ROZHODNUTÍ EVROPSKÉ XXXXXXXXX XXXXX (EU) 2021/1758
ze xxx 21.&xxxx;xxxx 2021,
xxxxxx xx mění xxxxxxxxxx XXX/2007/7 o podmínkách XXXXXX2-XXX (XXX/2021/43)
XXXXXXX XXXX XXXXXXXX XXXXXXXXX XXXXX,
x&xxxx;xxxxxxx na Xxxxxxx x&xxxx;xxxxxxxxx Evropské xxxx, a zejména xx xxxxx a čtvrtou xxxxxxx xx.&xxxx;127 odst. 2 xxxx xxxxxxx,
x&xxxx;xxxxxxx xx xxxxxx Xxxxxxxxxx xxxxxxx xxxxxxxxxxx xxxx x&xxxx;Xxxxxxxx xxxxxxxxx xxxxx, a zejména xx xxxxxx&xxxx;11.6 a články 17, 22 x&xxxx;23 xxxxxx xxxxxxx,
xxxxxxxx x&xxxx;xxxxx důvodům:
(1) |
Rada xxxxxxxxx změnila (1) dne 20.&xxxx;xxxxxxxx 2021 obecné xxxxxx Evropské xxxxxxxxx xxxxx XXX/2012/27&xxxx;(2) s cílem: x) vyjasnit, xx xxxxxxxx TIPS XXX xxxxx x&xxxx;XXXXXX2 xxxxxxxxx xxxxxxxxxxxxxxx jednotného xxxxxxx xxxxx xxxxxxxxxxxxxx Xxxxxxxxxxx (Xxxxxxxxxx Xxxxxx Market Xxxxxxxxxxxxxx Gateway) xx xxxxxxxxx 2021 x&xxxx;xxxxxxxx X2X DCA xxxxx x&xxxx;XXXXXX2 xxxxxxxxxxxxxxx tohoto xxxxxxx xxxxxxxxx od xxxxxx 2022; x) xxxxxxxx x&xxxx;xxxxxxxx xxxxxxxx xxxxxxxx se dodržování xxxxxxxxx na xxxxxxxxxx xxxxxxxxx bodu TARGET2, xxx se xxxxxxxxx, xx se xxxxxx XXXXXX2 xxxx dále xxxxxxx xxx, xxx xxx xxxxxxx xxxxx xxxxxxx v oblasti kybernetické xxxxxxxxxxx; x) xxxxxx xxxxxxxxx, aby xxxxxxxx xxxx PM, jejich xxxxxxx xxxxxxxxx a adresovatelní xxxxxxxx xxxx XXX, xxxxx xxxxxxxxxxx x&xxxx;xxxxxxxxxxx xxxxxxx XXX Inst xxxxxxxx dohody x&xxxx;xxxxxxxxxx xxxxxxx xxx okamžité xxxxxxxxxxxxx převody XXXX, xxxx x&xxxx;xxxxxxx xxxxxx xxxxxxxxxxx xx xxxxxxxxx XXXX prostřednictvím TIPS XXX, xxx aby xx xxxxxxxxx xxxxxxxxxx xxxxxxxxxx xxxxxx x&xxxx;xxxx Xxxx; x) zavést xxxxxxxxxxxxxxx, xxxxx jde x&xxxx;xxxxxxx xxxxxxx zůstatků x&xxxx;xxxx účastníků v TARGET2 xx xxxxxxxxxxxx xxxxxxxxxxx xxxx x&xxxx;xxxxxxxx systému XXXXXX, xxx byla xxxxxxxxx právní jistota, x&xxxx;x) xxxxxxxx x&xxxx;xxxxxxxxxxxx xxxxxxx xxxxx aspekty xxxxxxxx zásad XXX/2012/27. |
(2) |
Xxxxxxx xxxx xxxxxxxxxx xxxxxxx xxxxxxxxxxx T2-T2S, xxxx x&xxxx;xxxxx xxxxxx xxxxxxx xxxxxx xxxxxxxx xxxxxxxx xxxxxxxxxxxxxxx, xxxxx xxx x&xxxx;xxxxxxx xxxxxxx xxxxxxxx x&xxxx;xxxx xxxxxxxxx x&xxxx;XXXXXX2-XXX xx xxxxxxxxxxxx nástupnické xxxx. |
(3) |
Xxxxx xxxxxxxx xxxxx XXX/2012/27, xxxxx mají xxxx na podmínky XXXXXX2-XXX, xx třeba xxxxxxxxx v rozhodnutí Xxxxxxxx xxxxxxxxx xxxxx XXX/2007/7&xxxx;(3). |
(4) |
Xxxxxxxxxx XXX/2007/7 xx xxxxx xxxxx odpovídajícím způsobem xxxxxx, |
XXXXXXX TOTO XXXXXXXXXX:
Xxxxxx&xxxx;1
Xxxxx
Xxxxxxx I, II x&xxxx;XXX xxxxxxxxxx XXX/2007/7 xx mění x&xxxx;xxxxxxx x&xxxx;xxxxxxxxx xxxxxx xxxxxxxxxx.
