ROZHODNUTÍ XXXXXXXX CENTRÁLNÍ XXXXX (XX) 2021/1758
xx xxx 21.&xxxx;xxxx 2021,
xxxxxx xx xxxx xxxxxxxxxx XXX/2007/7 x&xxxx;xxxxxxxxxx XXXXXX2-XXX (XXX/2021/43)
XXXXXXX RADA EVROPSKÉ XXXXXXXXX XXXXX,
x&xxxx;xxxxxxx na Xxxxxxx x&xxxx;xxxxxxxxx Xxxxxxxx xxxx, x&xxxx;xxxxxxx na xxxxx x&xxxx;xxxxxxx xxxxxxx xx.&xxxx;127 odst. 2 xxxx xxxxxxx,
x&xxxx;xxxxxxx na xxxxxx Xxxxxxxxxx xxxxxxx centrálních xxxx x&xxxx;Xxxxxxxx xxxxxxxxx xxxxx, x&xxxx;xxxxxxx xx xxxxxx&xxxx;11.6 x&xxxx;xxxxxx 17, 22 x&xxxx;23 xxxxxx xxxxxxx,
xxxxxxxx x&xxxx;xxxxx xxxxxxx:
|
(1) |
Xxxx xxxxxxxxx xxxxxxx&xxxx;(1) xxx 20.&xxxx;xxxxxxxx 2021 xxxxxx xxxxxx Evropské xxxxxxxxx xxxxx XXX/2012/27&xxxx;(2) s cílem: x) xxxxxxxx, xx xxxxxxxx XXXX DCA xxxxx k TARGET2 xxxxxxxxx xxxxxxxxxxxxxxx jednotného portálu xxxxx xxxxxxxxxxxxxx Eurosystému (Xxxxxxxxxx Xxxxxx Xxxxxx Xxxxxxxxxxxxxx Xxxxxxx) od xxxxxxxxx 2021 a majitelé X2X DCA budou x&xxxx;XXXXXX2 xxxxxxxxxxxxxxx xxxxxx xxxxxxx xxxxxxxxx xx xxxxxx 2022; x) xxxxxxxx x&xxxx;xxxxxxxx pravidla xxxxxxxx xx dodržování xxxxxxxxx xx bezpečnost xxxxxxxxx bodu TARGET2, xxx xx xxxxxxxxx, xx se xxxxxx XXXXXX2 xxxx dále xxxxxxx xxx, xxx xxx xxxxxxx čelit xxxxxxx x&xxxx;xxxxxxx kybernetické xxxxxxxxxxx; x) xxxxxx xxxxxxxxx, aby xxxxxxxx xxxx XX, xxxxxx xxxxxxx xxxxxxxxx x&xxxx;xxxxxxxxxxxxx xxxxxxxx xxxx XXX, xxxxx xxxxxxxxxxx x&xxxx;xxxxxxxxxxx xxxxxxx XXX Inst xxxxxxxx xxxxxx x&xxxx;xxxxxxxxxx xxxxxxx xxx okamžité xxxxxxxxxxxxx xxxxxxx XXXX, xxxx a zůstali trvale xxxxxxxxxxx na platformě XXXX prostřednictvím XXXX XXX, tak xxx xx xxxxxxxxx xxxxxxxxxx xxxxxxxxxx xxxxxx x&xxxx;xxxx Xxxx; x) zavést xxxxxxxxxxxxxxx, pokud xxx x&xxxx;xxxxxxx převodu zůstatků x&xxxx;xxxx účastníků x&xxxx;XXXXXX2 xx odpovídající nástupnické xxxx x&xxxx;xxxxxxxx systému XXXXXX, xxx byla xxxxxxxxx xxxxxx jistota, x&xxxx;x) vyjasnit x&xxxx;xxxxxxxxxxxx xxxxxxx xxxxx xxxxxxx xxxxxxxx zásad ECB/2012/27. |
|
(2) |
Jakmile xxxx xxxxxxxxxx xxxxxxx xxxxxxxxxxx T2-T2S, xxxx x&xxxx;xxxxx xxxxxx xxxxxxx xxxxxx xxxxxxxx xxxxxxxx xxxxxxxxxxxxxxx, xxxxx jde x&xxxx;xxxxxxx xxxxxxx xxxxxxxx x&xxxx;xxxx xxxxxxxxx x&xxxx;XXXXXX2-XXX xx xxxxxxxxxxxx xxxxxxxxxxx xxxx. |
|
(3) |
Xxxxx obecných xxxxx XXX/2012/27, xxxxx mají xxxx xx xxxxxxxx XXXXXX2-XXX, xx třeba xxxxxxxxx v rozhodnutí Xxxxxxxx xxxxxxxxx xxxxx XXX/2007/7&xxxx;(3). |
|
(4) |
Xxxxxxxxxx XXX/2007/7 xx proto xxxxx xxxxxxxxxxxxx způsobem xxxxxx, |
XXXXXXX TOTO XXXXXXXXXX:
Článek 1
Změny
Přílohy X, XX x&xxxx;XXX xxxxxxxxxx ECB/2007/7 xx mění x&xxxx;xxxxxxx x&xxxx;xxxxxxxxx xxxxxx xxxxxxxxxx.
Xxxxxx&xxxx;2
Xxxxxxxxx ustanovení
Toto rozhodnutí xxxxxxxx x&xxxx;xxxxxxxx xxxxx xxxx po zveřejnění x&xxxx;Xxxxxxx xxxxxxxx Xxxxxxxx xxxx.
Xxxxxxx xx xxx xxx 21. listopadu 2021, x&xxxx;xxxxxxxx odst. 1 xxxx. x) x&xxxx;xxxxxxxx 7 x&xxxx;9 přílohy II xxxxxx xxxxxxxxxx, xxxxx xx xxxxxxx xxx xxx 13.&xxxx;xxxxxx 2022.
Ve Frankfurtu nad Xxxxxxx xxx 21.&xxxx;xxxx 2021.
Xxxxxxxxxxx XXX
Xxxxxxxxx XXXXXXX
(1)&xxxx;&xxxx;Xxxxxx xxxxxx Xxxxxxxx xxxxxxxxx xxxxx (EU) 2021/1759 xx xxx 20. července 2021, xxxxxxx se xxxx obecné zásady XXX/2012/27 x&xxxx;xxxxxxxxxxxxxx xxxxxxxxx xxxxxxxxxxxxxxx xxxxxxx xxxxxxxxx xxxxxx x&xxxx;xxxxxxx xxxx (XXXXXX2) (XXX/2021/30) [(viz xxxxxx 45 x&xxxx;xxxxx xxxxx Xxxxxxxx xxxxxxxx).
(2)&xxxx;&xxxx;Xxxxxx xxxxxx Evropské xxxxxxxxx xxxxx ECB/2012/27 ze xxx 5.&xxxx;xxxxxxxx 2012 x&xxxx;xxxxxxxxxxxxxx xxxxxxxxx automatizovaném xxxxxxx zúčtování xxxxxx x&xxxx;xxxxxxx xxxx (XXXXXX2) (Xx. xxxx. L 30, 30.1.2013, x. 1).
(3) Rozhodnutí Xxxxxxxx xxxxxxxxx xxxxx XXX/2007/7 xx dne 24.&xxxx;xxxxxxxx 2007 o podmínkách XXXXXX2-XXX (Xx. xxxx. X&xxxx;237, 8.9.2007, x. 71).
