxxx, xxxxx xxxxxxxxxx xxx.), xxxxxxxxxx xxx xxxxxxxxxx of xxxxxxxxxxxxxxxx. Xxxxxxxxxxx 1.2: Internal xxxxxxxxxxxx Xx xxxxxxxxxxx security framework xxxxx xx xxxxxxxxxxx xx xxxxxxxxx xxx xxxxxxxxxxx xxxxxxxx xxxxxx xxxxxx xxx xxxxxxxxxxxx. Xxx xxxxxxxxxx xxxxx xxxxxxxxxx xxx xxxxxx xxx xxxxxxxxxxxxx xx xxx information xxxxxxxx xxxxxxxxx xx ensure xxx xxxxxxxxxxxxxx of xxx xxxxxxxxxxx security xxxxxx (xx xxx Xxxxxxxxxxx 1.1) xxxxxx xxx xxxxxxxxxxxx, xxxxxxxxx xxx allocation of xxxxxxxxxx xxxxxxxxx and xxxxxxxxxx xx xxxxxxxx xxxxxxxxxxxxxxxx xxx this xxxxxxx. Xxxxxxxxxxx 1.3: External xxxxxxx Xxx xxxxxxxx xx xxx xxxxxxxxxxxx’x information xxx xxxxxxxxxxx processing xxxxxxxxxx xxxxxx xxx xx xxxxxxx by xxx introduction of, xxx/xx the xxxxxxxxxx xx, an xxxxxxxx xxxxx/xxxxxxx xx xxxxxxxx/xxxxxxxx xxxxxxxx by xxxx. Xxx xxxxxx to xxx xxxxxxxxxxxx’x information xxxxxxxxxx facilities xx xxxxxxxx parties xxxxx xx xxxxxxxxxx. Xxxx xxxxxxxx parties or xxxxxxxx/xxxxxxxx xx xxxxxxxx xxxxxxx xxx xxxxxxxx xx xxxxxx the xxxxxxxxxxxx’x information processing xxxxxxxxxx, x&xxxx;xxxx xxxxxxxxxx xxxxx xx xxxxxxx xxx to xxxxxxxxx xxx xxxxxxxx xxxxxxxxxxxx xxx control requirements. Xxxxxxxx shall be xxxxxx and xxxxxxx xx xx xxxxxxxxx xxxx each relevant xxxxxxxx xxxxx. Xxxxxxxxxxx 1.4: Xxxxx management All information xxxxxx, xxx xxxxxxxx xxxxxxxxx xxx xxx xxxxxxxxxx xxxxxxxxxxx xxxxxxx, xxxx xx xxxxxxxxx xxxxxxx, xxxxxxxxxxxxxxx, xxxxxxxx xxxxxxxxxxxx, xxx-xxx-xxxxx products, xxxxxxxx and xxxx-xxxxxxxxx xxxxxxxxxxxx, in the xxxxx of xxx Xxxxxxx Xxxxxxxxxxx Chain xxxxx xx accounted xxx and xxxx x&xxxx;xxxxxxxxx xxxxx. The xxxxxxxxxxxxxx xxx the xxxxxxxxxxx xxx xxx xxxxxxxxx xx xxxxxxxxxxx xxxxxxxx xx xxx xxxxxxxx processes and xxx xxxxxxx XX xxxxxxxxxx to xxxxxxxxx xxx xxxxxxxxxxx xxxxxx xxxxx be xxxxxxxx. Xxxx: xxx xxxxx xxx delegate the xxxxxxxxxxxxxx xx xxxxxxxx xxxxxxxx xx appropriate, xxx remains xxxxxxxxxxx xxx xxx xxxxxx xxxxxxxxxx xx xxx xxxxxx. Xxxxxxxxxxx 1.5: Xxxxxxxxxxx xxxxxx classification Information xxxxxx xxxxx xx xxxxxxxxxx xx terms of xxxxx criticality xx xxx xxxxxx xxxxxxxx xx xxx xxxxxxx xx xxx participant. Xxx classification xxxxx xxxxxxxx xxx xxxx, xxxxxxxxxx xxx xxxxxx xx xxxxxxxxxx xxxxxxxx xxxx xxxxxxxx xxx xxxxxxxxxxx xxxxx xx xxx xxxxxxxx xxxxxxxx xxxxxxxxx and xxxxx xxxx xxxx into xxxxxxxxxxxxx xxx underlying XX xxxxxxxxxx. Xx xxxxxxxxxxx xxxxx classification xxxxxx xxxxxxxx by xxx xxxxxxxxxx xxxxx xx xxxx xx xxxxxx xx xxxxxxxxxxx xxx xx xxxxxxxxxx xxxxxxxx throughout xxx xxxxxxxxxxx xxxxx xxxxxxxxx (xxxxxxxxx xxxxxxx xxx xxxxxxxxxxx of xxxxxxxxxxx xxxxxx) xxx to xxxxxxxxxxx xxx xxxx xxx specific xxxxxxxx xxxxxxxx. Xxxxxxxxxxx 1.6: Xxxxx xxxxxxxxx xxxxxxxx Xxxxxxxx xxxxxxxxxxxxxxxx xxxxx xx xxxxxxxxx xxxxx to xxxxxxxxxx xx adequate job xxxxxxxxxxxx and xx xxxxx and conditions xx employment. Xxx xxxxxxxxxx for xxxxxxxxxx, xxxxxxxxxxx xxx xxxxx xxxxx xxxxx xxxxx xx xxxxxxxxxx xxxxxxxx, xxxxxxxxxx xxx sensitive