Článek 2
Závěrečná xxxxxxxxxx
Xxxx rozhodnutí xxxxxxxx x&xxxx;xxxxxxxx pátým xxxx xx zveřejnění x&xxxx;Xxxxxxx xxxxxxxx Xxxxxxxx xxxx.
Xxxxxxx se xxx xxx 21.&xxxx;xxxxxxxxx 2021, x&xxxx;xxxxxxxx xxxx.&xxxx;1 xxxx. x) x&xxxx;xxxxxxxx 7 x&xxxx;9 xxxxxxx II xxxxxx xxxxxxxxxx, xxxxx xx xxxxxxx xxx xxx 13. června 2022.
Ve Frankfurtu nad Xxxxxxx xxx 21.&xxxx;xxxx 2021.
Xxxxxxxxxxx ECB
Christine LAGARDE
(1) Obecné xxxxxx Xxxxxxxx xxxxxxxxx xxxxx (XX) 2021/1759 xx xxx 20.&xxxx;xxxxxxxx 2021, xxxxxxx xx xxxx obecné xxxxxx XXX/2012/27 x&xxxx;xxxxxxxxxxxxxx expresním xxxxxxxxxxxxxxx xxxxxxx xxxxxxxxx xxxxxx x&xxxx;xxxxxxx xxxx (XXXXXX2) (XXX/2021/30) [(xxx xxxxxx 45 x&xxxx;xxxxx xxxxx Xxxxxxxx xxxxxxxx).
(2)&xxxx;&xxxx;Xxxxxx xxxxxx Evropské xxxxxxxxx xxxxx ECB/2012/27 ze xxx 5.&xxxx;xxxxxxxx 2012 x&xxxx;xxxxxxxxxxxxxx expresním xxxxxxxxxxxxxxx xxxxxxx xxxxxxxxx xxxxxx x&xxxx;xxxxxxx xxxx (XXXXXX2) (Xx. věst. X&xxxx;30, 30.1.2013, x. 1).
(3) Rozhodnutí Xxxxxxxx centrální banky XXX/2007/7 xx dne 24.&xxxx;xxxxxxxx 2007 x&xxxx;xxxxxxxxxx XXXXXX2-XXX (Xx. xxxx. X&xxxx;237, 8.9.2007, x. 71).
XXXXXXX X
Xxxxxxx X&xxxx;xxxxxxxxxx XXX/2007/7 xx xxxx xxxxx:
1. |
Xxxxxx&xxxx;1 xx xxxx xxxxx:
|
2. |
X&xxxx;xxxxxx&xxxx;2 xxxxxx xxxxxxxx xx xxxxxxxx xxxx xxxx, xxxxx xxx:
|
3. |
Článek 3 xx xxxx xxxxx:
|
4. |
Xxxxxx&xxxx;5 se nahrazuje xxxxx: „Xxxxxxx&xxxx;5 Xxxxxx xxxxxxxxxxxx XX xxxxxxx xxxxxxx xx XXXXXX2-XXX xxx direct xxxxxxxxxxxx xxx xxxxx xxxxxx xxxx xxx xxxxxxxxxxxx xxx out xx Xxxxxxx&xxxx;8(1) xxx&xxxx;(2). They xxxxx have at xxxxx xxx XX xxxxxxx xxxx xxx XXX. XX account xxxxxxx xxxx have xxxxxxx xx xxx XXX Xxxx xxxxxx xx signing xxx XXXX Xxxxxxx Xxxxxx Xxxxxxxx Xxxxxxxxx Xxxxxxxxx xxxxx xx and xxxxx remain xxxxxxxxx xx xxx XXXX Xxxxxxxx xx all xxxxx, xxxxxx xx x&xxxx;XXXX XXX xxxxxx xx xx x&xxxx;xxxxxxxxx xxxxx xxx x&xxxx;XXXX XXX xxxxxx.“; |
5. |
Xxxxxx&xxxx;22 xx xxxxxxxxx xxxxx: „Xxxxxxx&xxxx;22 Xxxxxxxx Xxxxxxxxxxxx xxx Control Xxxxxxxxxx 1.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx xxxxx xxxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx to xxxxxxx their xxxxxxx xxxx xxxxxxxxxxxx access xxx xxx. Xxxxxxxxxxxx xxxxx xx xxxxxxxxxxx xxxxxxxxxxx for the xxxxxxxx xxxxxxxxxx xx xxx confidentiality, xxxxxxxxx xxx xxxxxxxxxxxx xx xxxxx xxxxxxx. 2.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx xxxxx xxxxxx the XXX xx xxx security-related xxxxxxxxx xx xxxxx xxxxxxxxx xxxxxxxxxxxxxx and, xxxxx xxxxxxxxxxx, xxxxxxxx-xxxxxxx xxxxxxxxx that xxxxx xx xxx technical xxxxxxxxxxxxxx xx the xxxxx party xxxxxxxxx. Xxx ECB may xxxxxxx further xxxxxxxxxxx xxxxx the incident xxx, xx xxxxxxxxx, xxxxxxx xxxx xxx xxxxxxxxxxx xxxx appropriate xxxxxxxx xx xxxxxxx x&xxxx;xxxxxxxxxx xx xxxx xx event. 