XXXXXXXXXX XXXXXXXX CENTRÁLNÍ XXXXX (XX) 2021/1758
xx xxx 21.&xxxx;xxxx 2021,
xxxxxx xx mění rozhodnutí XXX/2007/7 x&xxxx;xxxxxxxxxx TARGET2-ECB (XXX/2021/43)
XXXXXXX XXXX EVROPSKÉ XXXXXXXXX XXXXX,
x&xxxx;xxxxxxx na Xxxxxxx o fungování Evropské xxxx, a zejména na xxxxx a čtvrtou xxxxxxx xx.&xxxx;127 xxxx.&xxxx;2 xxxx xxxxxxx,
x&xxxx;xxxxxxx na statut Xxxxxxxxxx xxxxxxx xxxxxxxxxxx xxxx x&xxxx;Xxxxxxxx centrální xxxxx, x&xxxx;xxxxxxx xx xxxxxx&xxxx;11.6 x&xxxx;xxxxxx 17, 22 x&xxxx;23 tohoto xxxxxxx,
xxxxxxxx k těmto xxxxxxx:
|
(1) |
Xxxx xxxxxxxxx xxxxxxx&xxxx;(1) xxx 20.&xxxx;xxxxxxxx 2021 xxxxxx xxxxxx Xxxxxxxx xxxxxxxxx xxxxx XXX/2012/27&xxxx;(2) x&xxxx;xxxxx: x) xxxxxxxx, xx xxxxxxxx XXXX XXX xxxxx x&xxxx;XXXXXX2 xxxxxxxxx xxxxxxxxxxxxxxx xxxxxxxxxx xxxxxxx xxxxx xxxxxxxxxxxxxx Xxxxxxxxxxx (Xxxxxxxxxx Xxxxxx Xxxxxx Xxxxxxxxxxxxxx Xxxxxxx) xx xxxxxxxxx 2021 a majitelé X2X DCA xxxxx x&xxxx;XXXXXX2 prostřednictvím xxxxxx xxxxxxx připojeni xx xxxxxx 2022; x) xxxxxxxx a rozšířit pravidla xxxxxxxx xx xxxxxxxxxx xxxxxxxxx xx xxxxxxxxxx xxxxxxxxx xxxx XXXXXX2, xxx xx xxxxxxxxx, xx xx xxxxxx XXXXXX2 bude xxxx xxxxxxx tak, xxx xxx xxxxxxx čelit xxxxxxx x&xxxx;xxxxxxx xxxxxxxxxxxx xxxxxxxxxxx; x) xxxxxx xxxxxxxxx, aby xxxxxxxx xxxx XX, xxxxxx xxxxxxx účastníci x&xxxx;xxxxxxxxxxxxx xxxxxxxx xxxx XXX, xxxxx xxxxxxxxxxx x&xxxx;xxxxxxxxxxx xxxxxxx XXX Inst xxxxxxxx xxxxxx o dodržování xxxxxxx xxx xxxxxxxx xxxxxxxxxxxxx převody XXXX, xxxx x&xxxx;xxxxxxx xxxxxx xxxxxxxxxxx xx xxxxxxxxx XXXX xxxxxxxxxxxxxxx XXXX XXX, xxx xxx xx zajistila xxxxxxxxxx xxxxxxxxxx xxxxxx v celé Xxxx; d) zavést xxxxxxxxxxxxxxx, xxxxx xxx x&xxxx;xxxxxxx xxxxxxx xxxxxxxx x&xxxx;xxxx účastníků x&xxxx;XXXXXX2 xx xxxxxxxxxxxx xxxxxxxxxxx xxxx v budoucím systému XXXXXX, xxx xxxx xxxxxxxxx právní xxxxxxx, x&xxxx;x) vyjasnit x&xxxx;xxxxxxxxxxxx xxxxxxx další aspekty xxxxxxxx zásad XXX/2012/27. |
|
(2) |
Xxxxxxx xxxx xxxxxxxxxx xxxxxxx xxxxxxxxxxx X2-X2X, xxxx x&xxxx;xxxxx xxxxxx xxxxxxx xxxxxx xxxxxxxx xxxxxxxx xxxxxxxxxxxxxxx, xxxxx xxx x&xxxx;xxxxxxx xxxxxxx zůstatků x&xxxx;xxxx xxxxxxxxx v TARGET2-ECB xx xxxxxxxxxxxx xxxxxxxxxxx xxxx. |
|
(3) |
Xxxxx obecných xxxxx XXX/2012/27, xxxxx mají xxxx xx xxxxxxxx XXXXXX2-XXX, xx xxxxx xxxxxxxxx v rozhodnutí Xxxxxxxx xxxxxxxxx xxxxx XXX/2007/7&xxxx;(3). |
|
(4) |
Xxxxxxxxxx XXX/2007/7 xx xxxxx xxxxx xxxxxxxxxxxxx způsobem xxxxxx, |
XXXXXXX XXXX XXXXXXXXXX:
Xxxxxx&xxxx;1
Xxxxx
Xxxxxxx X, II x&xxxx;XXX xxxxxxxxxx XXX/2007/7 xx mění x&xxxx;xxxxxxx x&xxxx;xxxxxxxxx xxxxxx xxxxxxxxxx.
Xxxxxx&xxxx;2
Xxxxxxxxx ustanovení
Toto xxxxxxxxxx xxxxxxxx x&xxxx;xxxxxxxx xxxxx xxxx xx zveřejnění x&xxxx;Xxxxxxx xxxxxxxx Evropské xxxx.
Xxxxxxx xx xxx xxx 21.&xxxx;xxxxxxxxx 2021, x&xxxx;xxxxxxxx xxxx.&xxxx;1 písm. x) x&xxxx;xxxxxxxx 7 x&xxxx;9 xxxxxxx II xxxxxx xxxxxxxxxx, xxxxx xx použijí xxx xxx 13.&xxxx;xxxxxx 2022.
Xx Frankfurtu nad Xxxxxxx xxx 21. září 2021.
Xxxxxxxxxxx ECB
Christine XXXXXXX
(1)&xxxx;&xxxx;Xxxxxx xxxxxx Xxxxxxxx centrální xxxxx (EU) 2021/1759 xx dne 20.&xxxx;xxxxxxxx 2021, xxxxxxx xx xxxx obecné xxxxxx XXX/2012/27 x&xxxx;xxxxxxxxxxxxxx expresním xxxxxxxxxxxxxxx xxxxxxx xxxxxxxxx xxxxxx v reálném xxxx (XXXXXX2) (ECB/2021/30) [(xxx xxxxxx 45 x&xxxx;xxxxx xxxxx Xxxxxxxx věstníku).
(2) Obecné xxxxxx Xxxxxxxx centrální xxxxx XXX/2012/27 xx xxx 5.&xxxx;xxxxxxxx 2012 x&xxxx;xxxxxxxxxxxxxx xxxxxxxxx xxxxxxxxxxxxxxx xxxxxxx xxxxxxxxx plateb x&xxxx;xxxxxxx xxxx (XXXXXX2) (Xx. xxxx. X&xxxx;30, 30.1.2013, x. 1).
(3) Rozhodnutí Xxxxxxxx centrální xxxxx XXX/2007/7 ze dne 24.&xxxx;xxxxxxxx 2007 x&xxxx;xxxxxxxxxx XXXXXX2-XXX (Xx. xxxx. X&xxxx;237, 8.9.2007, s. 71).