XXXXXXX I
Příloha I rozhodnutí XXX/2007/7 xx xxxx xxxxx:
|
1. |
Xxxxxx&xxxx;1 xx mění xxxxx:
|
|
2. |
X&xxxx;xxxxxx&xxxx;2 xxxxxx odstavci xx xxxxxxxx xxxx text, xxxxx zní:
|
|
3. |
Článek 3 xx xxxx xxxxx:
|
|
4. |
Xxxxxx&xxxx;5 se xxxxxxxxx xxxxx: „Xxxxxxx&xxxx;5 Xxxxxx xxxxxxxxxxxx XX xxxxxxx xxxxxxx xx XXXXXX2-XXX xxx xxxxxx xxxxxxxxxxxx xxx xxxxx comply xxxx xxx xxxxxxxxxxxx xxx out xx Xxxxxxx&xxxx;8(1) xxx&xxxx;(2). Xxxx xxxxx xxxx at xxxxx xxx XX xxxxxxx xxxx xxx XXX. PM xxxxxxx xxxxxxx that xxxx xxxxxxx to the XXX Inst xxxxxx xx xxxxxxx xxx XXXX Instant Xxxxxx Xxxxxxxx Xxxxxxxxx Xxxxxxxxx xxxxx be xxx xxxxx xxxxxx xxxxxxxxx xx the XXXX Xxxxxxxx at xxx xxxxx, either xx x&xxxx;XXXX XXX xxxxxx xx xx a reachable xxxxx via x&xxxx;XXXX XXX xxxxxx.“; |
|
5. |
Xxxxxx&xxxx;22 xx xxxxxxxxx tímto: „Article 22 Security Xxxxxxxxxxxx xxx Xxxxxxx Xxxxxxxxxx 1.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx xxxxx xxxxxxxxx adequate xxxxxxxx controls to xxxxxxx their xxxxxxx xxxx xxxxxxxxxxxx xxxxxx xxx use. Participants xxxxx be xxxxxxxxxxx xxxxxxxxxxx for xxx xxxxxxxx protection of xxx xxxxxxxxxxxxxxx, integrity xxx xxxxxxxxxxxx xx xxxxx xxxxxxx. 2.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx xxxxx xxxxxx the XXX xx any xxxxxxxx-xxxxxxx xxxxxxxxx xx xxxxx xxxxxxxxx infrastructure xxx, xxxxx xxxxxxxxxxx, xxxxxxxx-xxxxxxx xxxxxxxxx that occur xx xxx xxxxxxxxx xxxxxxxxxxxxxx xx the xxxxx xxxxx xxxxxxxxx. Xxx XXX xxx xxxxxxx xxxxxxx information xxxxx xxx incident xxx, if xxxxxxxxx, xxxxxxx xxxx the xxxxxxxxxxx xxxx xxxxxxxxxxx xxxxxxxx xx xxxxxxx x&xxxx;xxxxxxxxxx of xxxx xx xxxxx. 3.&xxxx;&xxxx;&xxxx;Xxx ECB xxx impose additional xxxxxxxx xxxxxxxxxxxx, xx xxxxxxxxxx xxxx xxxxxx xx cybersecurity or xxx xxxxxxxxxx of xxxxx, xx xxx xxxxxxxxxxxx xxx/xx xx xxxxxxxxxxxx xxxx xxx xxxxxxxxxx xxxxxxxx xx xxx XXX. 4.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx shall xxxxxxx the ECB xxxx: (i) xxxxxxxxx xxxxxx xx their xxxxxxxxxxx xx adherence xx xxxxx xxxxxx xxxxxxx service provider’s xxxxxxxx xxxxxxxx xxxxxxxxxxxx, xxx (ii) xx xx annual basis xxx XXXXXX2 self-certification xxxxxxxxx xx xxxxxxxxx xx the XXX’x xxxxxxx xx English. 4a. The XXX shall xxxxxx xxx xxxxxxxxxxx’x self-certification xxxxxxxxx(x) xx the xxxxxxxxxxxx level of xxxxxxxxxx xxxx each xx the xxxxxxxxxxxx xxx out in xxx XXXXXX2 xxxx-xxxxxxxxxxxxx xxxxxxxxxxxx. Xxxxx xxxxxxxxxxxx xxx listed xx Xxxxxxxx XXX, xxxxx xx xxxxxxxx xx xxx xxxxx Xxxxxxxxxx xxxxxx xx Article 2(1), xxxxx xxxx xx xxxxxxxx xxxx xx xxxxx Xxxxxxxxxx. 4x.&xxxx;&xxxx;&xxxx;Xxx xxxxxxxxxxx’x xxxxx of compliance xxxx xxx requirements xx xxx XXXXXX2 xxxx-xxxxxxxxxxxxx xxxxx xx xxxxxxxxxxx xx xxxxxxx, xx increasing order xx severity: ‘xxxx xxxxxxxxxx’; ‘minor non-compliance’; xx ‘major xxx-xxxxxxxxxx’. Xxx xxxxxxxxx criteria xxxxx: xxxx compliance xx xxxxxxx xxxxx xxxxxxxxxxxx xxxxxxx 100% xx the xxxxxxxxxxxx; xxxxx non-compliance is xxxxx x&xxxx;xxxxxxxxxxx satisfies xxxx xxxx 100% xxx xx xxxxx 66% of xxx xxxxxxxxxxxx xxx xxxxx xxx-xxxxxxxxxx xxxxx a participant xxxxxxxxx less than 66% xx xxx xxxxxxxxxxxx. Xx a participant xxxxxxxxxxxx xxxx a specific xxxxxxxxxxx xx xxx xxxxxxxxxx xx xx, xx xxxxx be xxxxxxxxxx as compliant xxxx xxx xxxxxxxxxx xxxxxxxxxxx xxx xxx xxxxxxxx xx xxx xxxxxxxxxxxxxx. X&xxxx;xxxxxxxxxxx xxxxx xxxxx xx reach ‘xxxx xxxxxxxxxx’ xxxxx xxxxxx an action xxxx xxxxxxxxxxxxx xxx xx intends to xxxxx xxxx xxxxxxxxxx. Xxx XXX xxxxx xxxxxx xxx xxxxxxxx xxxxxxxxxxx xxxxxxxxxxx xx xxx status of xxxx participant’s compliance. 4c. If xxx xxxxxxxxxxx refuses xx xxxxx permanent xxxxxx to xxx xxxxxxxxxxx of xxxxxxxxx xx their xxxxxx XXXx xxxxxxxx xxxxxxxx xxxxxxxxxxxx xx does xxx provide the XXXXXX2 xxxx-xxxxxxxxxxxxx the xxxxxxxxxxx’x level xx xxxxxxxxxx xxxxx xx xxxxxxxxxxx xx ‘xxxxx xxx-xxxxxxxxxx’. 4x.&xxxx;&xxxx;&xxxx;Xxx XXX xxxxx xxxxxxxx compliance xx xxxxxxxxxxxx xx xx xxxxxx xxxxx. 4x.&xxxx;&xxxx;&xxxx;Xxx XXX xxx xxxxxx xxx xxxxxxxxx measures xx xxxxxxx on participants xxxxx xxxxx of xxxxxxxxxx was xxxxxxxx xx xxxxx xx xxxxx xxx-xxxxxxxxxx, in xxxxxxxxxx xxxxx of xxxxxxxx:
|
|
6. |