3. The XXX xxx xxxxxx xxxxxxxxxx xxxxxxxx xxxxxxxxxxxx, in xxxxxxxxxx xxxx regard xx cybersecurity or xxx prevention xx xxxxx, xx xxx xxxxxxxxxxxx xxx/xx xx xxxxxxxxxxxx xxxx are xxxxxxxxxx critical xx xxx XXX. 4.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx xxxxx xxxxxxx xxx XXX xxxx: (x) permanent xxxxxx xx xxxxx xxxxxxxxxxx of xxxxxxxxx xx their xxxxxx xxxxxxx xxxxxxx xxxxxxxx’x xxxxxxxx xxxxxxxx xxxxxxxxxxxx, xxx (xx) xx xx annual xxxxx xxx XXXXXX2 xxxx-xxxxxxxxxxxxx xxxxxxxxx xx published xx xxx XXX’x xxxxxxx xx Xxxxxxx. 4x.&xxxx;&xxxx;&xxxx;Xxx XXX xxxxx xxxxxx xxx xxxxxxxxxxx’x xxxx-xxxxxxxxxxxxx xxxxxxxxx(x) xx the xxxxxxxxxxxx xxxxx xx xxxxxxxxxx with each xx xxx xxxxxxxxxxxx xxx out in xxx XXXXXX2 xxxx-xxxxxxxxxxxxx xxxxxxxxxxxx. These xxxxxxxxxxxx xxx xxxxxx in Xxxxxxxx XXX, which xx addition xx xxx other Xxxxxxxxxx xxxxxx xx Article 2(1), xxxxx form an xxxxxxxx part xx xxxxx Xxxxxxxxxx. 4x.&xxxx;&xxxx;&xxxx;Xxx xxxxxxxxxxx’x xxxxx of xxxxxxxxxx xxxx the xxxxxxxxxxxx xx the TARGET2 xxxx-xxxxxxxxxxxxx xxxxx be xxxxxxxxxxx xx xxxxxxx, xx increasing xxxxx xx severity: ‘xxxx xxxxxxxxxx’; ‘minor xxx-xxxxxxxxxx’; xx ‘major non-compliance’. Xxx xxxxxxxxx xxxxxxxx xxxxx: xxxx xxxxxxxxxx xx reached where xxxxxxxxxxxx xxxxxxx 100% xx xxx xxxxxxxxxxxx; xxxxx xxx-xxxxxxxxxx xx xxxxx a participant xxxxxxxxx xxxx xxxx 100% xxx xx least 66% xx the xxxxxxxxxxxx xxx xxxxx xxx-xxxxxxxxxx xxxxx x&xxxx;xxxxxxxxxxx xxxxxxxxx xxxx xxxx 66% xx the xxxxxxxxxxxx. If x&xxxx;xxxxxxxxxxx xxxxxxxxxxxx xxxx x&xxxx;xxxxxxxx xxxxxxxxxxx xx xxx xxxxxxxxxx xx it, xx shall xx xxxxxxxxxx xx compliant xxxx the respective xxxxxxxxxxx xxx xxx xxxxxxxx xx xxx xxxxxxxxxxxxxx. A participant xxxxx xxxxx to reach ‘xxxx xxxxxxxxxx’ xxxxx xxxxxx xx xxxxxx xxxx xxxxxxxxxxxxx xxx xx xxxxxxx to xxxxx full xxxxxxxxxx. Xxx XXX xxxxx xxxxxx xxx xxxxxxxx xxxxxxxxxxx authorities of xxx xxxxxx of xxxx xxxxxxxxxxx’x xxxxxxxxxx. 4x.&xxxx;&xxxx;&xxxx;Xx xxx participant xxxxxxx xx grant xxxxxxxxx xxxxxx xx its xxxxxxxxxxx of adherence xx xxxxx xxxxxx XXXx xxxxxxxx security xxxxxxxxxxxx xx xxxx xxx provide the XXXXXX2 xxxx-xxxxxxxxxxxxx the xxxxxxxxxxx’x xxxxx xx xxxxxxxxxx shall be xxxxxxxxxxx xx ‘major xxx-xxxxxxxxxx’. 4x.&xxxx;&xxxx;&xxxx;Xxx ECB xxxxx xxxxxxxx xxxxxxxxxx of xxxxxxxxxxxx xx xx xxxxxx xxxxx. 4x.&xxxx;&xxxx;&xxxx;Xxx ECB xxx impose xxx xxxxxxxxx xxxxxxxx xx xxxxxxx xx xxxxxxxxxxxx xxxxx level xx xxxxxxxxxx xxx xxxxxxxx xx minor or xxxxx xxx-xxxxxxxxxx, in xxxxxxxxxx order of xxxxxxxx:
|
6. |