XXXXXXX X
Xxxxxxx X&xxxx;xxxxxxxxxx XXX/2007/7 xx mění xxxxx:
|
1. |
Xxxxxx&xxxx;1 se xxxx xxxxx:
|
|
2. |
V článku 2 xxxxxx odstavci xx xxxxxxxx xxxx xxxx, xxxxx xxx:
|
|
3. |
Xxxxxx&xxxx;3 se xxxx xxxxx:
|
|
4. |
Xxxxxx&xxxx;5 xx xxxxxxxxx xxxxx: „Xxxxxxx&xxxx;5 Xxxxxx xxxxxxxxxxxx XX xxxxxxx xxxxxxx xx XXXXXX2-XXX xxx xxxxxx xxxxxxxxxxxx xxx xxxxx comply xxxx xxx xxxxxxxxxxxx xxx out in Xxxxxxx&xxxx;8(1) and (2). They xxxxx xxxx xx xxxxx xxx XX xxxxxxx xxxx xxx XXX. PM xxxxxxx xxxxxxx xxxx xxxx xxxxxxx xx the XXX Xxxx xxxxxx xx xxxxxxx xxx XXXX Instant Xxxxxx Xxxxxxxx Adherence Agreement xxxxx xx xxx xxxxx xxxxxx xxxxxxxxx xx xxx XXXX Xxxxxxxx xx xxx xxxxx, either as x&xxxx;XXXX XXX holder xx xx a reachable xxxxx xxx x&xxxx;XXXX XXX xxxxxx.“; |
|
5. |
Xxxxxx&xxxx;22 xx xxxxxxxxx xxxxx: „Xxxxxxx&xxxx;22 Xxxxxxxx Requirements xxx Xxxxxxx Xxxxxxxxxx 1.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx xxxxx xxxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx to xxxxxxx their systems xxxx unauthorised access xxx xxx. Xxxxxxxxxxxx xxxxx be exclusively xxxxxxxxxxx xxx xxx xxxxxxxx protection xx xxx confidentiality, integrity xxx xxxxxxxxxxxx xx xxxxx systems. 2. Participants xxxxx xxxxxx the XXX xx xxx security-related xxxxxxxxx xx their xxxxxxxxx xxxxxxxxxxxxxx xxx, xxxxx xxxxxxxxxxx, security-related xxxxxxxxx xxxx xxxxx xx xxx technical xxxxxxxxxxxxxx xx the xxxxx xxxxx xxxxxxxxx. Xxx ECB xxx xxxxxxx xxxxxxx xxxxxxxxxxx xxxxx the xxxxxxxx xxx, xx xxxxxxxxx, xxxxxxx xxxx the xxxxxxxxxxx take xxxxxxxxxxx xxxxxxxx xx prevent x&xxxx;xxxxxxxxxx xx xxxx xx event. 3. The ECB xxx xxxxxx xxxxxxxxxx xxxxxxxx xxxxxxxxxxxx, in xxxxxxxxxx with xxxxxx xx xxxxxxxxxxxxx xx xxx xxxxxxxxxx of xxxxx, on xxx xxxxxxxxxxxx and/or xx xxxxxxxxxxxx xxxx xxx xxxxxxxxxx xxxxxxxx by xxx XXX. 4.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx shall xxxxxxx the XXX xxxx: (x) permanent xxxxxx xx xxxxx xxxxxxxxxxx of adherence xx their xxxxxx xxxxxxx xxxxxxx xxxxxxxx’x xxxxxxxx xxxxxxxx xxxxxxxxxxxx, xxx (ii) xx xx annual xxxxx xxx XXXXXX2 xxxx-xxxxxxxxxxxxx xxxxxxxxx xx xxxxxxxxx xx xxx XXX’x xxxxxxx in English. 4a. The XXX xxxxx assess xxx xxxxxxxxxxx’x xxxx-xxxxxxxxxxxxx xxxxxxxxx(x) xx xxx xxxxxxxxxxxx xxxxx of xxxxxxxxxx xxxx each xx xxx requirements xxx xxx xx xxx XXXXXX2 xxxx-xxxxxxxxxxxxx xxxxxxxxxxxx. These xxxxxxxxxxxx xxx xxxxxx in Xxxxxxxx XXX, xxxxx xx xxxxxxxx xx xxx xxxxx Appendices xxxxxx in Article 2(1), xxxxx xxxx an xxxxxxxx xxxx xx xxxxx Xxxxxxxxxx. 4x.&xxxx;&xxxx;&xxxx;Xxx xxxxxxxxxxx’x xxxxx xx compliance xxxx xxx xxxxxxxxxxxx xx the TARGET2 xxxx-xxxxxxxxxxxxx xxxxx xx xxxxxxxxxxx as xxxxxxx, xx increasing xxxxx xx xxxxxxxx: ‘xxxx xxxxxxxxxx’; ‘xxxxx xxx-xxxxxxxxxx’; xx ‘xxxxx xxx-xxxxxxxxxx’. Xxx xxxxxxxxx xxxxxxxx xxxxx: xxxx xxxxxxxxxx xx xxxxxxx xxxxx xxxxxxxxxxxx satisfy 100% xx xxx requirements; xxxxx non-compliance is xxxxx a participant xxxxxxxxx xxxx xxxx 100% xxx xx xxxxx 66% of the xxxxxxxxxxxx and xxxxx xxx-xxxxxxxxxx xxxxx x&xxxx;xxxxxxxxxxx xxxxxxxxx less than 66% of the xxxxxxxxxxxx. If a participant xxxxxxxxxxxx that a specific xxxxxxxxxxx is not xxxxxxxxxx to xx, xx xxxxx xx xxxxxxxxxx xx xxxxxxxxx xxxx xxx xxxxxxxxxx xxxxxxxxxxx xxx xxx xxxxxxxx xx xxx xxxxxxxxxxxxxx. X&xxxx;xxxxxxxxxxx which xxxxx to reach ‘xxxx compliance’ xxxxx xxxxxx an xxxxxx xxxx xxxxxxxxxxxxx xxx xx xxxxxxx to xxxxx xxxx compliance. Xxx XXX xxxxx xxxxxx xxx xxxxxxxx xxxxxxxxxxx authorities of xxx xxxxxx xx xxxx participant’s compliance. 4c. If xxx xxxxxxxxxxx refuses xx xxxxx permanent xxxxxx to xxx xxxxxxxxxxx of xxxxxxxxx xx xxxxx xxxxxx XXXx xxxxxxxx xxxxxxxx xxxxxxxxxxxx xx does xxx xxxxxxx the XXXXXX2 self-certification xxx xxxxxxxxxxx’x xxxxx xx xxxxxxxxxx xxxxx xx xxxxxxxxxxx as ‘xxxxx xxx-xxxxxxxxxx’. 4x.&xxxx;&xxxx;&xxxx;Xxx ECB shall xxxxxxxx xxxxxxxxxx xx xxxxxxxxxxxx on an xxxxxx basis. 4e. The XXX xxx xxxxxx xxx xxxxxxxxx xxxxxxxx xx xxxxxxx xx xxxxxxxxxxxx xxxxx level xx xxxxxxxxxx xxx assessed xx minor xx xxxxx non-compliance, xx xxxxxxxxxx xxxxx xx xxxxxxxx:
|
|
6. |
X&xxxx;xxxxxx&xxxx;33 xx odstavec 1 nahrazuje xxxxx: „1.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx xxxxx xx deemed xx xx xxxxx xx, shall xxxxxx xxxx, and xxxxx xx able xx xxxxxxxxxxx xxxx compliance xx xxx xxxxxxxx xxxxxxxxx authorities xxxx xxx xxxxxxxxxxx on xxxx relating to xxxxxxxxxxx on xxxx xxxxxxxxxx. Xxxx xxxxx xx xxxxxx xx xx xxxxx xx, xxx shall xxxxxx xxxx xxx xxxxxxxxxxx xx xxxx relating xx legislation on xxxxxxxxxx of money xxxxxxxxxx xxx xxx xxxxxxxxx xx xxxxxxxxx, xxxxxxxxxxxxx-xxxxxxxxx xxxxxxx activities xxx xxx xxxxxxxxxxx xx xxxxxxx weapons xxxxxxxx xxxxxxx, xx xxxxxxxxxx in xxxxx xx xxxxxxxxxxxx xxxxxxxxxxx xxxxxxxx xxxxxxxxxx xxx xxxxxxxx xxxxxxx or xxxxxxxx on xxxxx XX xxxxxxxx. Xxxxxxxxxxxx xxxxx ensure xxxx xxxx xxx informed xxxxx xxx TARGET2 xxxxxxx xxxxxxx provider’s xxxx retrieval policy xxxxx xx xxxxxxxx xxxx xxx xxxxxxxxxxx xxxxxxxxxxxx with the XXXXXX2 xxxxxxx service xxxxxxxx.“; |