X&xxxx;xxxxxx&xxxx;33 xx odstavec 1 xxxxxxxxx tímto: „1. Participants xxxxx xx xxxxxx xx xx xxxxx xx, shall comply xxxx, xxx xxxxx xx able xx xxxxxxxxxxx xxxx xxxxxxxxxx xx xxx xxxxxxxx xxxxxxxxx xxxxxxxxxxx xxxx xxx obligations xx xxxx relating to xxxxxxxxxxx xx xxxx xxxxxxxxxx. Xxxx xxxxx xx xxxxxx xx xx xxxxx xx, xxx xxxxx comply xxxx all xxxxxxxxxxx xx xxxx xxxxxxxx xx xxxxxxxxxxx on xxxxxxxxxx xx xxxxx xxxxxxxxxx and xxx xxxxxxxxx of terrorism, xxxxxxxxxxxxx-xxxxxxxxx xxxxxxx xxxxxxxxxx xxx xxx development xx xxxxxxx xxxxxxx xxxxxxxx systems, in xxxxxxxxxx xx xxxxx xx implementing appropriate xxxxxxxx xxxxxxxxxx any xxxxxxxx xxxxxxx xx xxxxxxxx xx xxxxx XX accounts. Xxxxxxxxxxxx xxxxx xxxxxx that xxxx are xxxxxxxx xxxxx xxx TARGET2 xxxxxxx xxxxxxx xxxxxxxx’x xxxx xxxxxxxxx xxxxxx xxxxx xx entering xxxx the xxxxxxxxxxx xxxxxxxxxxxx xxxx xxx XXXXXX2 network xxxxxxx xxxxxxxx.“; |
|
7. |
Xxxxxx xx nový xxxxxx&xxxx;39x, který zní: „Article 39a Transitional xxxxxxxxxx 1.&xxxx;&xxxx;&xxxx;Xxxx xxx TARGET xxxxxx xx xxxxxxxxxxx xxx TARGET2 xxx xxxxxx xxxxxxxxx, PM xxxxxxx xxxxxxxx shall xx transferred to xxx xxxxxxx xxxxxx’x xxxxxxxxxxxxx xxxxxxxxx xxxxxxxx xx the XXXXXX xxxxxx. 2.&xxxx;&xxxx;&xxxx;Xxx xxxxxxxxxxx xxxx XX xxxxxxx xxxxxxx, xxxxxxxx Participants xxx xxxxxxxxxxx XXX xxxxxxx xxxxxxxx xx the XXX Xxxx scheme xx reachable xx xxx XXXX Platform xxxxxxxx to Xxxxxxx&xxxx;5 xxxxx xxxxx xx xx 25 February 2022.“; |
|
8. |
X&xxxx;xxxxxxx I se v odst. 8 xxxxxxx. 4 xxxxxxxxx xxxxxxx b) tímto:
|
|
9. |
V dodatku XX se v odstavci 6 nahrazuje xxxxxxx x) xxxxx:
|
|
10. |
Xxxxxxxx xx xxxx xxxxxxx VII, xxxxx xxx: „Xxxxxxxx XXX Xxxxxxxxxxxx xxxxxxxxx xxxxxxxxxxx security management xxx xxxxxxxx xxxxxxxxxx xxxxxxxxxx Xxxxxxxxxxx xxxxxxxx management These xxxxxxxxxxxx xxx applicable xx each participant, xxxxxx the xxxxxxxxxxx xxxxxxxxxxxx xxxx x&xxxx;xxxxxxxx xxxxxxxxxxx is xxx xxxxxxxxxx xx xx. Xx establishing the xxxxx xx application xx xxx requirements xxxxxx xxx xxxxxxxxxxxxxx, xxx xxxxxxxxxxx should xxxxxxxx the xxxxxxxx xxxx xxx xxxx xx xxx Xxxxxxx Xxxxxxxxxxx Chain (XXX). Xxxxxxxxxxxx, the PTC xxxxxx xx x&xxxx;Xxxxx xx Xxxxx (XxX), x.x. a system xxxxxxxx xx xxx xxxxxxxx xx xxxxxxxxxxxx (x.x. xxxxxxxxxxxx, xxxxx-xxxxxx xxx xxxx-xxxxxx xxxxxxxxxxxx, middleware), xxx xxxx xx xxx xxxxxx responsible xx xxxx the xxxxxxx xx XXXXX (x.x. XXXXX XXX Xxx) xx Xxxxxxxx (xxxx the latter xxxxxxxxxx to Xxxxxxxx-xxxxx Xxxxxx). Xxxxxxxxxxx 1.1: Xxxxxxxxxxx xxxxxxxx policy The management xxxxx set x&xxxx;xxxxx xxxxxx xxxxxxxxx in xxxx with xxxxxxxx xxxxxxxxxx xxx demonstrate xxxxxxx for xxx xxxxxxxxxx xx xxxxxxxxxxx xxxxxxxx xxxxxxx xxx xxxxxxxx, approval xxx xxxxxxxxxxx xx xx xxxxxxxxxxx xxxxxxxx policy xxxxxx xx managing xxxxxxxxxxx security and xxxxx resilience xxxxxx xxx organisation xx xxxxx xx identification, xxxxxxxxxx and treatment xx xxxxxxxxxxx xxxxxxxx xxx xxxxx xxxxxxxxxx xxxxx. The xxxxxx xxxxxx contain xx xxxxx xxx following xxxxxxxx: xxxxxxxxxx, xxxxx (xxxxxxxxx domains xxxx xx organisation, xxxxx xxxxxxxxx, xxxxx xxxxxxxxxx xxx.), xxxxxxxxxx and xxxxxxxxxx xx xxxxxxxxxxxxxxxx. Xxxxxxxxxxx 1.2: Xxxxxxxx xxxxxxxxxxxx Xx xxxxxxxxxxx xxxxxxxx xxxxxxxxx xxxxx be xxxxxxxxxxx xx xxxxxxxxx xxx xxxxxxxxxxx security policy xxxxxx xxx organisation. Xxx xxxxxxxxxx shall xxxxxxxxxx and xxxxxx xxx establishment of xxx xxxxxxxxxxx xxxxxxxx xxxxxxxxx xx ensure xxx xxxxxxxxxxxxxx xx xxx information security xxxxxx (xx xxx Xxxxxxxxxxx 1.1) xxxxxx xxx xxxxxxxxxxxx, xxxxxxxxx xxx xxxxxxxxxx xx xxxxxxxxxx xxxxxxxxx xxx xxxxxxxxxx xx security xxxxxxxxxxxxxxxx xxx xxxx xxxxxxx. Xxxxxxxxxxx 1.3: Xxxxxxxx xxxxxxx Xxx security of xxx xxxxxxxxxxxx’x xxxxxxxxxxx xxx xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx xxxxxx xxx xx xxxxxxx xx xxx xxxxxxxxxxxx of, xxx/xx xxx xxxxxxxxxx xx, xx xxxxxxxx xxxxx/xxxxxxx xx products/services xxxxxxxx xx xxxx. Xxx xxxxxx xx xxx organisation’s xxxxxxxxxxx xxxxxxxxxx facilities by xxxxxxxx xxxxxxx xxxxx xx xxxxxxxxxx. When xxxxxxxx xxxxxxx xx xxxxxxxx/xxxxxxxx xx xxxxxxxx xxxxxxx xxx xxxxxxxx xx access the xxxxxxxxxxxx’x xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx, x&xxxx;xxxx assessment xxxxx be carried xxx xx xxxxxxxxx xxx xxxxxxxx xxxxxxxxxxxx xxx control xxxxxxxxxxxx. Xxxxxxxx xxxxx xx xxxxxx xxx defined xx xx xxxxxxxxx xxxx xxxx xxxxxxxx xxxxxxxx party. Requirement 1.4: Xxxxx xxxxxxxxxx Xxx information xxxxxx, the xxxxxxxx xxxxxxxxx xxx xxx xxxxxxxxxx xxxxxxxxxxx xxxxxxx, xxxx xx operating xxxxxxx, xxxxxxxxxxxxxxx, xxxxxxxx xxxxxxxxxxxx, xxx-xxx-xxxxx xxxxxxxx, xxxxxxxx and user-developed xxxxxxxxxxxx, in the xxxxx of xxx Xxxxxxx Transaction Chain xxxxx xx xxxxxxxxx xxx xxx xxxx x&xxxx;xxxxxxxxx xxxxx. The xxxxxxxxxxxxxx for xxx xxxxxxxxxxx xxx the xxxxxxxxx xx xxxxxxxxxxx xxxxxxxx in xxx xxxxxxxx xxxxxxxxx and xxx xxxxxxx IT xxxxxxxxxx xx safeguard xxx xxxxxxxxxxx assets xxxxx xx assigned. Xxxx: xxx xxxxx xxx delegate xxx xxxxxxxxxxxxxx xx xxxxxxxx xxxxxxxx xx xxxxxxxxxxx, xxx xxxxxxx xxxxxxxxxxx xxx xxx xxxxxx xxxxxxxxxx of xxx xxxxxx. Xxxxxxxxxxx 1.5: Xxxxxxxxxxx xxxxxx xxxxxxxxxxxxxx Xxxxxxxxxxx xxxxxx xxxxx xx xxxxxxxxxx xx xxxxx xx xxxxx criticality to xxx xxxxxx xxxxxxxx xx xxx xxxxxxx xx xxx participant. Xxx xxxxxxxxxxxxxx xxxxx xxxxxxxx the xxxx, xxxxxxxxxx and xxxxxx xx xxxxxxxxxx required xxxx xxxxxxxx xxx xxxxxxxxxxx xxxxx xx xxx xxxxxxxx xxxxxxxx xxxxxxxxx and xxxxx xxxx take xxxx xxxxxxxxxxxxx the underlying XX xxxxxxxxxx. Xx xxxxxxxxxxx xxxxx xxxxxxxxxxxxxx xxxxxx approved xx xxx xxxxxxxxxx shall xx used to xxxxxx xx xxxxxxxxxxx xxx xx protection xxxxxxxx xxxxxxxxxx the xxxxxxxxxxx xxxxx xxxxxxxxx (xxxxxxxxx xxxxxxx xxx xxxxxxxxxxx of information xxxxxx) xxx xx xxxxxxxxxxx xxx need xxx specific xxxxxxxx xxxxxxxx. Xxxxxxxxxxx 1.6: Xxxxx xxxxxxxxx xxxxxxxx Xxxxxxxx responsibilities xxxxx xx xxxxxxxxx xxxxx to xxxxxxxxxx xx xxxxxxxx xxx xxxxxxxxxxxx and in xxxxx and xxxxxxxxxx xx xxxxxxxxxx. Xxx xxxxxxxxxx xxx xxxxxxxxxx, xxxxxxxxxxx xxx xxxxx xxxxx xxxxx xxxxx xx xxxxxxxxxx xxxxxxxx, xxxxxxxxxx for xxxxxxxxx xxxx. Xxxxxxxxx, xxxxxxxxxxx xxx xxxxx party xxxxx xx xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx xxxxx xxxx xx agreement xx xxxxx xxxxxxxx xxxxx xxx xxxxxxxxxxxxxxxx. Xx adequate level xx awareness xxxxx xx xxxxxxx xxxxx xxx xxxxxxxxx, xxxxxxxxxxx xxx xxxxx xxxxx xxxxx, and education xxx xxxxxxxx xx xxxxxxxx xxxxxxxxxx and xxx xxxxxxx xxx xx information xxxxxxxxxx xxxxxxxxxx xxxxx xx xxxxxxxx to xxxx xx minimise xxxxxxxx xxxxxxxx xxxxx. X&xxxx;xxxxxx xxxxxxxxxxxx xxxxxxx for xxxxxxxx security xxxxxxxx xxxxx be xxxxxxxxxxx xxx xxxxxxxxx. Xxxxxxxxxxxxxxxx xxxxx xx in xxxxx to xxxxxx xxxx xx xxxxxxxx’x, xxxxxxxxxx’x xx xxxxx xxxxx xxxx’x xxxx xxxx xx xxxxxxxx xxxxxx xxx organisation xx managed, xxx xxxx xxx xxxxxx xx xxx xxxxxxxxx xxx xxx xxxxxxx xx xxx xxxxxx xxxxxx xxx completed. Requirement 1.7: Xxxxxxxx xxx xxxxxxxxxxxxx xxxxxxxx Xxxxxxxx xx xxxxxxxxx information xxxxxxxxxx xxxxxxxxxx shall xx xxxxxx in xxxxxx xxxxx, protected by xxxxxxx security perimeters, xxxx xxxxxxxxxxx xxxxxxxx xxxxxxxx xxx xxxxx xxxxxxxx. They xxxxx xx xxxxxxxxxx xxxxxxxxx xxxx unauthorised access, xxxxxx and interference. Xxxxxx xxxxx be xxxxxxx xxxx xx xxxxxxxxxxx who xxxx xxxxxx the xxxxx xx Xxxxxxxxxxx 1.6. Xxxxxxxxxx xxx xxxxxxxxx xxxxx xx xxxxxxxxxxx xx xxxxxxx xxxxxxxx xxxxx xxxxxxxxxx xxxxxxxxxxx xxxxxx xxxx in xxxxxxx. Xxxxxxxxx xxxxx be xxxxxxxxx from xxxxxxxx xxx xxxxxxxxxxxxx xxxxxxx. Xxxxxxxxxx xx xxxxxxxxx (xxxxxxxxx xxxxxxxxx xxxx xxx-xxxx) xxx xxxxxxx xxx xxxxxxx xx xxxxxxxx xx xxxxxxxxx xx xxxxxx xxx xxxx of xxxxxxxxxxxx xxxxxx xx xxxxxxxxxxx xxx to guard xxxxxxx xxxx or xxxxxx xx xxxxxxxxx xx information. Xxxxxxx xxxxxxxx xxx be xxxxxxxx to xxxxxxx xxxxxxx physical xxxxxxx xxx xx safeguard xxxxxxxxxx xxxxxxxxxx such xx the electrical xxxxxx and cabling xxxxxxxxxxxxxx. Xxxxxxxxxxx 1.8: Xxxxxxxxxx xxxxxxxxxx Xxxxxxxxxxxxxxxx xxx xxxxxxxxxx xxxxx be xxxxxxxxxxx xxx the xxxxxxxxxx xxx xxxxxxxxx xx xxxxxxxxxxx processing facilities xxxxxxxx xxx the xxxxxxxxxx systems xx xxx Payment Xxxxxxxxxxx Xxxxx xxx-xx-xxx. Xx xxxxxxx xxxxxxxxx xxxxxxxxxx, including xxxxxxxxx xxxxxxxxxxxxxx of XX xxxxxxx, segregation xx xxxxxx xxxxx xx xxxxxxxxxxx, xxxxx xxxxxxxxxxx, to xxxxxx xxx risk xx xxxxxxxxx or xxxxxxxxxx xxxxxx xxxxxx. Xxxxx xxxxxxxxxxx of xxxxxx xxxxxx xx xxxxxxxxxxx xxx xx xxxxxxxxxx xxxxxxxxx xxxxxxx, xxxxxxxxxxxx xxxxxxxx shall xx xxxxxxxxxxx following a formal xxxx analysis. Xxxxxxxx xxxxx be xxxxxxxxxxx xx prevent xxx xxxxxx xxx xxxxxxxxxxxx xx xxxxxxxxx xxxx xxx xxxxxxx xx xxx Payment Transaction Xxxxx. Xxxxxxxx shall xx also xxxxxxxxxxx (xxxxxxxxx user xxxxxxxxx) xx xxxxxxx, xxxxxx xxx xxxxxx malicious xxxx. Mobile xxxx xxxxx be used xxxx from trusted xxxxxxx (e.g. xxxxxx Xxxxxxxxx XXX components xxx Xxxx Xxxxxxx). Xxx xxxxxxxxxxxxx xx xxx xxxxxxx (x.x. xxx xxx xx xxxxxxxxxx xxx plugins) xxxxx xx strictly xxxxxxxxxx. Xxxx xxxxxx xxx xxxxxxxx xxxxxxxx xxxxx xx implemented xx xxx xxxxxxxxxx; those xxxxxxxx xxxxxxxx xxxxx xxxxxxx x&xxxx;xxxx xx xxx restoration xxxxxxx xxxxx is tested xx regular xxxxxxxxx xx xxxxx annually. Systems xxxx xxx critical xxx xxx xxxxxxxx xx payments xxxxx xx xxxxxxxxx and xxxxxx xxxxxxxx to xxxxxxxxxxx security xxxxx xx recorded. Xxxxxxxx xxxx xxxxx be xxxx to ensure xxxx information xxxxxx xxxxxxxx xxx xxxxxxxxxx. Xxxxxxxx xxxx shall xx xxxxxxxxx xxxxxxxx xx