X&xxxx;xxxxxx&xxxx;33 xx xxxxxxxx 1 xxxxxxxxx xxxxx: „1.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx xxxxx xx deemed xx be xxxxx xx, shall xxxxxx xxxx, xxx xxxxx xx xxxx to xxxxxxxxxxx xxxx compliance xx xxx relevant xxxxxxxxx xxxxxxxxxxx with xxx xxxxxxxxxxx xx xxxx relating xx xxxxxxxxxxx xx data xxxxxxxxxx. Xxxx xxxxx xx xxxxxx xx xx xxxxx xx, xxx xxxxx comply xxxx all xxxxxxxxxxx xx them relating xx xxxxxxxxxxx xx xxxxxxxxxx of xxxxx xxxxxxxxxx xxx xxx xxxxxxxxx of xxxxxxxxx, xxxxxxxxxxxxx-xxxxxxxxx nuclear xxxxxxxxxx xxx xxx xxxxxxxxxxx xx nuclear xxxxxxx xxxxxxxx xxxxxxx, xx xxxxxxxxxx xx xxxxx xx xxxxxxxxxxxx xxxxxxxxxxx xxxxxxxx concerning xxx xxxxxxxx xxxxxxx xx xxxxxxxx xx their XX xxxxxxxx. Xxxxxxxxxxxx xxxxx xxxxxx xxxx xxxx xxx xxxxxxxx xxxxx xxx XXXXXX2 xxxxxxx xxxxxxx provider’s xxxx xxxxxxxxx policy xxxxx to xxxxxxxx xxxx xxx xxxxxxxxxxx xxxxxxxxxxxx with xxx XXXXXX2 network service xxxxxxxx.“; |
7. |
Xxxxxx xx nový xxxxxx&xxxx;39x, xxxxx xxx: „Xxxxxxx&xxxx;39x Xxxxxxxxxxxx xxxxxxxxxx 1.&xxxx;&xxxx;&xxxx;Xxxx xxx XXXXXX xxxxxx is xxxxxxxxxxx xxx TARGET2 has xxxxxx xxxxxxxxx, XX xxxxxxx xxxxxxxx xxxxx xx xxxxxxxxxxx xx xxx xxxxxxx xxxxxx’x xxxxxxxxxxxxx successor xxxxxxxx xx xxx XXXXXX xxxxxx. 2.&xxxx;&xxxx;&xxxx;Xxx requirement that XX account holders, xxxxxxxx Xxxxxxxxxxxx and xxxxxxxxxxx XXX xxxxxxx xxxxxxxx xx the XXX Inst scheme xx xxxxxxxxx in xxx XXXX Xxxxxxxx xxxxxxxx to Xxxxxxx&xxxx;5 xxxxx xxxxx xx xx 25 February 2022.“; |
8. |
X&xxxx;xxxxxxx X&xxxx;xx v odst. 8 xxxxxxx. 4 xxxxxxxxx xxxxxxx x) xxxxx:
|
9. |
X&xxxx;xxxxxxx XX se x&xxxx;xxxxxxxx 6 xxxxxxxxx písmeno x) xxxxx:
|
10. |
Xxxxxxxx xx nový xxxxxxx VII, xxxxx xxx: „Xxxxxxxx XXX Xxxxxxxxxxxx xxxxxxxxx xxxxxxxxxxx xxxxxxxx xxxxxxxxxx xxx business xxxxxxxxxx xxxxxxxxxx Xxxxxxxxxxx xxxxxxxx xxxxxxxxxx Xxxxx xxxxxxxxxxxx xxx xxxxxxxxxx xx xxxx xxxxxxxxxxx, xxxxxx xxx xxxxxxxxxxx xxxxxxxxxxxx that x&xxxx;xxxxxxxx xxxxxxxxxxx xx not xxxxxxxxxx to it. Xx establishing the xxxxx of xxxxxxxxxxx xx xxx xxxxxxxxxxxx xxxxxx xxx xxxxxxxxxxxxxx, xxx participant xxxxxx xxxxxxxx xxx elements xxxx are xxxx xx xxx Xxxxxxx Xxxxxxxxxxx Xxxxx (XXX). Xxxxxxxxxxxx, xxx PTC xxxxxx xx a Point xx Xxxxx (PoE), x.x. x&xxxx;xxxxxx xxxxxxxx xx the creation xx xxxxxxxxxxxx (x.x. xxxxxxxxxxxx, xxxxx-xxxxxx xxx xxxx-xxxxxx xxxxxxxxxxxx, middleware), xxx ends xx xxx xxxxxx responsible xx send the xxxxxxx to XXXXX (x.x. XXXXX XXX Xxx) xx Xxxxxxxx (xxxx xxx xxxxxx xxxxxxxxxx xx Internet-based Xxxxxx). Xxxxxxxxxxx 1.1: Information xxxxxxxx policy The xxxxxxxxxx xxxxx set x&xxxx;xxxxx xxxxxx direction xx xxxx xxxx xxxxxxxx xxxxxxxxxx xxx demonstrate xxxxxxx xxx xxx xxxxxxxxxx to information xxxxxxxx through xxx xxxxxxxx, xxxxxxxx and xxxxxxxxxxx xx xx xxxxxxxxxxx xxxxxxxx xxxxxx xxxxxx xx xxxxxxxx xxxxxxxxxxx security xxx xxxxx resilience xxxxxx xxx organisation xx xxxxx xx xxxxxxxxxxxxxx, xxxxxxxxxx and xxxxxxxxx xx information xxxxxxxx xxx xxxxx xxxxxxxxxx xxxxx. The xxxxxx xxxxxx contain xx xxxxx xxx xxxxxxxxx xxxxxxxx: xxxxxxxxxx, xxxxx (xxxxxxxxx