|
7. |
Xxxxxx xx nový xxxxxx&xxxx;39x, xxxxx zní: „Article 39a Transitional xxxxxxxxxx 1.&xxxx;&xxxx;&xxxx;Xxxx the TARGET xxxxxx is operational xxx TARGET2 xxx xxxxxx xxxxxxxxx, XX xxxxxxx balances xxxxx xx xxxxxxxxxxx xx xxx xxxxxxx xxxxxx’x xxxxxxxxxxxxx successor xxxxxxxx xx xxx XXXXXX xxxxxx. 2.&xxxx;&xxxx;&xxxx;Xxx xxxxxxxxxxx xxxx XX xxxxxxx xxxxxxx, xxxxxxxx Xxxxxxxxxxxx xxx xxxxxxxxxxx XXX xxxxxxx xxxxxxxx to xxx XXX Inst xxxxxx xx xxxxxxxxx xx xxx TIPS Xxxxxxxx xxxxxxxx xx Xxxxxxx&xxxx;5 xxxxx xxxxx xx xx 25 February 2022.“; |
|
8. |
X&xxxx;xxxxxxx X&xxxx;xx x&xxxx;xxxx.&xxxx;8 xxxxxxx. 4 xxxxxxxxx xxxxxxx x) xxxxx:
|
|
9. |
V dodatku XX se x&xxxx;xxxxxxxx 6 xxxxxxxxx písmeno x) xxxxx:
|
|
10. |
Xxxxxxxx xx xxxx xxxxxxx VII, xxxxx xxx: „Xxxxxxxx VII Requirements regarding xxxxxxxxxxx xxxxxxxx xxxxxxxxxx xxx business continuity xxxxxxxxxx Xxxxxxxxxxx security xxxxxxxxxx Xxxxx xxxxxxxxxxxx xxx applicable xx xxxx participant, xxxxxx the xxxxxxxxxxx xxxxxxxxxxxx xxxx a specific xxxxxxxxxxx xx xxx xxxxxxxxxx xx it. Xx xxxxxxxxxxxx xxx xxxxx xx application xx xxx xxxxxxxxxxxx xxxxxx xxx xxxxxxxxxxxxxx, xxx xxxxxxxxxxx xxxxxx xxxxxxxx the xxxxxxxx xxxx are xxxx xx the Xxxxxxx Xxxxxxxxxxx Xxxxx (XXX). Xxxxxxxxxxxx, xxx XXX xxxxxx xx x&xxxx;Xxxxx xx Xxxxx (PoE), x.x. x&xxxx;xxxxxx xxxxxxxx xx xxx xxxxxxxx xx xxxxxxxxxxxx (e.g. xxxxxxxxxxxx, xxxxx-xxxxxx and xxxx-xxxxxx xxxxxxxxxxxx, xxxxxxxxxx), xxx xxxx xx xxx xxxxxx xxxxxxxxxxx xx xxxx the xxxxxxx xx XXXXX (x.x. SWIFT XXX Xxx) xx Xxxxxxxx (xxxx xxx latter xxxxxxxxxx to Xxxxxxxx-xxxxx Xxxxxx). Xxxxxxxxxxx 1.1: Information xxxxxxxx xxxxxx Xxx xxxxxxxxxx xxxxx xxx a clear xxxxxx xxxxxxxxx xx xxxx with business xxxxxxxxxx and xxxxxxxxxxx xxxxxxx xxx and xxxxxxxxxx xx information xxxxxxxx through xxx xxxxxxxx, approval and xxxxxxxxxxx of xx xxxxxxxxxxx xxxxxxxx policy xxxxxx at managing xxxxxxxxxxx security xxx xxxxx resilience xxxxxx xxx xxxxxxxxxxxx in xxxxx xx xxxxxxxxxxxxxx, xxxxxxxxxx xxx treatment xx xxxxxxxxxxx security xxx xxxxx xxxxxxxxxx xxxxx. Xxx xxxxxx xxxxxx xxxxxxx at xxxxx xxx following xxxxxxxx: xxxxxxxxxx, xxxxx (xxxxxxxxx domains xxxx xx xxxxxxxxxxxx, xxxxx xxxxxxxxx, xxxxx management xxx.), xxxxxxxxxx xxx xxxxxxxxxx xx responsibilities. Requirement 1.2: Xxxxxxxx xxxxxxxxxxxx Xx xxxxxxxxxxx xxxxxxxx xxxxxxxxx xxxxx xx xxxxxxxxxxx xx xxxxxxxxx xxx xxxxxxxxxxx xxxxxxxx policy xxxxxx the xxxxxxxxxxxx. Xxx xxxxxxxxxx xxxxx xxxxxxxxxx xxx review xxx establishment xx xxx xxxxxxxxxxx xxxxxxxx xxxxxxxxx xx xxxxxx xxx implementation of xxx information xxxxxxxx xxxxxx (xx xxx Xxxxxxxxxxx 1.1) across xxx xxxxxxxxxxxx, xxxxxxxxx xxx xxxxxxxxxx of xxxxxxxxxx xxxxxxxxx xxx xxxxxxxxxx xx xxxxxxxx xxxxxxxxxxxxxxxx xxx xxxx xxxxxxx. Xxxxxxxxxxx 1.3: Xxxxxxxx xxxxxxx Xxx xxxxxxxx xx xxx xxxxxxxxxxxx’x xxxxxxxxxxx xxx xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx xxxxxx xxx xx xxxxxxx by xxx introduction xx, xxx/xx the xxxxxxxxxx xx, xx xxxxxxxx xxxxx/xxxxxxx xx products/services xxxxxxxx by them. Xxx access to xxx organisation’s xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx by xxxxxxxx xxxxxxx xxxxx xx xxxxxxxxxx. Xxxx xxxxxxxx xxxxxxx xx xxxxxxxx/xxxxxxxx xx external xxxxxxx xxx xxxxxxxx xx xxxxxx xxx xxxxxxxxxxxx’x xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx, x&xxxx;xxxx xxxxxxxxxx xxxxx be carried xxx xx xxxxxxxxx xxx security xxxxxxxxxxxx xxx control xxxxxxxxxxxx. Xxxxxxxx xxxxx be xxxxxx and xxxxxxx xx xx xxxxxxxxx xxxx each xxxxxxxx xxxxxxxx xxxxx. Xxxxxxxxxxx 1.4: Xxxxx xxxxxxxxxx Xxx xxxxxxxxxxx xxxxxx, xxx xxxxxxxx xxxxxxxxx xxx xxx xxxxxxxxxx xxxxxxxxxxx systems, xxxx as xxxxxxxxx xxxxxxx, xxxxxxxxxxxxxxx, xxxxxxxx xxxxxxxxxxxx, xxx-xxx-xxxxx products, xxxxxxxx and xxxx-xxxxxxxxx xxxxxxxxxxxx, in xxx xxxxx xx the Xxxxxxx Transaction Chain xxxxx xx xxxxxxxxx xxx xxx xxxx x&xxxx;xxxxxxxxx xxxxx. Xxx xxxxxxxxxxxxxx xxx xxx xxxxxxxxxxx and xxx xxxxxxxxx xx xxxxxxxxxxx xxxxxxxx xx xxx xxxxxxxx xxxxxxxxx xxx xxx xxxxxxx IT xxxxxxxxxx xx xxxxxxxxx xxx xxxxxxxxxxx xxxxxx xxxxx xx xxxxxxxx. Xxxx: the xxxxx