x&xxxx;xxxxxx xxxxx, xxxxx on the xxxxxxxxxxx xx the xxxxxxxxxx. System xxxxxxxxxx xxxxx xx used xx xxxxx the xxxxxxxxxxxxx of xxxxxxxx xxxxx xxx identified xx xxxxxxxx xxx xxx xxxxxxxx xx xxxxxxxx xxx xx xxxxxx conformity to xx access xxxxxx xxxxx. Xxxxxxxxx xx xxxxxxxxxxx xxxxxxx xxxxxxxxxxxxx shall xx xxxxx xx x&xxxx;xxxxxx xxxxxxxx policy, xxxxxxx xxx in xxxx xxxx xxxxxxxx xxxxxxxxxx xxxxx xxx xxxxxxxx xxxxxxx xxx xxxxx xx compliant xxxx xxx relevant xxxxxxxxxxx. Xxxxx xxxxx xxxxxxxx components employed xx the xxxxxxxx xx information with XXXXXX2 (xxxx xxxxxxxx xxxxxxxx xxxx x&xxxx;Xxxxxxx Xxxxxx xx xxxxxxxx 2 of the xxxxx xxxxxxx of xxx XXXXXX2 xxxx-xxxxxxxxxxxxx xxxxxxxxxxx xxxxxxxx) xxxx xx xxxx xxxxx x&xxxx;xxxxxx agreement xxxx xxx xxxxx party. Requirement 1.9: Xxxxxx xxxxxxx Xxxxxx xx xxxxxxxxxxx xxxxxx xxxxx xx xxxxxxxxx xx xxx xxxxx xx xxxxxxxx xxxxxxxxxxxx (xxxx-xx-xxxx&xxxx;(1)) xxx xxxxxxxxx xx xxx xxxxxxxxxxx xxxxxxxxx of xxxxxxxxx xxxxxxxx (including xxx xxxxxxxxxxx security xxxxxx). Xxxxx xxxxxx control xxxxx shall be xxxxxxx xxxxx xx xxx xxxxxxxxx xx xxxxx xxxxxxxxx&xxxx;(2) to xxxxxxx closely the xxxxx xx xxx xxxxxxxxxxxxx business and XX processes. Xxxxx xxxxxxxx (e.g. xxx xxxxxx management) xxxxxxx xxxxxx control should xx xxxxxxxxxx xxxx xxxxxxxx xxxxxx xxxxxxx xxxxxx there are xxxxxxxx xxxxxxxxxxxx xxxxxxxx xx xxxxx (x.x. xxxxxxxxxx, personal xxxx xxxxxxxxxxxxx). Xxxxxx and xxxxxxxxxx xxxxxxxxxx xxxxx xx xx xxxxx xx xxxxxxx xxx xxxxxxxxxx xx xxxxxx xxxxxx xx xxxxxxxxxxx systems xxx xxxxxxxx that xxxx within xxx xxxxx of the Xxxxxxx Xxxxxxxxxxx Chain. Xxx xxxxxxxxxx xxxxx xxxxx all xxxxxx xx xxx xxxxxxxxx xx xxxx xxxxxx, xxxx xxx xxxxxxx xxxxxxxxxxxx xx xxx xxxxx xx xxx xxxxx xxxxxxxxxxxxxx of xxxxx xxxx no xxxxxx xxxxxxx access. Special xxxxxxxxx shall be xxxxx, where appropriate, xx the allocation xx xxxxxx rights xx such xxxxxxxxxxx xxxx xxx xxxxx xx those xxxxxx xxxxxx xxxxx xxxx xx x&xxxx;xxxxxx xxxxxxx xxxxxx xx xxx xxxxxxxxxx xx xxx xxxxxxxxxxx (e.g. xxxxxx xxxxxx allowing xxxxxx xxxxxxxxxxxxxx, xxxxxxxx xx xxxxxx xxxxxxxx, xxxxxx xxxxxx xx xxxxxxxx xxxx). Xxxxxxxxxxx controls xxxxx xx xxx in xxxxx to xxxxxxxx, xxxxxxxxxxxx xxx xxxxxxxxx xxxxx at xxxxxxxx xxxxxx xx the xxxxxxxxxxxx’x xxxxxxx, x.x. xxx xxxxx xxx xxxxxx xxxxxx xx xxxxxxx xx the Xxxxxxx Xxxxxxxxxxx Chain. Xxxxxxxx xxxxxxxx xxxxx xxx be xxxxxx xx xxxxx xx xxxxxx xxxxxxxxxxxxxx. Xxx xxxxxxxxx, xxxxx xxxxx be xxxxxxxxxxx and enforced xx xxxxxxxx xxxxxxxx xx xxxxxx xxxx xxxxxxxxx cannot xx xxxxxx guessed, x.x. xxxxxxxxxx xxxxx and xxxxxxx-xxxx validity. X&xxxx;xxxx xxxxxxxx xxxxxxxx and/or xxxxx protocol shall xx xxxxxxxxxxx. X&xxxx;xxxxxx xxxxx xx developed xxx xxxxxxxxxxx on xxx xxx xx cryptographic xxxxxxxx to protect xxx xxxxxxxxxxxxxxx, authenticity xxx xxxxxxxxx xx xxxxxxxxxxx. X&xxxx;xxx management xxxxxx xxxxx xx xxxxxxxxxxx xx xxxxxxx xxx xxx xx xxxxxxxxxxxxx xxxxxxxx. Xxxxx xxxxx xx xxxxxx xxx xxxxxxx xxxxxxxxxxxx xxxxxxxxxxx xx xxxxxx or xx xxxxx (x.x. x&xxxx;xxxxx xxxxxx, x&xxxx;xxxxx xxxx policy) xx xxxxxx xxx xxxx xx xxxxxxxxxxxx xxxxxx. Xxxx xxxxxxx xxxxxxxx, the xxxxx xx xxxxxxx xx xx xxxxxxxxxxx xxxxxxxxxxx shall xx xxxxxxxxxx and xxxxxxxxxxx xxxxxxxxx xxx xxxxxxxxxxxxxx xxxxxxxx shall be xxxxxxx. Xxxxxxxxxxx 1.10: Xxxxxxxxxxx xxxxxxx acquisition, xxxxxxxxxxx xxx maintenance Security xxxxxxxxxxxx xxxxx xx identified xxx xxxxxx xxxxx xx xxx development xxx/xx xxxxxxxxxxxxxx xx xxxxxxxxxxx xxxxxxx. Xxxxxxxxxxx xxxxxxxx xxxxx be xxxxx xxxx xxxxxxxxxxxx, xxxxxxxxx xxxx-xxxxxxxxx xxxxxxxxxxxx, xx xxxxxx xxxxxxx xxxxxxxxxx. Xxxxx controls xxxxx xxxxxxx xxx xxxxxxxxxx xx input xxxx, xxxxxxxx xxxxxxxxxx and xxxxxx xxxx. Xxxxxxxxxx xxxxxxxx xxx xx xxxxxxxx for xxxxxxx xxxx xxxxxxx, or xxxx xx xxxxxx xx, sensitive, xxxxxxxx xx critical xxxxxxxxxxx. Xxxx xxxxxxxx shall xx xxxxxxxxxx on xxx xxxxx xx xxxxxxxx requirements and xxxx xxxxxxxxxx xxxxxxxxx xx the xxxxxxxxxxx xxxxxxxx (x.x. xxxxxxxxxxx xxxxxxxx xxxxxx, xxxxxxxxxxxxx xxxxxxx xxxxxx). Xxx xxxxxxxxxxx xxxxxxxxxxxx of xxx xxxxxxx xxxxx be xxxxxxxxxxx, xxxxxxxxxx xxx xxxxxx prior to xxxxx xxxxxxxxxx xxx xxx. As xxxxxxx xxxxxxx security, appropriate xxxxxxxx, including xxxxxxxxxxxx xxx xxxxxx xxxxxxxxxx, xxxxxx be xxxxxxxxxxx xxxxx xx xxx xxxxxxxxxxx xx xxxx xxxxx and the xxxxx xx risk xx the network xxxxx xx xxx xxxxxxxxxxxx. There xxxxx xx xxxxxxxx xxxxxxxx xx protect xxxxxxxxx xxxxxxxxxxx xxxxxxx xxxx xxxxxx networks. Access xx xxxxxx xxxxx xxx xxxxxxx xxxxxx xxxx xxxxx xx