xxxxxxx xxxx xx organisation, human xxxxxxxxx, xxxxx management xxx.), xxxxxxxxxx xxx xxxxxxxxxx xx xxxxxxxxxxxxxxxx. Xxxxxxxxxxx 1.2: Xxxxxxxx organisation An xxxxxxxxxxx xxxxxxxx xxxxxxxxx xxxxx xx xxxxxxxxxxx xx implement xxx xxxxxxxxxxx security policy xxxxxx xxx organisation. Xxx xxxxxxxxxx xxxxx xxxxxxxxxx and review xxx xxxxxxxxxxxxx xx xxx xxxxxxxxxxx xxxxxxxx xxxxxxxxx xx xxxxxx xxx implementation of xxx xxxxxxxxxxx security xxxxxx (xx per Xxxxxxxxxxx 1.1) across xxx xxxxxxxxxxxx, xxxxxxxxx xxx allocation of xxxxxxxxxx xxxxxxxxx and xxxxxxxxxx xx security xxxxxxxxxxxxxxxx for xxxx xxxxxxx. Xxxxxxxxxxx 1.3: External xxxxxxx Xxx xxxxxxxx xx xxx xxxxxxxxxxxx’x information xxx xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx xxxxxx not xx xxxxxxx by xxx xxxxxxxxxxxx of, xxx/xx xxx dependence xx, xx external xxxxx/xxxxxxx xx xxxxxxxx/xxxxxxxx xxxxxxxx xx xxxx. Xxx xxxxxx to xxx xxxxxxxxxxxx’x information xxxxxxxxxx facilities by xxxxxxxx parties xxxxx xx xxxxxxxxxx. Xxxx xxxxxxxx xxxxxxx xx xxxxxxxx/xxxxxxxx of external xxxxxxx xxx xxxxxxxx xx xxxxxx xxx xxxxxxxxxxxx’x information xxxxxxxxxx xxxxxxxxxx, x&xxxx;xxxx xxxxxxxxxx xxxxx be xxxxxxx xxx xx xxxxxxxxx xxx xxxxxxxx xxxxxxxxxxxx xxx xxxxxxx requirements. Xxxxxxxx shall be xxxxxx and defined xx xx agreement xxxx xxxx xxxxxxxx xxxxxxxx xxxxx. Xxxxxxxxxxx 1.4: Xxxxx xxxxxxxxxx Xxx information xxxxxx, xxx business xxxxxxxxx and xxx xxxxxxxxxx information xxxxxxx, xxxx xx operating xxxxxxx, xxxxxxxxxxxxxxx, xxxxxxxx xxxxxxxxxxxx, off-the-shelf xxxxxxxx, xxxxxxxx xxx user-developed xxxxxxxxxxxx, in xxx xxxxx xx xxx Xxxxxxx Transaction Xxxxx xxxxx xx xxxxxxxxx xxx xxx have x&xxxx;xxxxxxxxx owner. Xxx xxxxxxxxxxxxxx for the xxxxxxxxxxx xxx xxx xxxxxxxxx of appropriate xxxxxxxx in the xxxxxxxx processes and xxx xxxxxxx IT xxxxxxxxxx xx safeguard xxx xxxxxxxxxxx assets xxxxx xx xxxxxxxx. Xxxx: xxx xxxxx xxx xxxxxxxx the xxxxxxxxxxxxxx of xxxxxxxx xxxxxxxx as xxxxxxxxxxx, xxx xxxxxxx xxxxxxxxxxx xxx xxx xxxxxx xxxxxxxxxx of xxx xxxxxx. Xxxxxxxxxxx 1.5: Xxxxxxxxxxx xxxxxx xxxxxxxxxxxxxx Xxxxxxxxxxx assets xxxxx be classified xx xxxxx of xxxxx xxxxxxxxxxx xx xxx smooth xxxxxxxx xx the xxxxxxx xx xxx xxxxxxxxxxx. Xxx xxxxxxxxxxxxxx xxxxx xxxxxxxx the xxxx, xxxxxxxxxx and xxxxxx xx xxxxxxxxxx xxxxxxxx xxxx xxxxxxxx xxx xxxxxxxxxxx asset xx xxx relevant xxxxxxxx xxxxxxxxx and xxxxx xxxx take xxxx xxxxxxxxxxxxx xxx xxxxxxxxxx XX xxxxxxxxxx. Xx xxxxxxxxxxx asset classification xxxxxx xxxxxxxx by xxx xxxxxxxxxx xxxxx xx xxxx xx xxxxxx xx appropriate xxx xx protection xxxxxxxx xxxxxxxxxx xxx xxxxxxxxxxx asset xxxxxxxxx (xxxxxxxxx xxxxxxx and xxxxxxxxxxx xx xxxxxxxxxxx xxxxxx) and xx xxxxxxxxxxx xxx need xxx xxxxxxxx xxxxxxxx xxxxxxxx. Xxxxxxxxxxx 1.6: Human xxxxxxxxx xxxxxxxx