xxxx. Xxxxxxxxx, xxxxxxxxxxx xxx third xxxxx xxxxx xx xxxxxxxxxxx xxxxxxxxxx facilities xxxxx xxxx an xxxxxxxxx xx xxxxx security xxxxx xxx xxxxxxxxxxxxxxxx. Xx xxxxxxxx xxxxx xx xxxxxxxxx xxxxx xx ensured xxxxx xxx xxxxxxxxx, contractors xxx third xxxxx xxxxx, and education xxx training in xxxxxxxx procedures xxx xxx xxxxxxx use xx xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx shall xx xxxxxxxx xx them xx xxxxxxxx xxxxxxxx xxxxxxxx risks. X&xxxx;xxxxxx xxxxxxxxxxxx process xxx xxxxxxxx xxxxxxxx breaches xxxxx xx established xxx employees. Responsibilities xxxxx be xx xxxxx to xxxxxx xxxx xx xxxxxxxx’x, xxxxxxxxxx’x xx xxxxx xxxxx xxxx’x exit xxxx xx transfer xxxxxx xxx organisation xx xxxxxxx, xxx xxxx xxx return xx all xxxxxxxxx xxx the xxxxxxx xx xxx xxxxxx xxxxxx are xxxxxxxxx. Xxxxxxxxxxx 1.7: Xxxxxxxx xxx xxxxxxxxxxxxx xxxxxxxx Xxxxxxxx xx xxxxxxxxx xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx shall xx xxxxxx xx secure xxxxx, xxxxxxxxx xx xxxxxxx security xxxxxxxxxx, xxxx xxxxxxxxxxx xxxxxxxx xxxxxxxx and xxxxx xxxxxxxx. Xxxx xxxxx xx physically protected xxxx unauthorised access, xxxxxx xxx interference. Xxxxxx xxxxx be xxxxxxx only to xxxxxxxxxxx xxx xxxx xxxxxx xxx xxxxx xx Requirement 1.6. Xxxxxxxxxx xxx standards xxxxx be established xx xxxxxxx xxxxxxxx xxxxx xxxxxxxxxx xxxxxxxxxxx xxxxxx when xx xxxxxxx. Xxxxxxxxx xxxxx xx xxxxxxxxx from xxxxxxxx xxx xxxxxxxxxxxxx xxxxxxx. Xxxxxxxxxx of xxxxxxxxx (xxxxxxxxx equipment xxxx xxx-xxxx) and against xxx xxxxxxx xx xxxxxxxx xx xxxxxxxxx xx xxxxxx the xxxx of unauthorised xxxxxx to information xxx to guard xxxxxxx loss or xxxxxx xx equipment xx xxxxxxxxxxx. Special xxxxxxxx xxx xx xxxxxxxx to protect xxxxxxx xxxxxxxx xxxxxxx xxx xx xxxxxxxxx xxxxxxxxxx facilities xxxx xx xxx xxxxxxxxxx xxxxxx xxx cabling xxxxxxxxxxxxxx. Xxxxxxxxxxx 1.8: Xxxxxxxxxx xxxxxxxxxx Xxxxxxxxxxxxxxxx and procedures xxxxx xx xxxxxxxxxxx xxx the xxxxxxxxxx xxx xxxxxxxxx of xxxxxxxxxxx processing xxxxxxxxxx xxxxxxxx xxx xxx xxxxxxxxxx xxxxxxx xx xxx Xxxxxxx Transaction Xxxxx xxx-xx-xxx. Xx xxxxxxx xxxxxxxxx procedures, xxxxxxxxx xxxxxxxxx xxxxxxxxxxxxxx xx XX xxxxxxx, segregation xx xxxxxx shall xx implemented, where xxxxxxxxxxx, to xxxxxx xxx risk xx xxxxxxxxx xx deliberate xxxxxx xxxxxx. Xxxxx xxxxxxxxxxx xx xxxxxx xxxxxx xx xxxxxxxxxxx xxx xx documented xxxxxxxxx xxxxxxx, compensatory xxxxxxxx xxxxx xx xxxxxxxxxxx following x&xxxx;xxxxxx xxxx xxxxxxxx. Xxxxxxxx xxxxx xx xxxxxxxxxxx xx xxxxxxx xxx xxxxxx the xxxxxxxxxxxx xx xxxxxxxxx xxxx xxx systems in xxx Payment Xxxxxxxxxxx Xxxxx. Xxxxxxxx shall xx also established (xxxxxxxxx user awareness) xx xxxxxxx, xxxxxx xxx xxxxxx xxxxxxxxx xxxx. Xxxxxx xxxx xxxxx xx xxxx xxxx xxxx xxxxxxx xxxxxxx (x.x. signed Xxxxxxxxx COM components xxx Xxxx Xxxxxxx). Xxx xxxxxxxxxxxxx of xxx xxxxxxx (e.g. xxx xxx xx xxxxxxxxxx xxx xxxxxxx) xxxxx be xxxxxxxx xxxxxxxxxx. Xxxx backup xxx xxxxxxxx policies xxxxx xx xxxxxxxxxxx by xxx xxxxxxxxxx; those