xxxxxxxxxx xxx IT xxxxxxxx xxx xxxxxxx activities xxxxxxxxx xx a secure xxxxxx. Xxxx xxxxx xx xxxxx to xxxxx xxxxxxxx xx xxxxxxxxx xxxx xx xxxx xxxxxxxxxxxx. Xxxxxxx xxx xxxxxxx environments xxxxx xx xxxxxxxx xxxxxxxxxx. Xxxxxxxxxx xx xxxxxxx in production xxxxx xx xxxxxxxx xxxxxxxxxx. X&xxxx;xxxx assessment xx xxx xxxxx xxxxxxx xx be xxxxxxxx xx production xxxxx xx xxxxxxxxx. Xxxxxxx xxxxxxxx xxxxxxx activities xx xxxxxxx in xxxxxxxxxx xxxxx xxxx xx xxxxxxxxx xxxxxxxxx xx a predefined xxxx xxxxx xx the xxxxxxx of a risk xxxxxxxxxx, xxx xxxxxxxx xxxxxxx xxxxx xxxxxxx, xx xxxxx, vulnerability xxxxxxxxxxx. All of xxx xxxxxxxxxxxx xxxxxxxxxxx xxxxxx xxx security xxxxxxx activities xxxxx xx xxxxxxxx and xxxxxx xxxxx xx xxxxx any identified xxx shall xx xxxxxxxx xxx xxxxxxxx xx xx a timely xxxxxxx. Xxxxxxxxxxx 1.11: Xxxxxxxxxxx xxxxxxxx in supplier (3) xxxxxxxxxxxxx Xx xxxxxx xxxxxxxxxx xx the participant’s xxxxxxxx xxxxxxxxxxx xxxxxxx xxxx xxx xxxxxxxxxx xx xxxxxxxxx, xxxxxxxxxxx xxxxxxxx xxxxxxxxxxxx for xxxxxxxxxx xxx xxxxx xxxxxxxxxx with xxxxxxxx’x xxxxxx xxxxx be xxxxxxxxxx xxx formally xxxxxx upon xxxx xxx xxxxxxxx. Xxxxxxxxxxx 1.12: Xxxxxxxxxx of xxxxxxxxxxx xxxxxxxx xxxxxxxxx xxx xxxxxxxxxxxx Xx ensure a consistent xxx xxxxxxxxx xxxxxxxx xx xxx xxxxxxxxxx xx xxxxxxxxxxx xxxxxxxx xxxxxxxxx, xxxxxxxxx communication xx xxxxxxxx xxxxxx xxx weaknesses, xxxxx, xxxxxxxxxxxxxxxx xxx xxxxxxxxxx, xx xxxxxxxx xxx xxxxxxxxx xxxxx, xxxxx xx xxxxxxxxxxx xxx xxxxxx xx xxxxxx x&xxxx;xxxxx, xxxxxxxxx and xxxxxxx and xxxxxx xxxxxxx from information xxxxxxxx xxxxxxxxx including xxxxxxxxx related xx x&xxxx;xxxxx-xxxxxxx cause (x.x. x&xxxx;xxxxx xxxxxxx xx xx xxxxxxxx attacker xx by xx xxxxxxx). Xxxxxxxxx involved xx xxxxx xxxxxxxxxx xxxxx be xxxxxxxxxx xxxxxxx. Xxxxxxxxxxx 1.13: Technical xxxxxxxxxx review A participant’s xxxxxxxx xxxxxxxxxxx xxxxxxx (x.x. xxxx xxxxxx xxxxxxx, xxxxxxxx networks xxx xxxxxxxx xxxxxxx xxxxxxxxxxxx) xxxxx xx regularly xxxxxxxx xxx compliance xxxx xxx xxxxxxxxxxxx’x xxxxxxxxxxx xxxxxxxxx xx xxxxxxxx (x.x. xxxxxxxxxxx xxxxxxxx xxxxxx, xxxxxxxxxxxxx xxxxxxx xxxxxx). Xxxxxxxxxxx 1.14: Xxxxxxxxxxxxxx Xxxxx xxxxxxx xxxxxxxx xxxxx xxxxxx xxxx xxx xxx xxxxxxxx xxxxxxxx xxxx xxx xxx for physical xxxxxxxx xxx systems (x.x. xxxxxxxxx, xxxxxxx). Xxxxxxxx relating xx xxxxxxxxxxx xxxx xxxxxxx: xxxxxxxxx xx xxx xxxxxxxxxx xxx xxx xxxxxxx operating xxxxxx, xxxxxxx xxxxxxxx, strict xxxxxxxxxx xx xxxxxxxxx xxxxxxxxxxxx (x.x. xxxxxxxxxx xxx xxxxxxxxxxx). Xxxxxxxxxxx xxxxxxxxxx, logging and xxxxxxxxxx xx xxxx xx managing of xxxxxx xxxxxx, xx xxxxxxxxxx xxx xxxx xxxxxxxxxx xxxxxxxx, xxxxx xx implemented xxxxx xx x&xxxx;xxxx xxxxxxxxxx. Xxxxx xxxxxxx machines xxxxxxx xx xxx xxxx xxxxxxxxxx shall xxxx x&xxxx;xxxxxxx xxxx xxxxxxx. Xxxxxxxxxxx 1.15: Cloud xxxxxxxxx Xxx xxxxx xx xxxxxx xxx/xx xxxxxx xxxxx solutions xx xxx Xxxxxxx Xxxxxxxxxxx Xxxxx xxxx xx xxxxx xx x&xxxx;xxxxxx xxxx xxxxxxxxxx, xxxxxx xxxx account the xxxxxxxxx xxxxxxxx xxx xxx contractual xxxxxxx xxxxxxx xx xxx xxxxx xxxxxxxx. Xx xxxxxx xxxxx xxxxxxxxx xxx xxxx, xx xx xxxxxxxxxx xxxx the xxxxxxxxxxx xxxxx of xxx overall xxxxxx xx the xxxxxxx xxx of xxx xxxxxxxxx systems. Xxx xx-xxxxxxxx components of xxx hybrid xxxxxxxxx xxxx xx xxxxxxxxxx xxxx xxx xxxxx xx-xxxxxxxx systems. Business xxxxxxxxxx xxxxxxxxxx (xxxxxxxxxx xxxx xx xxxxxxxx xxxxxxxxxxxx) Xxx xxxxxxxxx xxxxxxxxxxxx (2.1 xx 2.6) xxxxxx xx xxxxxxxx xxxxxxxxxx xxxxxxxxxx. Xxxx TARGET2 xxxxxxxxxxx xxxxxxxxxx xx xxx Xxxxxxxxxx as xxxxx critical xxx xxx xxxxxx functioning xx xxx XXXXXX2 xxxxxx shall xxxx x&xxxx;xxxxxxxx continuity strategy xx xxxxx comprising xxx following xxxxxxxx.
|
(1)&xxxx;&xxxx;Xxx xxxx-xx-xxxx xxxxxxxxx refers xx xxx xxxxxxxxxxxxxx xx xxx xxx xx information xxxx xx xxxxxxxxxx xxxxx xxxxxx xx in xxxxx xx carry xxx her/his duties.
(2) The xxxxxxxxx xx xxxxx xxxxxxxxx xxxxxx xx xxxxxxxxx x&xxxx;xxxxxxx’x xxxxxx xxxxxxx xx xx XX system xx xxxxx to xxxxx xxx xxxxxxxxxxxxx xxxxxxxx xxxx.
(3)&xxxx;&xxxx;X&xxxx;xxxxxxxx xx the xxxxxxx of xxxx xxxxxxxx xxxxxx be xxxxxxxxxx as xxx xxxxx xxxxx (xxx xxx xxxxxxxxx) which xx under xxxxxxxx (xxxxxxxxx), xxxx xxx xxxxxxxxxxx, xx provide x&xxxx;xxxxxxx and xxxxx xxx service xxxxxxxxx xxx third party (xxx its xxxxxxxxx) xx xxxxxxx xxxxxx, xxxxxx xxxxxxxx xx xx-xxxx, xx xxxxxxxxxxx xxx/xx xxxxxxxxxxx xxxxxxx xxx/xx information xxxxxxxxxx xxxxxxxxxx xx xxx xxxxxxxxxxx xx xxxxx xx xxxxxxxxxx xx xxx scope covered xxxxx xxx xxxxxxxx xx xxx TARGET2 xxxx-xxxxxxxxxxxxx.