xxx xxxxxxxx xxx xxxxxxxxxxxxxx of xxxxxxxx xxxxxxxx xx xxxxxxxxxxx, xxx xxxxxxx xxxxxxxxxxx xxx xxx xxxxxx xxxxxxxxxx xx xxx xxxxxx. Xxxxxxxxxxx 1.5: Xxxxxxxxxxx xxxxxx xxxxxxxxxxxxxx Xxxxxxxxxxx assets xxxxx xx classified xx xxxxx xx xxxxx criticality to xxx xxxxxx delivery xx xxx service xx xxx xxxxxxxxxxx. Xxx xxxxxxxxxxxxxx xxxxx xxxxxxxx xxx xxxx, xxxxxxxxxx xxx xxxxxx xx xxxxxxxxxx xxxxxxxx xxxx xxxxxxxx xxx xxxxxxxxxxx xxxxx xx xxx relevant business xxxxxxxxx xxx xxxxx xxxx xxxx xxxx xxxxxxxxxxxxx xxx underlying XX components. An xxxxxxxxxxx xxxxx xxxxxxxxxxxxxx xxxxxx xxxxxxxx xx xxx xxxxxxxxxx xxxxx xx used to xxxxxx xx appropriate xxx of protection xxxxxxxx xxxxxxxxxx xxx xxxxxxxxxxx asset lifecycle (xxxxxxxxx removal xxx xxxxxxxxxxx xx xxxxxxxxxxx xxxxxx) xxx xx xxxxxxxxxxx the need xxx xxxxxxxx xxxxxxxx xxxxxxxx. Xxxxxxxxxxx 1.6: Xxxxx xxxxxxxxx xxxxxxxx Xxxxxxxx xxxxxxxxxxxxxxxx xxxxx xx addressed xxxxx to xxxxxxxxxx xx xxxxxxxx xxx xxxxxxxxxxxx xxx in xxxxx and xxxxxxxxxx xx xxxxxxxxxx. All xxxxxxxxxx xxx employment, xxxxxxxxxxx and xxxxx xxxxx users xxxxx xx xxxxxxxxxx xxxxxxxx, xxxxxxxxxx xxx sensitive xxxx. Employees, xxxxxxxxxxx xxx third party xxxxx xx xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx shall xxxx xx agreement xx their xxxxxxxx xxxxx and xxxxxxxxxxxxxxxx. Xx xxxxxxxx level xx xxxxxxxxx xxxxx xx xxxxxxx among xxx employees, xxxxxxxxxxx xxx xxxxx xxxxx xxxxx, and education xxx xxxxxxxx xx xxxxxxxx xxxxxxxxxx xxx xxx correct xxx xx xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx xxxxx be xxxxxxxx xx xxxx xx xxxxxxxx xxxxxxxx xxxxxxxx risks. X&xxxx;xxxxxx xxxxxxxxxxxx xxxxxxx xxx xxxxxxxx xxxxxxxx xxxxxxxx xxxxx xx xxxxxxxxxxx xxx xxxxxxxxx. Responsibilities xxxxx be in xxxxx xx xxxxxx xxxx xx xxxxxxxx’x, xxxxxxxxxx’x or xxxxx xxxxx user’s xxxx xxxx or xxxxxxxx xxxxxx xxx xxxxxxxxxxxx xx xxxxxxx, xxx xxxx xxx xxxxxx xx xxx xxxxxxxxx xxx the removal xx xxx xxxxxx xxxxxx xxx xxxxxxxxx. Xxxxxxxxxxx 1.7: Xxxxxxxx xxx xxxxxxxxxxxxx security Critical or xxxxxxxxx xxxxxxxxxxx processing xxxxxxxxxx xxxxx be xxxxxx xx xxxxxx xxxxx, xxxxxxxxx xx xxxxxxx security perimeters, xxxx xxxxxxxxxxx xxxxxxxx xxxxxxxx xxx xxxxx xxxxxxxx. They xxxxx xx physically xxxxxxxxx xxxx xxxxxxxxxxxx xxxxxx, xxxxxx xxx interference. Xxxxxx xxxxx xx xxxxxxx xxxx to xxxxxxxxxxx xxx fall xxxxxx xxx scope xx Xxxxxxxxxxx 1.6. Xxxxxxxxxx xxx xxxxxxxxx xxxxx xx xxxxxxxxxxx xx protect xxxxxxxx xxxxx containing xxxxxxxxxxx xxxxxx xxxx in xxxxxxx. Xxxxxxxxx xxxxx xx xxxxxxxxx xxxx xxxxxxxx xxx xxxxxxxxxxxxx xxxxxxx. Xxxxxxxxxx xx xxxxxxxxx (xxxxxxxxx xxxxxxxxx xxxx xxx-xxxx) xxx against xxx xxxxxxx of xxxxxxxx is necessary xx xxxxxx xxx xxxx of xxxxxxxxxxxx xxxxxx to xxxxxxxxxxx xxx xx guard xxxxxxx loss xx xxxxxx xx equipment xx xxxxxxxxxxx. Xxxxxxx xxxxxxxx xxx xx xxxxxxxx xx xxxxxxx xxxxxxx xxxxxxxx threats xxx to xxxxxxxxx xxxxxxxxxx xxxxxxxxxx such xx the electrical xxxxxx and xxxxxxx xxxxxxxxxxxxxx. Xxxxxxxxxxx 1.8: Operations xxxxxxxxxx Xxxxxxxxxxxxxxxx xxx procedures xxxxx xx xxxxxxxxxxx xxx xxx management xxx xxxxxxxxx xx xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx xxxxxxxx all xxx xxxxxxxxxx xxxxxxx xx xxx Xxxxxxx Xxxxxxxxxxx Xxxxx xxx-xx-xxx. Xx xxxxxxx xxxxxxxxx procedures, xxxxxxxxx xxxxxxxxx xxxxxxxxxxxxxx xx XX systems, segregation xx duties xxxxx xx xxxxxxxxxxx, xxxxx xxxxxxxxxxx, xx reduce xxx xxxx of xxxxxxxxx or xxxxxxxxxx xxxxxx xxxxxx. Xxxxx xxxxxxxxxxx xx duties xxxxxx be xxxxxxxxxxx xxx to xxxxxxxxxx xxxxxxxxx reasons, compensatory xxxxxxxx xxxxx be xxxxxxxxxxx xxxxxxxxx a formal xxxx analysis. Xxxxxxxx xxxxx xx established xx prevent and xxxxxx xxx xxxxxxxxxxxx xx xxxxxxxxx xxxx xxx xxxxxxx xx xxx Payment Xxxxxxxxxxx Xxxxx. Xxxxxxxx shall xx also established (xxxxxxxxx user xxxxxxxxx) xx prevent, xxxxxx xxx xxxxxx xxxxxxxxx xxxx. Xxxxxx xxxx xxxxx xx xxxx xxxx from xxxxxxx xxxxxxx (x.x. xxxxxx Xxxxxxxxx XXX components xxx Xxxx Xxxxxxx). Xxx xxxxxxxxxxxxx xx xxx browser (x.x. xxx xxx xx xxxxxxxxxx and xxxxxxx) xxxxx xx xxxxxxxx xxxxxxxxxx. Xxxx xxxxxx xxx xxxxxxxx policies xxxxx xx xxxxxxxxxxx xx xxx management; xxxxx xxxxxxxx xxxxxxxx shall xxxxxxx x&xxxx;xxxx of xxx xxxxxxxxxxx process xxxxx is xxxxxx xx xxxxxxx intervals xx xxxxx xxxxxxxx. Xxxxxxx xxxx xxx xxxxxxxx xxx the xxxxxxxx xx xxxxxxxx shall xx xxxxxxxxx and xxxxxx relevant to xxxxxxxxxxx xxxxxxxx xxxxx xx recorded. Operator xxxx xxxxx xx xxxx xx xxxxxx xxxx information system xxxxxxxx xxx identified. Xxxxxxxx xxxx shall xx xxxxxxxxx xxxxxxxx xx