xxxxxxxx policies xxxxx xxxxxxx x&xxxx;xxxx xx xxx xxxxxxxxxxx process xxxxx xx xxxxxx xx xxxxxxx xxxxxxxxx xx xxxxx xxxxxxxx. Xxxxxxx xxxx xxx xxxxxxxx xxx xxx security xx payments xxxxx xx xxxxxxxxx xxx xxxxxx xxxxxxxx xx xxxxxxxxxxx xxxxxxxx shall xx recorded. Operator xxxx xxxxx xx xxxx xx xxxxxx xxxx xxxxxxxxxxx system xxxxxxxx xxx xxxxxxxxxx. Xxxxxxxx xxxx shall xx xxxxxxxxx reviewed xx x&xxxx;xxxxxx basis, xxxxx xx xxx xxxxxxxxxxx xx xxx xxxxxxxxxx. System xxxxxxxxxx xxxxx xx xxxx xx check xxx xxxxxxxxxxxxx of xxxxxxxx xxxxx xxx xxxxxxxxxx xx xxxxxxxx xxx xxx security xx xxxxxxxx xxx xx xxxxxx xxxxxxxxxx xx xx xxxxxx policy xxxxx. Xxxxxxxxx of xxxxxxxxxxx xxxxxxx organisations xxxxx xx based on x&xxxx;xxxxxx xxxxxxxx xxxxxx, xxxxxxx out in xxxx with xxxxxxxx xxxxxxxxxx among the xxxxxxxx xxxxxxx xxx xxxxx be xxxxxxxxx xxxx xxx relevant xxxxxxxxxxx. Xxxxx xxxxx xxxxxxxx xxxxxxxxxx xxxxxxxx xx xxx xxxxxxxx xx xxxxxxxxxxx xxxx XXXXXX2 (like xxxxxxxx xxxxxxxx from x&xxxx;Xxxxxxx Xxxxxx in xxxxxxxx 2 of xxx xxxxx xxxxxxx xx xxx TARGET2 xxxx-xxxxxxxxxxxxx xxxxxxxxxxx xxxxxxxx) xxxx xx xxxx under x&xxxx;xxxxxx xxxxxxxxx xxxx xxx xxxxx xxxxx. Xxxxxxxxxxx 1.9: Xxxxxx xxxxxxx Xxxxxx xx information xxxxxx xxxxx be justified xx xxx xxxxx xx xxxxxxxx xxxxxxxxxxxx (xxxx-xx-xxxx&xxxx;(1)) and according xx the xxxxxxxxxxx xxxxxxxxx xx xxxxxxxxx xxxxxxxx (xxxxxxxxx xxx xxxxxxxxxxx xxxxxxxx xxxxxx). Xxxxx xxxxxx xxxxxxx xxxxx xxxxx xx xxxxxxx xxxxx on xxx xxxxxxxxx xx xxxxx xxxxxxxxx&xxxx;(2) xx xxxxxxx closely the xxxxx xx xxx xxxxxxxxxxxxx business xxx XX xxxxxxxxx. Xxxxx xxxxxxxx (x.x. xxx xxxxxx management) xxxxxxx xxxxxx xxxxxxx xxxxxx xx xxxxxxxxxx xxxx xxxxxxxx access xxxxxxx xxxxxx there xxx xxxxxxxx compensatory xxxxxxxx xx xxxxx (e.g. xxxxxxxxxx, xxxxxxxx xxxx xxxxxxxxxxxxx). Xxxxxx xxx xxxxxxxxxx xxxxxxxxxx xxxxx xx xx xxxxx xx xxxxxxx xxx xxxxxxxxxx xx xxxxxx rights xx xxxxxxxxxxx xxxxxxx xxx services xxxx xxxx within xxx xxxxx xx xxx Xxxxxxx Transaction Chain. Xxx procedures xxxxx xxxxx all xxxxxx xx xxx xxxxxxxxx xx xxxx xxxxxx, xxxx xxx initial xxxxxxxxxxxx xx new xxxxx xx the xxxxx xxxxxxxxxxxxxx of xxxxx that xx xxxxxx require xxxxxx. Xxxxxxx xxxxxxxxx xxxxx be xxxxx, where appropriate, xx xxx xxxxxxxxxx xx xxxxxx rights xx xxxx criticality xxxx xxx xxxxx xx those access xxxxxx xxxxx xxxx xx a severe xxxxxxx xxxxxx on xxx xxxxxxxxxx of xxx xxxxxxxxxxx (x.x. xxxxxx xxxxxx allowing xxxxxx xxxxxxxxxxxxxx, override of xxxxxx xxxxxxxx, direct xxxxxx xx xxxxxxxx xxxx). Xxxxxxxxxxx xxxxxxxx xxxxx xx xxx xx xxxxx xx xxxxxxxx, xxxxxxxxxxxx xxx authorise xxxxx at specific xxxxxx xx the xxxxxxxxxxxx’x network, e.g. xxx xxxxx xxx xxxxxx xxxxxx xx xxxxxxx xx the Xxxxxxx Transaction Xxxxx. Xxxxxxxx xxxxxxxx xxxxx xxx xx xxxxxx xx order xx xxxxxx accountability. For passwords, xxxxx xxxxx be xxxxxxxxxxx xxx enforced xx specific controls xx xxxxxx xxxx xxxxxxxxx xxxxxx xx xxxxxx xxxxxxx, x.x. xxxxxxxxxx xxxxx xxx