PŘÍLOHA II
Příloha II xxxxxxxxxx XXX/2007/7 xx xxxx xxxxx:
|
1. |
Xxxxxx&xxxx;1 xx xxxx xxxxx:
|
|
2. |
X&xxxx;xx.&xxxx;4 xxxx.&xxxx;2 xx xxxxxxx xx) xxxxxxxxx xxxxx:
|
|
3. |
X&xxxx;xx.&xxxx;4 xxxx.&xxxx;2 xx xxxxxx nové xxxxxxx xx), xxxxx xxx:
|
|
4. |
X&xxxx;xxxxxx&xxxx;4 xx xxxxxxxx 3 xxxxxxxxx xxxxx: „3.&xxxx;&xxxx;&xxxx;XXXXXX2 xxxxxxxx xxxx-xxxx xxxxx xxxxxxxxxx xxx xxxxxxxx xx xxxx, xxxx settlement xx xxxxxxx xxxx xxxxx xxxxxx PM xxxxxxxx, X2X XXXx xxx XXXX XXXx. XXXXXX2 xx established xxx xxxxxxxxx xx xxx xxxxx xx xxx XXX xxxxxxx xxxxx xxxxxxx orders xxx xxxxxxxxx xxx xxxxxxxxx xxx through xxxxx xxxxxxxx xxx xxxxxxxxxx xxxxxxxx xx xxx same xxxxxxxxx xxxxxx. Xx xxx xx xxx xxxxxxxxx xxxxxxxxx xx the X2X DCAs xx xxxxxxxxx, TARGET2 is xxxxxxxxxxx xxxxxxxxxxx xxx xxxxxxxxx xx xxx xxxxx of xxx X2X Xxxxxxxx. As xxx xx xxx xxxxxxxxx xxxxxxxxx xx xxx TIPS XXXx xxx TIPS XX xxxxxxxxx xxxxxxxx xx xxxxxxxxx, TARGET2 xx xxxxxxxxxxx xxxxxxxxxxx xxx xxxxxxxxx xx xxx xxxxx of xxx XXXX Platform. Xxx XXX xx the xxxxxxxx of services xxxxx xxxxx Xxxxxxxxxx. Xxxx xxx xxxxxxxxx xx xxx SSP-providing XXXx xxx xxx 4XXx xxxxx xx xxxxxxxxxx acts xxx xxxxxxxxx xx xxx XXX, for which xx xxxxx xxxxxx xxxxxxxxx xx xxxxxxxxxx xxxx Article 21 of xxxx Annex. Xxxxxxxxxxxxx xxxxxxxx xx xxxxx Xxxxxxxxxx xxxxx xxx xxxxxx x&xxxx;xxxxxxxxxxx xxxxxxxxxxxx xxxxxxx T2S XXX xxxxxxx and xxx XXX-xxxxxxxxx XXXx xx xxx 4XXx xxxx xxx xx xxx xxxxxx xxxx xx xxxx xxxxxxxx. Xxxxxxxxxxxx, xxxxxxxx xx information xxxxx x&xxxx;X2X XXX xxxxxx xxxxxxxx xxxx, xx sends xx, xxx XXX xx X2X Platform xx xxxxxxxx xx xxx xxxxxxxx xxxxxxxx under xxxxx Xxxxxxxxxx are xxxxxx xx be xxxxxxxx xxxx, or xxxx xx, xxx XXX.“; |
|
5. |
X&xxxx;xxxxxx&xxxx;8 se xxxxxxxx 3 nahrazuje tímto: „3. Where xxx XXX xxx xxxxxxx x&xxxx;xxxxxxx by x&xxxx;X2X XXX xxxxxx xxxxxxxx xx paragraph 1, xxxx T2S XXX holder xx xxxxxx xx xxxx xxxxx the participating XXX(x) x&xxxx;xxxxxxx xx xxxxx xxx X2X XXX with the xxxxxxx xxxxxxxx xx xxxxxxxxxx xxxxxxxxxxxx xxxxxxxx xx xxxxx securities xxxxxxxx.“; |
|
6. |
X&xxxx;xxxxxx&xxxx;28 xx xxxxxxxx 1 nahrazuje xxxxx: „1.&xxxx;&xxxx;&xxxx;X2X XXX xxxxxxx xxxxx xx xxxxxx xx xx xxxxx xx, xxxxx xxxxxx xxxx, xxx shall be xxxx to xxxxxxxxxxx xxxx xxxxxxxxxx to xxx xxxxxxxx competent xxxxxxxxxxx with all xxxxxxxxxxx xx them xxxxxxxx xx xxxxxxxxxxx xx xxxx protection. Xxxx shall xx xxxxxx to be xxxxx xx, xxx xxxxx xxxxxx xxxx xxx xxxxxxxxxxx xx xxxx relating xx xxxxxxxxxxx xx xxxxxxxxxx xx xxxxx xxxxxxxxxx xxx xxx financing xx terrorism, proliferation-sensitive xxxxxxx activities and xxx xxxxxxxxxxx xx xxxxxxx weapons delivery xxxxxxx, xx xxxxxxxxxx xx terms xx xxxxxxxxxxxx xxxxxxxxxxx xxxxxxxx xxxxxxxxxx xxx xxxxxxxx xxxxxxx xx xxxxxxxx xx xxxxx X2X XXXx. Xxxxx xx xxxxxxxx into xxx xxxxxxxxxxx relationship xxxx xxx T2S xxxxxxx xxxxxxx xxxxxxxx, X2X XXX xxxxxxx xxxxx xxxxxx that xxxx xxx informed xxxxx xxx data retrieval xxxxxx.“; |
|
7. |
Xxxxxx&xxxx;30 xx nahrazuje xxxxx: „Xxxxxxx&xxxx;30 Xxxxxxxxxxx xxxxxxxxxxxx xxxx xx XXX 1.&xxxx;&xxxx;&xxxx;X2X XXX xxxxxxx xxxxx xxxxxx:
2.&xxxx;&xxxx;&xxxx;Xxx xxxxx xxxxxxxxxxxx between x&xxxx;X2X DCA holder xxx the XXX xxxxx xx xxxxxxxxxxx xxxxxxxx by xxx xxxxx xxx xxxxxxxxxx xx the xxxxxxxx xxxxxxxx concluded with xx XXX as xxxxxxxx xx xx xxxxxxxxx 1(a). 3. The services xx be xxxxxxxx xx the XXX xxxxx not form xxxx of the xxxxxxxx to be xxxxxxxxx by xxx XXX xx xxxxxxx xx XXXXXX2. 4.&xxxx;&xxxx;&xxxx;Xxx ECB xxxxx xxx xx xxxxxx xxx any xxxx, errors xx xxxxxxxxx xx xxx XXX (xxxxxxxxx xxx xxxxxxxxx, xxxxx xxx xxxxxxxxxxxxxx), or for xxx acts, errors xx xxxxxxxxx xx xxxxx parties xxxxxxxx xx xxxxxxxxxxxx xx xxxx access to xxx XXX’x network.“; |
|
8. |
Vkládá xx xxxx xxxxxx&xxxx;34x, xxxxx xxx: „Xxxxxxx&xxxx;34x Xxxxxxxxxxxx xxxxxxxxxx Xxxx xxx XXXXXX xxxxxx xx xxxxxxxxxxx xxx XXXXXX2 has xxxxxx xxxxxxxxx, T2S DCA xxxxxxx xxxxx become X2X XXX xxxxxxx xx the XXXXXX xxxxxx.“; |
|
9. |
Xxxxxx xx xxxxx „X2X network xxxxxxx xxxxxxxx“ (x&xxxx;xxxxxxxxx nebo xxxxxxx xxxxx) x&xxxx;xx.&xxxx;6 xxxx.&xxxx;1 xxxx. x) xxxx x), xx.&xxxx;9 xxxx.&xxxx;5, xx.&xxxx;10 xxxx.&xxxx;6, xx.&xxxx;14 xxxx.&xxxx;1 xxxx. x), xx.&xxxx;22 odst. 1, xx.&xxxx;22 xxxx.&xxxx;2, čl. 22 xxxx.&xxxx;3, xx.&xxxx;27 odst. 5, xx.&xxxx;28 odst. 1, čl. 29 xxxx.&xxxx;1 xxxxxxx XX x&xxxx;x&xxxx;xxxxxxxx 1 xxxxxxx X&xxxx;xx xxxxxxxxx odkazem „XXX“; |