Xxxxxxxx responsibilities xxxxx xx xxxxxxxxx xxxxx xx xxxxxxxxxx xx xxxxxxxx job xxxxxxxxxxxx xxx in xxxxx xxx xxxxxxxxxx xx xxxxxxxxxx. Xxx xxxxxxxxxx for employment, xxxxxxxxxxx xxx xxxxx xxxxx xxxxx xxxxx xx xxxxxxxxxx xxxxxxxx, xxxxxxxxxx xxx xxxxxxxxx xxxx. Employees, contractors xxx xxxxx xxxxx xxxxx xx information xxxxxxxxxx xxxxxxxxxx xxxxx xxxx xx agreement xx xxxxx xxxxxxxx xxxxx and xxxxxxxxxxxxxxxx. Xx xxxxxxxx xxxxx xx xxxxxxxxx shall xx ensured among xxx xxxxxxxxx, contractors xxx xxxxx party xxxxx, xxx xxxxxxxxx xxx xxxxxxxx xx xxxxxxxx procedures and xxx correct use xx information xxxxxxxxxx xxxxxxxxxx xxxxx xx xxxxxxxx to xxxx xx minimise xxxxxxxx xxxxxxxx xxxxx. X&xxxx;xxxxxx xxxxxxxxxxxx xxxxxxx xxx xxxxxxxx xxxxxxxx xxxxxxxx xxxxx xx xxxxxxxxxxx xxx employees. Xxxxxxxxxxxxxxxx xxxxx xx xx xxxxx to ensure xxxx an xxxxxxxx’x, xxxxxxxxxx’x xx xxxxx xxxxx xxxx’x exit xxxx or xxxxxxxx xxxxxx xxx xxxxxxxxxxxx xx xxxxxxx, and xxxx the xxxxxx xx all equipment xxx the xxxxxxx xx xxx xxxxxx xxxxxx are completed. Requirement 1.7: Xxxxxxxx and xxxxxxxxxxxxx security Critical xx xxxxxxxxx information processing xxxxxxxxxx xxxxx xx xxxxxx in xxxxxx xxxxx, xxxxxxxxx xx xxxxxxx security xxxxxxxxxx, xxxx xxxxxxxxxxx xxxxxxxx xxxxxxxx and xxxxx xxxxxxxx. Xxxx shall xx physically xxxxxxxxx xxxx unauthorised xxxxxx, xxxxxx and xxxxxxxxxxxx. Xxxxxx shall xx xxxxxxx only xx xxxxxxxxxxx xxx fall xxxxxx xxx xxxxx xx Requirement 1.6. Xxxxxxxxxx xxx xxxxxxxxx xxxxx be xxxxxxxxxxx xx xxxxxxx xxxxxxxx xxxxx xxxxxxxxxx xxxxxxxxxxx xxxxxx xxxx xx xxxxxxx. Xxxxxxxxx xxxxx xx xxxxxxxxx xxxx physical xxx xxxxxxxxxxxxx xxxxxxx. Xxxxxxxxxx xx xxxxxxxxx (xxxxxxxxx equipment xxxx xxx-xxxx) and against xxx removal xx xxxxxxxx xx necessary xx xxxxxx xxx xxxx of xxxxxxxxxxxx xxxxxx to xxxxxxxxxxx xxx xx xxxxx xxxxxxx xxxx or xxxxxx xx equipment xx xxxxxxxxxxx. Special xxxxxxxx xxx xx xxxxxxxx to xxxxxxx xxxxxxx physical threats xxx xx safeguard xxxxxxxxxx xxxxxxxxxx xxxx xx xxx xxxxxxxxxx xxxxxx and cabling xxxxxxxxxxxxxx. Xxxxxxxxxxx 1.8: Xxxxxxxxxx xxxxxxxxxx Xxxxxxxxxxxxxxxx xxx xxxxxxxxxx xxxxx xx established xxx xxx xxxxxxxxxx xxx xxxxxxxxx of xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx xxxxxxxx xxx the xxxxxxxxxx xxxxxxx xx xxx Payment Xxxxxxxxxxx Xxxxx xxx-xx-xxx. Xx xxxxxxx xxxxxxxxx procedures, xxxxxxxxx xxxxxxxxx xxxxxxxxxxxxxx of XX systems, xxxxxxxxxxx xx duties shall xx xxxxxxxxxxx, xxxxx xxxxxxxxxxx, to reduce xxx risk xx xxxxxxxxx xx deliberate xxxxxx xxxxxx. Xxxxx xxxxxxxxxxx xx xxxxxx xxxxxx xx xxxxxxxxxxx xxx xx xxxxxxxxxx xxxxxxxxx xxxxxxx, xxxxxxxxxxxx xxxxxxxx shall xx xxxxxxxxxxx following x&xxxx;xxxxxx xxxx xxxxxxxx. Xxxxxxxx xxxxx be xxxxxxxxxxx xx xxxxxxx xxx xxxxxx xxx introduction xx malicious xxxx xxx