xxxxxxx-xxxx validity. A safe xxxxxxxx xxxxxxxx and/or xxxxx protocol xxxxx xx xxxxxxxxxxx. X&xxxx;xxxxxx xxxxx xx developed xxx xxxxxxxxxxx xx xxx xxx of xxxxxxxxxxxxx xxxxxxxx xx protect xxx xxxxxxxxxxxxxxx, xxxxxxxxxxxx xxx integrity xx xxxxxxxxxxx. X&xxxx;xxx xxxxxxxxxx xxxxxx shall xx xxxxxxxxxxx xx xxxxxxx xxx xxx of xxxxxxxxxxxxx xxxxxxxx. Xxxxx shall xx xxxxxx for xxxxxxx xxxxxxxxxxxx information xx screen xx xx print (x.x. x&xxxx;xxxxx xxxxxx, x&xxxx;xxxxx xxxx xxxxxx) to xxxxxx the xxxx xx xxxxxxxxxxxx xxxxxx. Xxxx xxxxxxx xxxxxxxx, xxx xxxxx xx working xx an xxxxxxxxxxx xxxxxxxxxxx shall xx xxxxxxxxxx xxx xxxxxxxxxxx xxxxxxxxx and xxxxxxxxxxxxxx xxxxxxxx xxxxx xx xxxxxxx. Xxxxxxxxxxx 1.10: Xxxxxxxxxxx xxxxxxx xxxxxxxxxxx, xxxxxxxxxxx xxx xxxxxxxxxxx Xxxxxxxx xxxxxxxxxxxx xxxxx be identified xxx xxxxxx xxxxx xx xxx xxxxxxxxxxx xxx/xx xxxxxxxxxxxxxx xx xxxxxxxxxxx xxxxxxx. Xxxxxxxxxxx xxxxxxxx xxxxx xx xxxxx xxxx xxxxxxxxxxxx, including xxxx-xxxxxxxxx xxxxxxxxxxxx, to xxxxxx correct xxxxxxxxxx. Xxxxx controls xxxxx xxxxxxx xxx xxxxxxxxxx xx xxxxx xxxx, xxxxxxxx xxxxxxxxxx xxx xxxxxx xxxx. Xxxxxxxxxx xxxxxxxx xxx xx xxxxxxxx xxx xxxxxxx xxxx xxxxxxx, or xxxx xx xxxxxx xx, xxxxxxxxx, xxxxxxxx xx xxxxxxxx information. Xxxx controls shall xx xxxxxxxxxx xx xxx xxxxx xx xxxxxxxx xxxxxxxxxxxx and xxxx assessment according xx xxx xxxxxxxxxxx xxxxxxxx (x.x. xxxxxxxxxxx xxxxxxxx policy, xxxxxxxxxxxxx xxxxxxx xxxxxx). Xxx xxxxxxxxxxx xxxxxxxxxxxx of new xxxxxxx xxxxx be xxxxxxxxxxx, xxxxxxxxxx xxx xxxxxx prior xx xxxxx xxxxxxxxxx xxx xxx. As xxxxxxx xxxxxxx security, xxxxxxxxxxx xxxxxxxx, including segmentation xxx xxxxxx management, xxxxxx xx xxxxxxxxxxx xxxxx xx xxx xxxxxxxxxxx xx xxxx xxxxx and the xxxxx xx xxxx xx xxx xxxxxxx xxxxx xx xxx xxxxxxxxxxxx. Xxxxx xxxxx xx xxxxxxxx xxxxxxxx xx xxxxxxx xxxxxxxxx xxxxxxxxxxx xxxxxxx xxxx xxxxxx xxxxxxxx. Xxxxxx to xxxxxx files xxx xxxxxxx xxxxxx code xxxxx xx xxxxxxxxxx xxx XX projects xxx support xxxxxxxxxx xxxxxxxxx xx a secure xxxxxx. Xxxx xxxxx xx xxxxx xx xxxxx exposure xx xxxxxxxxx xxxx in xxxx environments. Xxxxxxx xxx xxxxxxx xxxxxxxxxxxx xxxxx xx strictly xxxxxxxxxx. Xxxxxxxxxx xx xxxxxxx xx xxxxxxxxxx xxxxx be xxxxxxxx xxxxxxxxxx. X&xxxx;xxxx xxxxxxxxxx xx xxx major xxxxxxx xx xx xxxxxxxx in xxxxxxxxxx xxxxx xx xxxxxxxxx. Xxxxxxx xxxxxxxx xxxxxxx activities xx systems xx xxxxxxxxxx xxxxx also xx xxxxxxxxx xxxxxxxxx xx x&xxxx;xxxxxxxxxx xxxx xxxxx on the xxxxxxx of x&xxxx;xxxx xxxxxxxxxx, xxx xxxxxxxx xxxxxxx xxxxx xxxxxxx, xx least, vulnerability xxxxxxxxxxx. Xxx xx xxx shortcomings xxxxxxxxxxx xxxxxx xxx xxxxxxxx xxxxxxx xxxxxxxxxx xxxxx xx assessed xxx xxxxxx xxxxx to xxxxx xxx identified xxx xxxxx be xxxxxxxx xxx xxxxxxxx xx xx x&xxxx;xxxxxx xxxxxxx. Xxxxxxxxxxx 1.11: Xxxxxxxxxxx xxxxxxxx xx supplier (3) xxxxxxxxxxxxx Xx xxxxxx xxxxxxxxxx xx xxx xxxxxxxxxxx’x xxxxxxxx information xxxxxxx xxxx are accessible xx xxxxxxxxx, xxxxxxxxxxx xxxxxxxx xxxxxxxxxxxx for xxxxxxxxxx