|
10. |
X&xxxx;xxxxxxx X&xxxx;xx x&xxxx;xxxx.&xxxx;8 xxxxxxx. 4 xxxxxxxxx xxxxxxx x) tímto:
|
XXXXXXX XXX
Xxxxxxx XXX xxxxxxxxxx XXX/2007/7 se xxxx xxxxx:
|
1. |
Xxxxxx xx xxxxx „XXXX xxxxxxx xxxxxxx xxxxxxxx“ (v jednotném xxxx množném čísle) x&xxxx;xxxx příloze xx xxxxxxxxx xxxxxxx „XXX“; |
|
2. |
Xxxxxx&xxxx;1 xx xxxx xxxxx:
|
|
3. |
X&xxxx;xx.&xxxx;3 xxxx.&xxxx;1 xx zrušuje xxxxx na „Xxxxxxxx X: TIPS xxxxxxxxxxxx xxxxxxxxx xxxxxxxxxxxx“; |
|
4. |
Xxxxxx&xxxx;4 xx xxxx xxxxx:
|
|
5. |
X&xxxx;xx.&xxxx;6 odst. 1 xxxx. x) se bod x) nahrazuje xxxxx:
|
|
6. |
Xxxxxx&xxxx;9 xx xxxxxxxxx xxxxx: „Xxxxxxx&xxxx;9 Xxxxxxxxxxx xxxxxxxxxxxx xxxx xx XXX 1.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx xxxxx xxxxxx:
2.&xxxx;&xxxx;&xxxx;Xxx xxxxx xxxxxxxxxxxx xxxxxxx x&xxxx;xxxxxxxxxxx xxx xxx XXX xxxxx xx exclusively xxxxxxxx by xxx xxxxx xxx conditions xx xxxxx xxxxxxxx xxxxxxxx xx xxxxxxxx xx xx xxxxxxxxx 1(x). 3.&xxxx;&xxxx;&xxxx;Xxx xxxxxxxx to xx provided xx xxx XXX xxxxx xxx form xxxx xx xxx xxxxxxxx xx xx xxxxxxxxx xx the XXX xx respect of XXXXXX2. 4.&xxxx;&xxxx;&xxxx;Xxx XXX shall xxx xx xxxxxx xxx any xxxx, xxxxxx xx xxxxxxxxx xx xxx NSP (xxxxxxxxx its directors, xxxxx xxx xxxxxxxxxxxxxx), xx for xxx xxxx, xxxxxx xx xxxxxxxxx by third xxxxxxx selected xx xxxxxxxxxxxx xx xxxx xxxxxx xx xxx XXX’x xxxxxxx.“; |
|
7. |
Xxxxxx&xxxx;10 se xxxxxxx; |
|
8. |
Xxxxxx se xxxx xxxxxx&xxxx;11x, xxxxx xxx: „Xxxxxxx&xxxx;11x XXX xxxxxxxxxx 1.&xxxx;&xxxx;&xxxx;Xxx xxxxxxx XXX xxxxxxxxxx xxxxxxxx xxx xxxxx – IBAN xxxxxxx xxxxx xxx xxx purposes xx xxx XXX xxxxxxx. 2.&xxxx;&xxxx;&xxxx;Xxxx xxxxx may xx xxxxxx xx only xxx XXXX. Xx XXXX xxx xx xxxxxx xx one xx xxxxxxxx xxxxxxx. 3.&xxxx;&xxxx;&xxxx;Xxxxxxx&xxxx;29 xxxxx xxxxx xx xxx data contained xx xxx XXX xxxxxxxxxx.“; |
|
9. |
X&xxxx;xxxxxx&xxxx;12 xx zrušuje xxxxxxxx 9; |
|
10. |
Článek 16 xx xxxxxxxxx xxxxx: „Xxxxxxx&xxxx;16 Xxxxx xx xxxxxxx orders in XXXX XXX Xxx xxxxxxxxx xxx classified xx xxxxxxx orders xxx xxx xxxxxxxx xx xxx XXXX xxxxxxx:
|
|
11. |
X&xxxx;xxxxxx&xxxx;18 xx xxxxxxxx 6 xxxxxxxxx xxxxx: „6.&xxxx;&xxxx;&xxxx;Xxxxx x&xxxx;XXXX XXX xx XX xxxxxxxxx xxxxxxxx xxxxx, x&xxxx;XXXX XXX xx XXXX XX xxxxxxxxx xxxxxxx xxxxxxxxx transfer order xx x&xxxx;XXXX XX xxxxxxxxx xxxxxxx xx XXXX XXX liquidity xxxxxxxx order xxx xxxx accepted xx xxxxxxxx to xx Xxxxxxx&xxxx;17, xxx TARGET2-ECB xxxxx xxxxx xxxxxxx xxxxxxxxxx xxxxx are xxxxxxxxx xx the xxxxx'x xxxxxxx. If xxxxxxxxxx funds xxx xxx available xxx xxxxxxxxx xxxxxxxx xxxxx xxxxx xx rejected. Xx xxxxxxxxxx funds xxx xxxxxxxxx xxx xxxxxxxxx xxxxxxxx xxxxx xxxxx xx xxxxxxx xxxxxxxxxxx.“; |
|
12. |
X&xxxx;xx.&xxxx;20 xxxx.&xxxx;1 xx xxxxxxx b) nahrazuje xxxxx:
|
|
13. |
X&xxxx;xxxxxx&xxxx;30 se odstavec 1 nahrazuje tímto: „1. TIPS XXX xxxxxxx xxxxx xx xxxxxx xx xx aware xx, xxxxx xxxxxx xxxx xxx xxxxx xx xxxx to xxxxxxxxxxx xxxx xxxxxxxxxx to xxx xxxxxxxx xxxxxxxxx xxxxxxxxxxx xxxx xxx xxxxxxxxxxx on them xxxxxxxx xx legislation xx xxxx xxxxxxxxxx. Xxxx xxxxx be xxxxxx xx xx xxxxx of, xxx xxxxx xxxxxx with xxx xxxxxxxxxxx on xxxx relating xx xxxxxxxxxxx xx xxxxxxxxxx xx xxxxx xxxxxxxxxx xxx xxx xxxxxxxxx xx xxxxxxxxx, proliferation-sensitive xxxxxxx activities xxx xxx xxxxxxxxxxx of xxxxxxx xxxxxxx delivery xxxxxxx, in xxxxxxxxxx xx terms xx xxxxxxxxxxxx xxxxxxxxxxx xxxxxxxx xxxxxxxxxx xxx payments xxxxxxx or credited xx xxxxx XXXX XXXx. XXXX XXX xxxxxxx xxxxxx xxxx xxxx xxx informed xxxxx xxxxx xxxxxx XXX'x xxxx xxxxxxxxx xxxxxx xxxxx to xxxxxxxx xxxx x&xxxx;xxxxxxxxxxx xxxxxxxxxxxx with xxxx XXX.“; |
|
14. |
Xxxxxx xx nový xxxxxx&xxxx;35x, xxxxx xxx: „Xxxxxxx&xxxx;35x Xxxxxxxxxxxx xxxxxxxxx Xxxx xxx XXXXXX xxxxxx is operational xxx xxx XXXXXX2 xxx xxxxxx xxxxxxxxx, XXXX XXX holders xxxxx become XXXX XXX xxxxxxx in xxx TARGET system.“; |
|
15. |
V dodatku X&xxxx;xx tabulka x&xxxx;xxxxxxxx 2 xxxxxxxxx xxxxx:
|
|
16. |
X&xxxx;xxxxxxx X&xxxx;xx v odst. 6 xxxxxxx. 1 xxxxxxxxx xxxxxxx x) tímto:
|
|
17. |
X&xxxx;xxxxxxx XX se xxxxxxx xxxxxxxx 2; |
|
18. |
Xxxxxxx X&xxxx;xx xxxxxxx. |