a sample xxxxx, xxxxx xx xxx xxxxxxxxxxx xx the xxxxxxxxxx. System xxxxxxxxxx xxxxx xx used xx xxxxx xxx xxxxxxxxxxxxx of xxxxxxxx xxxxx xxx xxxxxxxxxx xx xxxxxxxx for xxx xxxxxxxx xx xxxxxxxx xxx xx xxxxxx xxxxxxxxxx xx xx xxxxxx xxxxxx xxxxx. Xxxxxxxxx xx xxxxxxxxxxx xxxxxxx xxxxxxxxxxxxx shall xx xxxxx xx x&xxxx;xxxxxx exchange xxxxxx, xxxxxxx xxx xx xxxx xxxx exchange xxxxxxxxxx xxxxx xxx xxxxxxxx xxxxxxx xxx xxxxx xx xxxxxxxxx xxxx any xxxxxxxx xxxxxxxxxxx. Xxxxx party xxxxxxxx xxxxxxxxxx xxxxxxxx xx xxx xxxxxxxx xx xxxxxxxxxxx with XXXXXX2 (xxxx xxxxxxxx xxxxxxxx from x&xxxx;Xxxxxxx Xxxxxx xx xxxxxxxx 2 xx xxx xxxxx xxxxxxx xx xxx XXXXXX2 xxxx-xxxxxxxxxxxxx xxxxxxxxxxx xxxxxxxx) xxxx xx used under x&xxxx;xxxxxx agreement with xxx xxxxx xxxxx. Xxxxxxxxxxx 1.9: Xxxxxx xxxxxxx Xxxxxx xx information xxxxxx xxxxx xx xxxxxxxxx xx the basis xx xxxxxxxx xxxxxxxxxxxx (xxxx-xx-xxxx&xxxx;(1)) xxx xxxxxxxxx xx xxx established xxxxxxxxx xx xxxxxxxxx xxxxxxxx (including xxx xxxxxxxxxxx xxxxxxxx xxxxxx). Xxxxx access control xxxxx shall be xxxxxxx based xx xxx xxxxxxxxx xx xxxxx xxxxxxxxx&xxxx;(2) xx xxxxxxx closely the xxxxx of xxx xxxxxxxxxxxxx xxxxxxxx xxx XX xxxxxxxxx. Xxxxx xxxxxxxx (x.x. xxx xxxxxx xxxxxxxxxx) xxxxxxx xxxxxx xxxxxxx xxxxxx xx xxxxxxxxxx xxxx xxxxxxxx xxxxxx xxxxxxx xxxxxx there xxx xxxxxxxx xxxxxxxxxxxx xxxxxxxx xx xxxxx (x.x. xxxxxxxxxx, personal xxxx xxxxxxxxxxxxx). Xxxxxx xxx xxxxxxxxxx xxxxxxxxxx xxxxx be xx xxxxx xx xxxxxxx xxx allocation xx xxxxxx xxxxxx xx xxxxxxxxxxx xxxxxxx xxx services xxxx xxxx xxxxxx xxx xxxxx xx xxx Xxxxxxx Xxxxxxxxxxx Xxxxx. Xxx xxxxxxxxxx shall xxxxx all xxxxxx xx xxx lifecycle xx xxxx xxxxxx, xxxx the initial xxxxxxxxxxxx xx xxx xxxxx xx xxx xxxxx xxxxxxxxxxxxxx xx xxxxx xxxx xx xxxxxx xxxxxxx access. Special xxxxxxxxx xxxxx xx xxxxx, xxxxx xxxxxxxxxxx, xx xxx allocation xx xxxxxx xxxxxx xx xxxx xxxxxxxxxxx xxxx xxx abuse xx xxxxx xxxxxx xxxxxx xxxxx xxxx xx x&xxxx;xxxxxx adverse xxxxxx on xxx xxxxxxxxxx xx xxx xxxxxxxxxxx (x.x. access xxxxxx allowing xxxxxx xxxxxxxxxxxxxx, xxxxxxxx xx xxxxxx controls, xxxxxx xxxxxx xx business xxxx). Xxxxxxxxxxx xxxxxxxx xxxxx xx xxx xx xxxxx to xxxxxxxx, xxxxxxxxxxxx xxx xxxxxxxxx xxxxx at xxxxxxxx xxxxxx xx the xxxxxxxxxxxx’x network, e.g. xxx xxxxx xxx xxxxxx xxxxxx to xxxxxxx xx xxx Xxxxxxx Transaction Chain. Xxxxxxxx xxxxxxxx xxxxx xxx be xxxxxx xx order xx xxxxxx xxxxxxxxxxxxxx. Xxx passwords, xxxxx xxxxx xx xxxxxxxxxxx xxx xxxxxxxx xx xxxxxxxx xxxxxxxx xx ensure xxxx xxxxxxxxx cannot xx xxxxxx xxxxxxx, x.x. xxxxxxxxxx xxxxx and xxxxxxx-xxxx validity. X&xxxx;xxxx xxxxxxxx xxxxxxxx xxx/xx xxxxx protocol xxxxx xx established. A policy xxxxx xx developed and xxxxxxxxxxx xx xxx xxx xx xxxxxxxxxxxxx xxxxxxxx xx protect xxx xxxxxxxxxxxxxxx, xxxxxxxxxxxx xxx xxxxxxxxx xx xxxxxxxxxxx. A key management xxxxxx xxxxx xx xxxxxxxxxxx to xxxxxxx xxx xxx of xxxxxxxxxxxxx xxxxxxxx. Xxxxx shall xx xxxxxx xxx xxxxxxx xxxxxxxxxxxx information xx screen or xx print (x.x. x&xxxx;xxxxx screen, a clear xxxx policy) to xxxxxx the xxxx xx xxxxxxxxxxxx access. When xxxxxxx xxxxxxxx, the xxxxx xx xxxxxxx xx xx unprotected xxxxxxxxxxx xxxxx be xxxxxxxxxx xxx appropriate xxxxxxxxx xxx xxxxxxxxxxxxxx xxxxxxxx xxxxx xx xxxxxxx. Xxxxxxxxxxx 1.10: Xxxxxxxxxxx xxxxxxx acquisition, xxxxxxxxxxx xxx xxxxxxxxxxx Xxxxxxxx xxxxxxxxxxxx xxxxx xx xxxxxxxxxx xxx agreed prior xx the xxxxxxxxxxx xxx/xx xxxxxxxxxxxxxx xx xxxxxxxxxxx xxxxxxx. Xxxxxxxxxxx xxxxxxxx xxxxx xx xxxxx xxxx xxxxxxxxxxxx, xxxxxxxxx xxxx-xxxxxxxxx xxxxxxxxxxxx, xx xxxxxx xxxxxxx processing. Xxxxx xxxxxxxx xxxxx xxxxxxx xxx validation xx input data, xxxxxxxx xxxxxxxxxx and xxxxxx xxxx. Xxxxxxxxxx xxxxxxxx may xx xxxxxxxx xxx systems xxxx process, xx xxxx an impact xx, sensitive, xxxxxxxx xx xxxxxxxx xxxxxxxxxxx. Xxxx xxxxxxxx xxxxx xx xxxxxxxxxx xx xxx xxxxx xx xxxxxxxx requirements xxx xxxx xxxxxxxxxx xxxxxxxxx xx the xxxxxxxxxxx xxxxxxxx (x.x. xxxxxxxxxxx xxxxxxxx policy, cryptographic xxxxxxx xxxxxx). Xxx xxxxxxxxxxx xxxxxxxxxxxx xx new xxxxxxx shall be xxxxxxxxxxx, xxxxxxxxxx xxx xxxxxx xxxxx xx xxxxx xxxxxxxxxx xxx xxx. Xx xxxxxxx xxxxxxx xxxxxxxx, xxxxxxxxxxx xxxxxxxx, xxxxxxxxx segmentation xxx xxxxxx management, xxxxxx be implemented xxxxx on xxx xxxxxxxxxxx xx xxxx xxxxx and xxx xxxxx xx xxxx xx the network xxxxx in xxx xxxxxxxxxxxx. Xxxxx xxxxx xx xxxxxxxx controls xx xxxxxxx xxxxxxxxx xxxxxxxxxxx passing xxxx xxxxxx networks. Access xx xxxxxx files and xxxxxxx xxxxxx xxxx xxxxx xx xxxxxxxxxx xxx IT xxxxxxxx xxx xxxxxxx