xxx xxxxx xxxxxxxxxx xxxx xxxxxxxx’x xxxxxx xxxxx xx xxxxxxxxxx and xxxxxxxx xxxxxx xxxx with xxx xxxxxxxx. Xxxxxxxxxxx 1.12: Xxxxxxxxxx of xxxxxxxxxxx xxxxxxxx xxxxxxxxx xxx xxxxxxxxxxxx Xx xxxxxx a consistent xxx effective xxxxxxxx xx xxx xxxxxxxxxx xx xxxxxxxxxxx xxxxxxxx xxxxxxxxx, xxxxxxxxx xxxxxxxxxxxxx xx xxxxxxxx xxxxxx xxx weaknesses, roles, xxxxxxxxxxxxxxxx xxx procedures, xx xxxxxxxx and xxxxxxxxx xxxxx, xxxxx xx xxxxxxxxxxx xxx xxxxxx xx ensure x&xxxx;xxxxx, xxxxxxxxx xxx xxxxxxx xxx xxxxxx xxxxxxx from xxxxxxxxxxx xxxxxxxx xxxxxxxxx including xxxxxxxxx related to x&xxxx;xxxxx-xxxxxxx cause (e.g. x&xxxx;xxxxx xxxxxxx xx xx external attacker xx xx xx xxxxxxx). Xxxxxxxxx xxxxxxxx xx xxxxx xxxxxxxxxx xxxxx xx xxxxxxxxxx xxxxxxx. Xxxxxxxxxxx 1.13: Xxxxxxxxx xxxxxxxxxx xxxxxx X&xxxx;xxxxxxxxxxx’x xxxxxxxx xxxxxxxxxxx systems (e.g. xxxx xxxxxx systems, xxxxxxxx xxxxxxxx xxx xxxxxxxx xxxxxxx xxxxxxxxxxxx) xxxxx xx xxxxxxxxx xxxxxxxx xxx xxxxxxxxxx xxxx xxx organisation’s xxxxxxxxxxx xxxxxxxxx xx xxxxxxxx (x.x. xxxxxxxxxxx xxxxxxxx policy, cryptographic xxxxxxx policy). Requirement 1.14: Xxxxxxxxxxxxxx Xxxxx virtual xxxxxxxx xxxxx xxxxxx xxxx xxx xxx xxxxxxxx xxxxxxxx xxxx xxx xxx for physical xxxxxxxx xxx xxxxxxx (x.x. xxxxxxxxx, xxxxxxx). Xxxxxxxx xxxxxxxx to xxxxxxxxxxx must xxxxxxx: xxxxxxxxx xx xxx xxxxxxxxxx xxx xxx xxxxxxx xxxxxxxxx xxxxxx, xxxxxxx xxxxxxxx, strict xxxxxxxxxx xx different xxxxxxxxxxxx (x.x. production xxx xxxxxxxxxxx). Centralised xxxxxxxxxx, xxxxxxx xxx xxxxxxxxxx xx xxxx xx xxxxxxxx xx xxxxxx rights, in xxxxxxxxxx xxx xxxx xxxxxxxxxx xxxxxxxx, xxxxx xx xxxxxxxxxxx based xx a risk xxxxxxxxxx. Xxxxx xxxxxxx machines xxxxxxx by the xxxx xxxxxxxxxx xxxxx xxxx a similar risk xxxxxxx. Xxxxxxxxxxx 1.15: Cloud xxxxxxxxx Xxx xxxxx of xxxxxx xxx/xx hybrid xxxxx xxxxxxxxx xx xxx Xxxxxxx Xxxxxxxxxxx Xxxxx xxxx xx xxxxx xx x&xxxx;xxxxxx xxxx assessment, xxxxxx xxxx xxxxxxx xxx xxxxxxxxx controls xxx xxx xxxxxxxxxxx xxxxxxx xxxxxxx to xxx xxxxx xxxxxxxx. Xx xxxxxx xxxxx xxxxxxxxx xxx xxxx, xx xx xxxxxxxxxx xxxx the xxxxxxxxxxx level xx xxx overall system xx xxx xxxxxxx xxx xx the xxxxxxxxx systems. Xxx xx-xxxxxxxx xxxxxxxxxx of xxx hybrid xxxxxxxxx xxxx xx segregated xxxx xxx xxxxx xx-xxxxxxxx xxxxxxx. Xxxxxxxx continuity xxxxxxxxxx (xxxxxxxxxx xxxx xx critical xxxxxxxxxxxx) Xxx xxxxxxxxx xxxxxxxxxxxx (2.1 xx 2.6) xxxxxx xx xxxxxxxx xxxxxxxxxx xxxxxxxxxx. Xxxx XXXXXX2 xxxxxxxxxxx classified xx xxx Xxxxxxxxxx as xxxxx xxxxxxxx xxx xxx xxxxxx xxxxxxxxxxx xx xxx XXXXXX2 xxxxxx xxxxx xxxx x&xxxx;xxxxxxxx xxxxxxxxxx strategy xx place xxxxxxxxxx xxx following elements.
|
(1)&xxxx;&xxxx;Xxx xxxx-xx-xxxx xxxxxxxxx refers xx the xxxxxxxxxxxxxx xx the set xx information xxxx xx individual xxxxx xxxxxx to in xxxxx xx carry xxx xxx/xxx xxxxxx.
(2)&xxxx;&xxxx;Xxx xxxxxxxxx xx xxxxx xxxxxxxxx refers to xxxxxxxxx x&xxxx;xxxxxxx’x xxxxxx xxxxxxx to xx XX system xx xxxxx to match xxx xxxxxxxxxxxxx xxxxxxxx xxxx.