xxxxxxx in xxx Xxxxxxx Transaction Xxxxx. Controls xxxxx xx also xxxxxxxxxxx (xxxxxxxxx user xxxxxxxxx) xx xxxxxxx, xxxxxx xxx xxxxxx xxxxxxxxx xxxx. Xxxxxx xxxx xxxxx xx xxxx xxxx xxxx trusted xxxxxxx (x.x. xxxxxx Xxxxxxxxx XXX xxxxxxxxxx xxx Xxxx Applets). Xxx xxxxxxxxxxxxx of xxx xxxxxxx (e.g. xxx xxx xx xxxxxxxxxx and plugins) xxxxx xx strictly xxxxxxxxxx. Xxxx backup xxx xxxxxxxx xxxxxxxx shall xx xxxxxxxxxxx xx xxx xxxxxxxxxx; xxxxx xxxxxxxx policies shall xxxxxxx a plan xx xxx xxxxxxxxxxx xxxxxxx xxxxx xx xxxxxx xx xxxxxxx xxxxxxxxx xx xxxxx xxxxxxxx. Xxxxxxx xxxx xxx xxxxxxxx xxx xxx security xx xxxxxxxx xxxxx xx monitored xxx xxxxxx xxxxxxxx xx xxxxxxxxxxx xxxxxxxx xxxxx xx recorded. Xxxxxxxx xxxx shall xx xxxx xx xxxxxx xxxx information xxxxxx xxxxxxxx are xxxxxxxxxx. Xxxxxxxx logs xxxxx xx regularly xxxxxxxx xx a sample xxxxx, xxxxx xx xxx xxxxxxxxxxx of xxx xxxxxxxxxx. Xxxxxx xxxxxxxxxx xxxxx xx used xx xxxxx xxx xxxxxxxxxxxxx xx xxxxxxxx xxxxx xxx identified xx xxxxxxxx for xxx security xx xxxxxxxx xxx xx xxxxxx xxxxxxxxxx to xx access policy xxxxx. Xxxxxxxxx xx xxxxxxxxxxx xxxxxxx organisations xxxxx xx xxxxx xx x&xxxx;xxxxxx xxxxxxxx xxxxxx, xxxxxxx out in xxxx xxxx exchange xxxxxxxxxx xxxxx xxx xxxxxxxx parties and xxxxx xx xxxxxxxxx xxxx any xxxxxxxx xxxxxxxxxxx. Third xxxxx xxxxxxxx xxxxxxxxxx xxxxxxxx xx xxx xxxxxxxx xx information with XXXXXX2 (xxxx xxxxxxxx xxxxxxxx xxxx x&xxxx;Xxxxxxx Xxxxxx xx xxxxxxxx 2 of xxx xxxxx section of xxx XXXXXX2 xxxx-xxxxxxxxxxxxx xxxxxxxxxxx document) xxxx xx xxxx xxxxx x&xxxx;xxxxxx xxxxxxxxx xxxx xxx xxxxx party. Requirement 1.9: Access control Access xx xxxxxxxxxxx xxxxxx xxxxx xx xxxxxxxxx xx the xxxxx xx xxxxxxxx xxxxxxxxxxxx (xxxx-xx-xxxx&xxxx;(1)) xxx xxxxxxxxx xx xxx xxxxxxxxxxx xxxxxxxxx xx xxxxxxxxx xxxxxxxx (xxxxxxxxx xxx xxxxxxxxxxx xxxxxxxx xxxxxx). Xxxxx xxxxxx xxxxxxx xxxxx xxxxx xx xxxxxxx based xx xxx xxxxxxxxx xx xxxxx privilege (2) xx xxxxxxx xxxxxxx xxx xxxxx xx the xxxxxxxxxxxxx xxxxxxxx xxx XX processes. Where xxxxxxxx (e.g. xxx xxxxxx management) xxxxxxx xxxxxx xxxxxxx xxxxxx xx xxxxxxxxxx xxxx xxxxxxxx xxxxxx xxxxxxx xxxxxx xxxxx xxx xxxxxxxx xxxxxxxxxxxx xxxxxxxx xx xxxxx (x.x. xxxxxxxxxx, personal xxxx xxxxxxxxxxxxx). Xxxxxx xxx documented xxxxxxxxxx xxxxx be xx xxxxx xx xxxxxxx xxx allocation xx xxxxxx xxxxxx xx xxxxxxxxxxx xxxxxxx xxx services that xxxx xxxxxx xxx xxxxx xx the Xxxxxxx Transaction Chain. Xxx xxxxxxxxxx xxxxx xxxxx xxx xxxxxx xx xxx lifecycle xx xxxx xxxxxx, xxxx xxx initial xxxxxxxxxxxx of xxx xxxxx to the xxxxx xxxxxxxxxxxxxx xx xxxxx that no xxxxxx require xxxxxx. Xxxxxxx xxxxxxxxx xxxxx xx xxxxx, xxxxx xxxxxxxxxxx, xx xxx xxxxxxxxxx xx xxxxxx rights xx such xxxxxxxxxxx xxxx xxx xxxxx xx those xxxxxx xxxxxx xxxxx xxxx xx a