xxxxxxxxxx xxxxxxxxx in a secure xxxxxx. Xxxx xxxxx xx xxxxx xx xxxxx exposure of xxxxxxxxx xxxx in xxxx xxxxxxxxxxxx. Xxxxxxx xxx support environments xxxxx xx xxxxxxxx xxxxxxxxxx. Xxxxxxxxxx xx xxxxxxx xx xxxxxxxxxx xxxxx xx xxxxxxxx xxxxxxxxxx. X&xxxx;xxxx xxxxxxxxxx xx xxx xxxxx xxxxxxx xx xx xxxxxxxx xx xxxxxxxxxx xxxxx xx conducted. Regular xxxxxxxx xxxxxxx activities xx xxxxxxx xx xxxxxxxxxx shall also xx xxxxxxxxx xxxxxxxxx xx x&xxxx;xxxxxxxxxx xxxx xxxxx on the xxxxxxx xx a risk xxxxxxxxxx, xxx security xxxxxxx shall xxxxxxx, xx xxxxx, xxxxxxxxxxxxx xxxxxxxxxxx. Xxx xx xxx shortcomings highlighted xxxxxx xxx security xxxxxxx xxxxxxxxxx xxxxx xx assessed xxx xxxxxx xxxxx xx xxxxx xxx xxxxxxxxxx xxx shall be xxxxxxxx xxx followed xx xx x&xxxx;xxxxxx xxxxxxx. Xxxxxxxxxxx 1.11: Xxxxxxxxxxx xxxxxxxx in xxxxxxxx&xxxx;(3) xxxxxxxxxxxxx Xx ensure protection xx xxx xxxxxxxxxxx’x xxxxxxxx xxxxxxxxxxx systems xxxx xxx xxxxxxxxxx xx xxxxxxxxx, xxxxxxxxxxx xxxxxxxx requirements xxx xxxxxxxxxx xxx risks xxxxxxxxxx xxxx xxxxxxxx’x xxxxxx shall be xxxxxxxxxx xxx xxxxxxxx xxxxxx xxxx xxxx xxx xxxxxxxx. Xxxxxxxxxxx 1.12: Xxxxxxxxxx xx xxxxxxxxxxx xxxxxxxx xxxxxxxxx and xxxxxxxxxxxx Xx xxxxxx x&xxxx;xxxxxxxxxx xxx xxxxxxxxx approach xx xxx xxxxxxxxxx xx xxxxxxxxxxx xxxxxxxx xxxxxxxxx, xxxxxxxxx xxxxxxxxxxxxx xx security events xxx weaknesses, roles, xxxxxxxxxxxxxxxx xxx xxxxxxxxxx, xx xxxxxxxx xxx xxxxxxxxx xxxxx, xxxxx xx xxxxxxxxxxx xxx xxxxxx xx xxxxxx x&xxxx;xxxxx, xxxxxxxxx and xxxxxxx and xxxxxx xxxxxxx from xxxxxxxxxxx xxxxxxxx xxxxxxxxx xxxxxxxxx xxxxxxxxx related xx x&xxxx;xxxxx-xxxxxxx xxxxx (x.x. x&xxxx;xxxxx xxxxxxx xx xx xxxxxxxx attacker xx xx an xxxxxxx). Xxxxxxxxx xxxxxxxx xx xxxxx xxxxxxxxxx xxxxx xx xxxxxxxxxx xxxxxxx. Xxxxxxxxxxx 1.13: Xxxxxxxxx xxxxxxxxxx xxxxxx X&xxxx;xxxxxxxxxxx’x internal xxxxxxxxxxx xxxxxxx (e.g. xxxx office xxxxxxx, xxxxxxxx networks and xxxxxxxx xxxxxxx connectivity) xxxxx xx regularly xxxxxxxx xxx xxxxxxxxxx xxxx xxx xxxxxxxxxxxx’x xxxxxxxxxxx xxxxxxxxx of xxxxxxxx (e.g. information xxxxxxxx policy, xxxxxxxxxxxxx xxxxxxx policy). Requirement 1.14: Xxxxxxxxxxxxxx Xxxxx xxxxxxx xxxxxxxx xxxxx xxxxxx xxxx xxx xxx security xxxxxxxx xxxx xxx xxx xxx xxxxxxxx xxxxxxxx xxx xxxxxxx (x.x. xxxxxxxxx, logging). Xxxxxxxx xxxxxxxx to xxxxxxxxxxx xxxx xxxxxxx: xxxxxxxxx xx xxx xxxxxxxxxx and xxx xxxxxxx xxxxxxxxx system, xxxxxxx patching, xxxxxx xxxxxxxxxx xx different xxxxxxxxxxxx (x.x. xxxxxxxxxx xxx xxxxxxxxxxx). Centralised xxxxxxxxxx, xxxxxxx and xxxxxxxxxx xx xxxx xx xxxxxxxx xx xxxxxx xxxxxx, in xxxxxxxxxx xxx high xxxxxxxxxx xxxxxxxx, xxxxx xx implemented xxxxx xx x&xxxx;xxxx xxxxxxxxxx. Xxxxx xxxxxxx xxxxxxxx xxxxxxx xx the xxxx hypervisor xxxxx xxxx x&xxxx;xxxxxxx xxxx xxxxxxx. Xxxxxxxxxxx 1.15: Xxxxx xxxxxxxxx Xxx xxxxx xx xxxxxx xxx/xx hybrid xxxxx xxxxxxxxx xx xxx Payment Transaction Xxxxx must xx xxxxx on x&xxxx;xxxxxx xxxx assessment, taking xxxx account the xxxxxxxxx controls xxx xxx contractual xxxxxxx xxxxxxx to xxx xxxxx xxxxxxxx. Xx xxxxxx xxxxx solutions are xxxx, xx is xxxxxxxxxx that the xxxxxxxxxxx xxxxx xx xxx overall xxxxxx xx xxx xxxxxxx xxx xx xxx xxxxxxxxx xxxxxxx. Xxx xx-xxxxxxxx components of xxx xxxxxx xxxxxxxxx xxxx xx xxxxxxxxxx xxxx xxx other xx-xxxxxxxx xxxxxxx. Xxxxxxxx xxxxxxxxxx xxxxxxxxxx (xxxxxxxxxx xxxx xx xxxxxxxx participants) The xxxxxxxxx xxxxxxxxxxxx (2.1 xx 2.6) relate xx business xxxxxxxxxx xxxxxxxxxx. Xxxx XXXXXX2 xxxxxxxxxxx xxxxxxxxxx xx xxx Xxxxxxxxxx xx xxxxx critical xxx xxx xxxxxx functioning xx xxx TARGET2 xxxxxx xxxxx have x&xxxx;xxxxxxxx xxxxxxxxxx xxxxxxxx xx place comprising xxx following elements.
|
(1)&xxxx;&xxxx;Xxx xxxx-xx-xxxx principle xxxxxx xx the identification xx xxx xxx xx information xxxx xx xxxxxxxxxx xxxxx xxxxxx xx xx xxxxx xx xxxxx xxx her/his xxxxxx.
(2)&xxxx;&xxxx;Xxx xxxxxxxxx of xxxxx xxxxxxxxx xxxxxx xx xxxxxxxxx x&xxxx;xxxxxxx’x xxxxxx xxxxxxx xx an XX xxxxxx xx xxxxx xx xxxxx xxx xxxxxxxxxxxxx xxxxxxxx xxxx.
(3)&xxxx;&xxxx;X&xxxx;xxxxxxxx xx xxx xxxxxxx xx xxxx xxxxxxxx xxxxxx xx xxxxxxxxxx xx any xxxxx xxxxx (and xxx xxxxxxxxx) xxxxx xx under xxxxxxxx (xxxxxxxxx), xxxx xxx xxxxxxxxxxx, xx xxxxxxx x&xxxx;xxxxxxx xxx xxxxx xxx service agreement xxx xxxxx xxxxx (xxx xxx xxxxxxxxx) xx xxxxxxx xxxxxx, xxxxxx xxxxxxxx xx xx-xxxx, xx information xxx/xx xxxxxxxxxxx systems xxx/xx xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx xx xxx xxxxxxxxxxx xx scope xx associated to xxx xxxxx xxxxxxx xxxxx xxx exercise xx xxx XXXXXX2 xxxx-xxxxxxxxxxxxx.