(3)&xxxx;&xxxx;X&xxxx;xxxxxxxx in xxx xxxxxxx xx this xxxxxxxx xxxxxx be xxxxxxxxxx xx xxx xxxxx party (xxx xxx xxxxxxxxx) xxxxx xx under xxxxxxxx (xxxxxxxxx), xxxx xxx xxxxxxxxxxx, xx xxxxxxx x&xxxx;xxxxxxx xxx xxxxx xxx service xxxxxxxxx xxx xxxxx xxxxx (xxx its xxxxxxxxx) xx granted xxxxxx, xxxxxx remotely or xx-xxxx, to xxxxxxxxxxx xxx/xx xxxxxxxxxxx xxxxxxx xxx/xx xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx of the xxxxxxxxxxx xx xxxxx xx associated to xxx xxxxx xxxxxxx xxxxx xxx xxxxxxxx xx xxx TARGET2 xxxx-xxxxxxxxxxxxx.
XXXXXXX II
Příloha II xxxxxxxxxx XXX/2007/7 xx xxxx takto:
|
1. |
Článek 1 xx xxxx takto:
|
|
2. |
X&xxxx;xx.&xxxx;4 xxxx.&xxxx;2 xx xxxxxxx fc) xxxxxxxxx tímto:
|
|
3. |
X&xxxx;xx.&xxxx;4 xxxx.&xxxx;2 xx xxxxxx xxxx xxxxxxx xx), xxxxx xxx:
|
|
4. |
X&xxxx;xxxxxx&xxxx;4 xx xxxxxxxx 3 xxxxxxxxx xxxxx: „3.&xxxx;&xxxx;&xxxx;XXXXXX2 xxxxxxxx xxxx-xxxx xxxxx settlement xxx xxxxxxxx xx xxxx, with xxxxxxxxxx xx xxxxxxx xxxx xxxxx xxxxxx PM xxxxxxxx, T2S XXXx xxx XXXX XXXx. XXXXXX2 xx established xxx xxxxxxxxx on xxx xxxxx xx xxx XXX xxxxxxx xxxxx xxxxxxx orders xxx submitted and xxxxxxxxx and xxxxxxx xxxxx payments are xxxxxxxxxx xxxxxxxx xx xxx xxxx xxxxxxxxx xxxxxx. Xx far xx the xxxxxxxxx xxxxxxxxx xx the X2X XXXx xx xxxxxxxxx, XXXXXX2 xx xxxxxxxxxxx xxxxxxxxxxx xxx xxxxxxxxx xx xxx xxxxx xx xxx X2X Platform. Xx xxx xx the xxxxxxxxx operation xx xxx TIPS XXXx xxx TIPS XX xxxxxxxxx xxxxxxxx xx xxxxxxxxx, TARGET2 xx xxxxxxxxxxx xxxxxxxxxxx and xxxxxxxxx on xxx xxxxx xx xxx XXXX Xxxxxxxx. Xxx XXX xx xxx xxxxxxxx of services xxxxx xxxxx Conditions. Xxxx xxx omissions xx the SSP-providing XXXx xxx the 4XXx xxxxx xx xxxxxxxxxx acts xxx xxxxxxxxx xx the XXX, xxx xxxxx xx xxxxx xxxxxx xxxxxxxxx in xxxxxxxxxx xxxx Xxxxxxx&xxxx;21 xx xxxx Xxxxx. Participation xxxxxxxx to xxxxx Xxxxxxxxxx xxxxx not xxxxxx a contractual relationship xxxxxxx X2X DCA xxxxxxx and xxx XXX-xxxxxxxxx XXXx xx xxx 4CBs when xxx xx xxx xxxxxx acts xx xxxx xxxxxxxx. Xxxxxxxxxxxx, xxxxxxxx or xxxxxxxxxxx xxxxx a T2S XXX xxxxxx xxxxxxxx from, xx sends xx, xxx XXX xx X2X Platform in xxxxxxxx to the xxxxxxxx xxxxxxxx xxxxx xxxxx Conditions xxx xxxxxx to xx xxxxxxxx xxxx, xx xxxx xx, the XXX.“; |
|
5. |
X&xxxx;xxxxxx&xxxx;8 xx xxxxxxxx 3 nahrazuje xxxxx: „3.&xxxx;&xxxx;&xxxx;Xxxxx xxx XXX xxx xxxxxxx a request by x&xxxx;X2X XXX holder xxxxxxxx to xxxxxxxxx 1, that X2X XXX xxxxxx is xxxxxx xx xxxx xxxxx the xxxxxxxxxxxxx XXX(x) a mandate to xxxxx xxx X2X XXX with the xxxxxxx xxxxxxxx xx xxxxxxxxxx transactions xxxxxxxx xx xxxxx securities xxxxxxxx.“; |
|
6. |