PŘÍLOHA II
Příloha II xxxxxxxxxx XXX/2007/7 se xxxx xxxxx:
|
1. |
Xxxxxx&xxxx;1 xx xxxx xxxxx:
|
|
2. |
V čl. 4 xxxx.&xxxx;2 xx xxxxxxx xx) xxxxxxxxx xxxxx:
|
|
3. |
X&xxxx;xx.&xxxx;4 xxxx.&xxxx;2 xx xxxxxx xxxx písmeno xx), xxxxx xxx:
|
|
4. |
V článku 4 xx xxxxxxxx 3 xxxxxxxxx tímto: „3. TARGET2 provides xxxx-xxxx xxxxx xxxxxxxxxx xxx xxxxxxxx xx xxxx, with xxxxxxxxxx xx xxxxxxx xxxx xxxxx xxxxxx PM xxxxxxxx, T2S XXXx xxx XXXX DCAs. XXXXXX2 xx established xxx xxxxxxxxx on xxx basis xx xxx XXX through xxxxx xxxxxxx xxxxxx xxx submitted and xxxxxxxxx xxx xxxxxxx xxxxx xxxxxxxx xxx xxxxxxxxxx xxxxxxxx xx xxx xxxx xxxxxxxxx xxxxxx. As far xx xxx xxxxxxxxx xxxxxxxxx of the X2X XXXx xx xxxxxxxxx, TARGET2 xx xxxxxxxxxxx established xxx xxxxxxxxx xx xxx xxxxx xx xxx X2X Xxxxxxxx. As xxx as xxx xxxxxxxxx xxxxxxxxx xx xxx XXXX DCAs xxx XXXX AS xxxxxxxxx xxxxxxxx is xxxxxxxxx, XXXXXX2 is xxxxxxxxxxx established xxx xxxxxxxxx xx xxx xxxxx xx the XXXX Xxxxxxxx. Xxx XXX xx xxx xxxxxxxx of xxxxxxxx xxxxx xxxxx Xxxxxxxxxx. Xxxx xxx omissions xx the SSP-providing XXXx and xxx 4XXx shall xx xxxxxxxxxx xxxx xxx xxxxxxxxx xx xxx XXX, xxx xxxxx xx shall assume xxxxxxxxx xx xxxxxxxxxx xxxx Article 21 of xxxx Annex. Xxxxxxxxxxxxx xxxxxxxx to these Xxxxxxxxxx xxxxx not xxxxxx a contractual xxxxxxxxxxxx xxxxxxx T2S DCA xxxxxxx xxx xxx XXX-xxxxxxxxx XXXx xx xxx 4XXx xxxx xxx of xxx xxxxxx acts xx xxxx xxxxxxxx. Xxxxxxxxxxxx, xxxxxxxx xx information xxxxx a T2S XXX xxxxxx xxxxxxxx xxxx, xx xxxxx xx, xxx XXX xx X2X Xxxxxxxx xx xxxxxxxx xx xxx xxxxxxxx xxxxxxxx xxxxx xxxxx Xxxxxxxxxx are xxxxxx xx be xxxxxxxx xxxx, or xxxx xx, the XXX.“; |
|
5. |
X&xxxx;xxxxxx&xxxx;8 se odstavec 3 xxxxxxxxx xxxxx: „3.&xxxx;&xxxx;&xxxx;Xxxxx xxx XXX xxx xxxxxxx a request xx x&xxxx;X2X XXX holder xxxxxxxx to xxxxxxxxx 1, xxxx X2X XXX xxxxxx is xxxxxx to have xxxxx the xxxxxxxxxxxxx XXX(x) a mandate to xxxxx the X2X XXX xxxx xxx xxxxxxx xxxxxxxx xx xxxxxxxxxx transactions executed xx those securities xxxxxxxx.“; |
|
6. |
X&xxxx;xxxxxx&xxxx;28 xx xxxxxxxx 1 nahrazuje xxxxx: „1.&xxxx;&xxxx;&xxxx;X2X XXX xxxxxxx xxxxx xx xxxxxx to xx aware of, xxxxx xxxxxx xxxx, xxx shall xx xxxx xx xxxxxxxxxxx xxxx compliance xx xxx xxxxxxxx xxxxxxxxx xxxxxxxxxxx xxxx xxx xxxxxxxxxxx on xxxx xxxxxxxx to legislation xx xxxx protection. Xxxx xxxxx be xxxxxx xx xx xxxxx xx, and xxxxx comply xxxx xxx xxxxxxxxxxx xx xxxx relating xx xxxxxxxxxxx xx xxxxxxxxxx xx xxxxx xxxxxxxxxx xxx the financing xx xxxxxxxxx, xxxxxxxxxxxxx-xxxxxxxxx xxxxxxx activities xxx xxx xxxxxxxxxxx of xxxxxxx weapons xxxxxxxx xxxxxxx, in xxxxxxxxxx xx terms xx xxxxxxxxxxxx xxxxxxxxxxx xxxxxxxx xxxxxxxxxx any xxxxxxxx xxxxxxx xx credited xx xxxxx X2X XXXx. Prior xx xxxxxxxx xxxx the xxxxxxxxxxx xxxxxxxxxxxx with xxx X2X network xxxxxxx xxxxxxxx, X2X XXX holders xxxxx xxxxxx xxxx they xxx xxxxxxxx about xxx xxxx xxxxxxxxx xxxxxx.“; |
|
7. |
Xxxxxx&xxxx;30 se nahrazuje xxxxx: „Xxxxxxx&xxxx;30 Xxxxxxxxxxx xxxxxxxxxxxx xxxx xx XXX 1.&xxxx;&xxxx;&xxxx;X2X DCA xxxxxxx xxxxx xxxxxx:
2.&xxxx;&xxxx;&xxxx;Xxx xxxxx relationship between x&xxxx;X2X XXX holder xxx xxx XXX xxxxx be xxxxxxxxxxx xxxxxxxx xx xxx xxxxx and xxxxxxxxxx xx xxx xxxxxxxx xxxxxxxx concluded with xx NSP as xxxxxxxx xx xx xxxxxxxxx 1(x). 3.&xxxx;&xxxx;&xxxx;Xxx xxxxxxxx xx xx xxxxxxxx xx xxx XXX xxxxx xxx xxxx xxxx of xxx xxxxxxxx xx xx xxxxxxxxx xx xxx XXX xx xxxxxxx xx TARGET2. 4. The ECB xxxxx xxx xx xxxxxx xxx xxx xxxx, xxxxxx xx xxxxxxxxx xx xxx XXX (xxxxxxxxx its xxxxxxxxx, xxxxx xxx xxxxxxxxxxxxxx), xx xxx xxx xxxx, errors xx xxxxxxxxx xx xxxxx parties selected xx xxxxxxxxxxxx to xxxx access xx xxx XXX’x xxxxxxx.“; |
|
8. |
Xxxxxx xx xxxx článek 34a, xxxxx xxx: „Xxxxxxx&xxxx;34x Xxxxxxxxxxxx xxxxxxxxxx Xxxx xxx XXXXXX system xx operational xxx XXXXXX2 xxx xxxxxx xxxxxxxxx, X2X DCA xxxxxxx xxxxx become X2X DCA xxxxxxx xx the XXXXXX xxxxxx.“; |
|
9. |
Xxxxxx xx pojem „X2X xxxxxxx xxxxxxx xxxxxxxx“ (x&xxxx;xxxxxxxxx xxxx xxxxxxx čísle) v čl. 6 xxxx.&xxxx;1 xxxx. x) xxxx x), xx.&xxxx;9 xxxx.&xxxx;5, čl. 10 xxxx.&xxxx;6, xx.&xxxx;14 odst. 1 xxxx. x), xx.&xxxx;22 xxxx.&xxxx;1, xx.&xxxx;22 odst. 2, čl. 22 xxxx.&xxxx;3, xx.&xxxx;27 odst. 5, xx.&xxxx;28 odst. 1, čl. 29 xxxx.&xxxx;1 xxxxxxx XX x&xxxx;x&xxxx;xxxxxxxx 1 xxxxxxx X&xxxx;xx nahrazují xxxxxxx „XXX“; |
|
10. |
X&xxxx;xxxxxxx X&xxxx;xx v odst. 8 xxxxxxx. 4 nahrazuje xxxxxxx x) xxxxx:
|
XXXXXXX XXX
Xxxxxxx III xxxxxxxxxx XXX/2007/7 xx xxxx xxxxx:
|
1. |
Xxxxxx xx xxxxx „XXXX network xxxxxxx xxxxxxxx“ (x&xxxx;xxxxxxxxx xxxx xxxxxxx xxxxx) x&xxxx;xxxx xxxxxxx xx xxxxxxxxx xxxxxxx „NSP“; |
|
2. |
Článek 1 xx xxxx xxxxx:
|
|
3. |
X&xxxx;xx.&xxxx;3 xxxx.&xxxx;1 se xxxxxxx xxxxx na „Xxxxxxxx X: TIPS xxxxxxxxxxxx xxxxxxxxx xxxxxxxxxxxx“; |
|
4. |
Xxxxxx&xxxx;4 se xxxx xxxxx:
|
|
5. |
X&xxxx;xx.&xxxx;6 odst. 1 xxxx. x) xx xxx x) xxxxxxxxx xxxxx:
|
|
6. |
Xxxxxx&xxxx;9 xx xxxxxxxxx xxxxx: „Xxxxxxx&xxxx;9 Xxxxxxxxxxx relationship xxxx xx XXX 1.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx xxxxx xxxxxx:
2.&xxxx;&xxxx;&xxxx;Xxx xxxxx xxxxxxxxxxxx between x&xxxx;xxxxxxxxxxx xxx xxx NSP xxxxx xx xxxxxxxxxxx xxxxxxxx xx xxx xxxxx xxx xxxxxxxxxx xx their xxxxxxxx xxxxxxxx xx xxxxxxxx xx xx paragraph 1(x). 3.&xxxx;&xxxx;&xxxx;Xxx xxxxxxxx xx xx provided by xxx XXX xxxxx xxx xxxx part xx xxx services xx be performed xx xxx XXX xx xxxxxxx of XXXXXX2. 4.&xxxx;&xxxx;&xxxx;Xxx ECB shall xxx xx liable xxx any xxxx, xxxxxx or xxxxxxxxx xx xxx XXX (xxxxxxxxx xxx xxxxxxxxx, xxxxx and subcontractors), xx for xxx xxxx, errors xx xxxxxxxxx xx xxxxx xxxxxxx selected by xxxxxxxxxxxx to xxxx xxxxxx to the XXX’x xxxxxxx.“; |
|
7. |
Xxxxxx&xxxx;10 se xxxxxxx; |
|
8. |
Xxxxxx xx xxxx xxxxxx&xxxx;11x, xxxxx xxx: „Xxxxxxx&xxxx;11x XXX xxxxxxxxxx 1.&xxxx;&xxxx;&xxxx;Xxx central XXX xxxxxxxxxx contains xxx xxxxx – XXXX xxxxxxx xxxxx xxx xxx xxxxxxxx xx xxx XXX xxxxxxx. 2.&xxxx;&xxxx;&xxxx;Xxxx xxxxx xxx xx xxxxxx xx xxxx xxx IBAN. An XXXX xxx xx xxxxxx xx xxx xx multiple xxxxxxx. 3.&xxxx;&xxxx;&xxxx;Xxxxxxx&xxxx;29 xxxxx xxxxx to xxx xxxx xxxxxxxxx xx xxx MPL xxxxxxxxxx.“; |
|
9. |
X&xxxx;xxxxxx&xxxx;12 se zrušuje xxxxxxxx 9; |
|
10. |
Článek 16 xx xxxxxxxxx tímto: „Article 16 Types of xxxxxxx orders in XXXX XXX Xxx xxxxxxxxx xxx classified as xxxxxxx xxxxxx xxx xxx xxxxxxxx of xxx XXXX service:
|
|
11. |
X&xxxx;xxxxxx&xxxx;18 xx xxxxxxxx 6 xxxxxxxxx xxxxx: „6.&xxxx;&xxxx;&xxxx;Xxxxx x&xxxx;XXXX XXX xx XX xxxxxxxxx xxxxxxxx order, x&xxxx;XXXX XXX xx TIPS XX xxxxxxxxx account xxxxxxxxx transfer order xx a TIPS XX xxxxxxxxx xxxxxxx xx XXXX XXX liquidity xxxxxxxx xxxxx has xxxx xxxxxxxx xx xxxxxxxx to xx Xxxxxxx&xxxx;17, xxx XXXXXX2-XXX xxxxx xxxxx xxxxxxx xxxxxxxxxx funds are xxxxxxxxx xx xxx xxxxx'x xxxxxxx. Xx xxxxxxxxxx xxxxx are xxx xxxxxxxxx the xxxxxxxxx transfer xxxxx xxxxx xx rejected. Xx sufficient xxxxx xxx xxxxxxxxx the xxxxxxxxx transfer xxxxx xxxxx xx xxxxxxx xxxxxxxxxxx.“; |
|
12. |
X&xxxx;xx.&xxxx;20 xxxx.&xxxx;1 xx xxxxxxx x) nahrazuje xxxxx:
|
|
13. |
X&xxxx;xxxxxx&xxxx;30 se odstavec 1 xxxxxxxxx xxxxx: „1.&xxxx;&xxxx;&xxxx;XXXX XXX xxxxxxx shall xx xxxxxx xx xx xxxxx of, xxxxx comply with xxx xxxxx xx xxxx to xxxxxxxxxxx xxxx xxxxxxxxxx xx xxx xxxxxxxx xxxxxxxxx xxxxxxxxxxx xxxx xxx xxxxxxxxxxx xx xxxx xxxxxxxx xx legislation xx data protection. Xxxx shall xx xxxxxx xx xx xxxxx of, xxx xxxxx comply xxxx xxx xxxxxxxxxxx xx xxxx xxxxxxxx xx xxxxxxxxxxx xx prevention xx xxxxx xxxxxxxxxx xxx xxx xxxxxxxxx xx xxxxxxxxx, xxxxxxxxxxxxx-xxxxxxxxx xxxxxxx xxxxxxxxxx xxx xxx development of xxxxxxx xxxxxxx delivery xxxxxxx, xx particular xx xxxxx xx xxxxxxxxxxxx xxxxxxxxxxx measures xxxxxxxxxx xxx xxxxxxxx xxxxxxx or xxxxxxxx xx xxxxx TIPS XXXx. XXXX XXX xxxxxxx xxxxxx xxxx xxxx xxx informed xxxxx xxxxx xxxxxx XXX'x xxxx xxxxxxxxx xxxxxx xxxxx xx xxxxxxxx into x&xxxx;xxxxxxxxxxx xxxxxxxxxxxx with that XXX.“; |
|
14. |
Xxxxxx xx nový xxxxxx&xxxx;35x, xxxxx xxx: „Xxxxxxx&xxxx;35x Xxxxxxxxxxxx xxxxxxxxx Xxxx xxx TARGET xxxxxx is xxxxxxxxxxx xxx xxx XXXXXX2 xxx xxxxxx operation, XXXX XXX xxxxxxx xxxxx xxxxxx XXXX XXX xxxxxxx xx xxx XXXXXX xxxxxx.“; |
|
15. |
X&xxxx;xxxxxxx X&xxxx;xx xxxxxxx x&xxxx;xxxxxxxx 2 xxxxxxxxx tímto:
|
|
16. |
X&xxxx;xxxxxxx X&xxxx;xx v odst. 6 xxxxxxx. 1 xxxxxxxxx xxxxxxx b) xxxxx:
|
|
17. |
X&xxxx;xxxxxxx XX se xxxxxxx xxxxxxxx 2; |
|
18. |
Dodatek X&xxxx;xx xxxxxxx. |