X&xxxx;xxxxxx&xxxx;28 se xxxxxxxx 1 nahrazuje tímto: „1. T2S XXX holders shall xx xxxxxx to xx xxxxx of, xxxxx comply xxxx, xxx xxxxx xx xxxx to xxxxxxxxxxx xxxx xxxxxxxxxx xx xxx xxxxxxxx xxxxxxxxx xxxxxxxxxxx with xxx xxxxxxxxxxx xx xxxx xxxxxxxx xx legislation xx data xxxxxxxxxx. Xxxx shall be xxxxxx xx be xxxxx of, xxx xxxxx xxxxxx with xxx obligations xx xxxx relating to xxxxxxxxxxx on prevention xx xxxxx xxxxxxxxxx xxx xxx xxxxxxxxx xx xxxxxxxxx, xxxxxxxxxxxxx-xxxxxxxxx xxxxxxx xxxxxxxxxx and xxx xxxxxxxxxxx xx xxxxxxx xxxxxxx xxxxxxxx xxxxxxx, in xxxxxxxxxx xx xxxxx xx xxxxxxxxxxxx appropriate xxxxxxxx xxxxxxxxxx xxx payments xxxxxxx xx credited xx their X2X XXXx. Prior xx xxxxxxxx xxxx xxx xxxxxxxxxxx xxxxxxxxxxxx xxxx xxx X2X network xxxxxxx provider, X2X XXX holders xxxxx xxxxxx xxxx they xxx xxxxxxxx xxxxx xxx xxxx retrieval xxxxxx.“; |
|
7. |
Xxxxxx&xxxx;30 se xxxxxxxxx xxxxx: „Xxxxxxx&xxxx;30 Xxxxxxxxxxx relationship xxxx xx XXX 1.&xxxx;&xxxx;&xxxx;X2X XXX xxxxxxx xxxxx either:
2. The xxxxx relationship xxxxxxx x&xxxx;X2X XXX xxxxxx xxx xxx XXX xxxxx xx exclusively xxxxxxxx by the xxxxx xxx xxxxxxxxxx xx xxx separate xxxxxxxx xxxxxxxxx xxxx xx XXX as xxxxxxxx xx xx xxxxxxxxx 1(a). 3. The xxxxxxxx xx xx xxxxxxxx xx the NSP xxxxx xxx xxxx xxxx of xxx xxxxxxxx to be xxxxxxxxx by xxx XXX in xxxxxxx xx XXXXXX2. 4.&xxxx;&xxxx;&xxxx;Xxx XXX xxxxx xxx be xxxxxx xxx any xxxx, xxxxxx xx xxxxxxxxx of xxx XXX (xxxxxxxxx xxx xxxxxxxxx, staff xxx xxxxxxxxxxxxxx), xx xxx xxx xxxx, errors xx xxxxxxxxx xx xxxxx xxxxxxx xxxxxxxx xx xxxxxxxxxxxx to xxxx access to xxx NSP’s xxxxxxx.“; |
|
8. |
Xxxxxx xx nový článek 34a, xxxxx zní: „Article 34a Transitional xxxxxxxxxx Xxxx xxx XXXXXX system xx xxxxxxxxxxx xxx XXXXXX2 xxx xxxxxx xxxxxxxxx, X2X XXX xxxxxxx xxxxx xxxxxx X2X XXX holders xx xxx XXXXXX xxxxxx.“; |
|
9. |
Xxxxxx xx xxxxx „X2X xxxxxxx xxxxxxx xxxxxxxx“ (x&xxxx;xxxxxxxxx nebo xxxxxxx xxxxx) x&xxxx;xx.&xxxx;6 xxxx.&xxxx;1 písm. x) xxxx x), čl. 9 xxxx.&xxxx;5, xx.&xxxx;10 odst. 6, xx.&xxxx;14 xxxx.&xxxx;1 xxxx. x), xx.&xxxx;22 odst. 1, xx.&xxxx;22 xxxx.&xxxx;2, čl. 22 xxxx.&xxxx;3, čl. 27 xxxx.&xxxx;5, xx.&xxxx;28 xxxx.&xxxx;1, xx.&xxxx;29 xxxx.&xxxx;1 xxxxxxx XX x&xxxx;x&xxxx;xxxxxxxx 1 dodatku X&xxxx;xx xxxxxxxxx odkazem „XXX“; |
|
10. |
X&xxxx;xxxxxxx X&xxxx;xx x&xxxx;xxxx.&xxxx;8 xxxxxxx. 4 xxxxxxxxx xxxxxxx x) xxxxx:
|
XXXXXXX III
Příloha III xxxxxxxxxx ECB/2007/7 xx xxxx takto:
|
1. |
Odkazy na xxxxx „TIPS network xxxxxxx xxxxxxxx“ (x&xxxx;xxxxxxxxx xxxx množném čísle) x&xxxx;xxxx xxxxxxx se xxxxxxxxx odkazem „NSP“; |
|
2. |
Článek 1 xx mění xxxxx:
|
|
3. |
V čl. 3 xxxx.&xxxx;1 xx zrušuje xxxxx xx „Xxxxxxxx X: XXXX xxxxxxxxxxxx xxxxxxxxx requirements“; |
|
4. |
Článek 4 xx xxxx takto:
|
|
5. |
X&xxxx;xx.&xxxx;6 xxxx.&xxxx;1 písm. x) xx xxx x) xxxxxxxxx xxxxx:
|
|
6. |
Xxxxxx&xxxx;9 xx xxxxxxxxx xxxxx: „Xxxxxxx&xxxx;9 Xxxxxxxxxxx relationship with xx XXX 1.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx xxxxx xxxxxx:
2.&xxxx;&xxxx;&xxxx;Xxx legal xxxxxxxxxxxx between x&xxxx;xxxxxxxxxxx xxx the XXX xxxxx xx xxxxxxxxxxx xxxxxxxx xx the xxxxx xxx xxxxxxxxxx xx xxxxx xxxxxxxx xxxxxxxx xx xxxxxxxx xx xx paragraph 1(x). 3.&xxxx;&xxxx;&xxxx;Xxx services xx xx xxxxxxxx xx xxx NSP xxxxx xxx xxxx part xx the xxxxxxxx xx be performed xx the XXX xx respect xx XXXXXX2. 4.&xxxx;&xxxx;&xxxx;Xxx ECB shall xxx xx liable xxx any acts, xxxxxx xx xxxxxxxxx xx xxx XXX (xxxxxxxxx its xxxxxxxxx, xxxxx xxx xxxxxxxxxxxxxx), xx xxx xxx xxxx, errors or xxxxxxxxx xx third xxxxxxx selected xx xxxxxxxxxxxx to xxxx xxxxxx to xxx XXX’x network.“; |
|
7. |
Článek 10 xx xxxxxxx; |
|
8. |
Xxxxxx xx xxxx xxxxxx&xxxx;11x, xxxxx zní: „Article 11a MPL xxxxxxxxxx 1.&xxxx;&xxxx;&xxxx;Xxx xxxxxxx XXX xxxxxxxxxx contains the xxxxx – XXXX xxxxxxx table xxx xxx xxxxxxxx xx xxx XXX xxxxxxx. 2.&xxxx;&xxxx;&xxxx;Xxxx xxxxx xxx be xxxxxx xx only xxx XXXX. Xx XXXX xxx xx xxxxxx to xxx xx xxxxxxxx xxxxxxx. 3.&xxxx;&xxxx;&xxxx;Xxxxxxx&xxxx;29 xxxxx xxxxx xx xxx xxxx contained xx xxx XXX xxxxxxxxxx.“; |
|
9. |
X&xxxx;xxxxxx&xxxx;12 se xxxxxxx xxxxxxxx 9; |
|
10. |
Xxxxxx&xxxx;16 xx xxxxxxxxx tímto: „Article 16 Types xx xxxxxxx orders in XXXX DCA The following xxx xxxxxxxxxx xx xxxxxxx xxxxxx xxx xxx purposes of xxx TIPS xxxxxxx:
|
|
11. |
V článku 18 se xxxxxxxx 6 xxxxxxxxx xxxxx: „6.&xxxx;&xxxx;&xxxx;Xxxxx a TIPS DCA xx XX xxxxxxxxx xxxxxxxx xxxxx, x&xxxx;XXXX XXX to XXXX XX technical xxxxxxx xxxxxxxxx transfer xxxxx xx x&xxxx;XXXX XX xxxxxxxxx xxxxxxx xx XXXX XXX xxxxxxxxx xxxxxxxx xxxxx xxx xxxx accepted xx xxxxxxxx to xx Xxxxxxx&xxxx;17, the XXXXXX2-XXX xxxxx check xxxxxxx xxxxxxxxxx xxxxx are xxxxxxxxx on the xxxxx'x xxxxxxx. Xx xxxxxxxxxx xxxxx are xxx xxxxxxxxx xxx xxxxxxxxx xxxxxxxx xxxxx xxxxx xx xxxxxxxx. Xx sufficient xxxxx xxx available the xxxxxxxxx xxxxxxxx order xxxxx xx xxxxxxx xxxxxxxxxxx.“; |
|
12. |
X&xxxx;xx.&xxxx;20 xxxx.&xxxx;1 xx xxxxxxx b) xxxxxxxxx xxxxx:
|
|
13. |
X&xxxx;xxxxxx&xxxx;30 xx odstavec 1 nahrazuje tímto: „1. TIPS XXX holders shall xx xxxxxx to xx xxxxx of, xxxxx xxxxxx xxxx xxx shall be xxxx to demonstrate xxxx xxxxxxxxxx xx xxx xxxxxxxx competent xxxxxxxxxxx xxxx xxx xxxxxxxxxxx on them xxxxxxxx xx legislation xx xxxx xxxxxxxxxx. Xxxx shall xx xxxxxx xx xx xxxxx xx, xxx xxxxx comply with xxx xxxxxxxxxxx xx xxxx xxxxxxxx to xxxxxxxxxxx on xxxxxxxxxx xx xxxxx laundering xxx xxx xxxxxxxxx xx terrorism, proliferation-sensitive xxxxxxx activities xxx xxx development xx xxxxxxx xxxxxxx xxxxxxxx xxxxxxx, xx xxxxxxxxxx xx xxxxx of xxxxxxxxxxxx xxxxxxxxxxx xxxxxxxx xxxxxxxxxx xxx xxxxxxxx xxxxxxx xx xxxxxxxx xx xxxxx XXXX XXXx. XXXX DCA xxxxxxx xxxxxx that xxxx xxx xxxxxxxx xxxxx xxxxx chosen XXX'x data xxxxxxxxx xxxxxx xxxxx xx xxxxxxxx into a contractual xxxxxxxxxxxx with xxxx XXX.“; |
|
14. |
Xxxxxx xx nový xxxxxx&xxxx;35x, xxxxx xxx: „Xxxxxxx&xxxx;35x Xxxxxxxxxxxx xxxxxxxxx Xxxx the TARGET xxxxxx xx operational xxx the XXXXXX2 xxx ceased xxxxxxxxx, XXXX XXX xxxxxxx xxxxx xxxxxx XXXX XXX xxxxxxx xx xxx XXXXXX xxxxxx.“; |
|
15. |
X&xxxx;xxxxxxx X&xxxx;xx tabulka x&xxxx;xxxxxxxx 2 xxxxxxxxx xxxxx:
|
|
16. |
X&xxxx;xxxxxxx I se x&xxxx;xxxx.&xxxx;6 xxxxxxx. 1 nahrazuje xxxxxxx x) tímto:
|
|
17. |
X&xxxx;xxxxxxx XX xx zrušuje xxxxxxxx 2; |
|
18. |
Xxxxxxx X&xxxx;xx xxxxxxx. |