severe adverse xxxxxx xx the xxxxxxxxxx xx xxx xxxxxxxxxxx (e.g. xxxxxx xxxxxx allowing system xxxxxxxxxxxxxx, override xx xxxxxx xxxxxxxx, xxxxxx xxxxxx xx xxxxxxxx xxxx). Xxxxxxxxxxx xxxxxxxx shall xx xxx xx xxxxx xx xxxxxxxx, xxxxxxxxxxxx xxx xxxxxxxxx xxxxx xx xxxxxxxx xxxxxx xx xxx xxxxxxxxxxxx’x xxxxxxx, x.x. xxx local and xxxxxx xxxxxx to xxxxxxx xx xxx Xxxxxxx Xxxxxxxxxxx Xxxxx. Xxxxxxxx xxxxxxxx xxxxx xxx be xxxxxx xx xxxxx to xxxxxx xxxxxxxxxxxxxx. Xxx xxxxxxxxx, xxxxx shall xx xxxxxxxxxxx xxx xxxxxxxx xx specific xxxxxxxx xx ensure xxxx xxxxxxxxx xxxxxx xx xxxxxx xxxxxxx, x.x. xxxxxxxxxx rules and xxxxxxx-xxxx xxxxxxxx. A safe xxxxxxxx xxxxxxxx xxx/xx xxxxx xxxxxxxx xxxxx xx xxxxxxxxxxx. X&xxxx;xxxxxx xxxxx xx xxxxxxxxx xxx xxxxxxxxxxx on xxx xxx xx cryptographic xxxxxxxx xx xxxxxxx xxx xxxxxxxxxxxxxxx, xxxxxxxxxxxx xxx integrity xx xxxxxxxxxxx. X&xxxx;xxx xxxxxxxxxx xxxxxx xxxxx be xxxxxxxxxxx xx xxxxxxx xxx use of xxxxxxxxxxxxx xxxxxxxx. Xxxxx xxxxx xx policy xxx xxxxxxx confidential xxxxxxxxxxx xx xxxxxx xx xx xxxxx (e.g. x&xxxx;xxxxx xxxxxx, a clear xxxx policy) xx xxxxxx xxx risk xx xxxxxxxxxxxx xxxxxx. Xxxx xxxxxxx xxxxxxxx, the xxxxx xx xxxxxxx xx an xxxxxxxxxxx xxxxxxxxxxx xxxxx xx xxxxxxxxxx xxx xxxxxxxxxxx xxxxxxxxx xxx xxxxxxxxxxxxxx xxxxxxxx xxxxx xx xxxxxxx. Xxxxxxxxxxx 1.10: Information xxxxxxx xxxxxxxxxxx, development xxx xxxxxxxxxxx Xxxxxxxx xxxxxxxxxxxx xxxxx be xxxxxxxxxx xxx xxxxxx xxxxx xx xxx xxxxxxxxxxx xxx/xx implementation xx xxxxxxxxxxx systems. Appropriate controls xxxxx xx xxxxx xxxx applications, xxxxxxxxx xxxx-xxxxxxxxx applications, xx xxxxxx xxxxxxx xxxxxxxxxx. Xxxxx xxxxxxxx xxxxx xxxxxxx xxx xxxxxxxxxx xx xxxxx data, xxxxxxxx xxxxxxxxxx xxx xxxxxx data. Xxxxxxxxxx xxxxxxxx xxx be xxxxxxxx xxx xxxxxxx xxxx process, or xxxx xx impact xx, sensitive, xxxxxxxx xx xxxxxxxx xxxxxxxxxxx. Xxxx xxxxxxxx shall xx determined xx xxx xxxxx xx xxxxxxxx xxxxxxxxxxxx xxx xxxx assessment xxxxxxxxx xx the established xxxxxxxx (x.x. xxxxxxxxxxx xxxxxxxx xxxxxx, cryptographic xxxxxxx policy). The operational xxxxxxxxxxxx xx xxx xxxxxxx shall xx xxxxxxxxxxx, documented xxx xxxxxx prior xx xxxxx xxxxxxxxxx xxx xxx. As regards xxxxxxx xxxxxxxx, appropriate xxxxxxxx, xxxxxxxxx xxxxxxxxxxxx xxx secure xxxxxxxxxx, xxxxxx xx xxxxxxxxxxx xxxxx on xxx xxxxxxxxxxx of data xxxxx xxx the xxxxx xx risk xx the xxxxxxx xxxxx xx xxx xxxxxxxxxxxx. Xxxxx xxxxx xx specific xxxxxxxx xx xxxxxxx xxxxxxxxx xxxxxxxxxxx xxxxxxx xxxx xxxxxx xxxxxxxx. Xxxxxx xx xxxxxx files and xxxxxxx xxxxxx xxxx xxxxx be controlled xxx XX xxxxxxxx xxx xxxxxxx xxxxxxxxxx xxxxxxxxx in a secure xxxxxx. Care xxxxx xx xxxxx to xxxxx xxxxxxxx xx xxxxxxxxx xxxx in xxxx xxxxxxxxxxxx. Xxxxxxx xxx xxxxxxx environments xxxxx xx strictly xxxxxxxxxx. Deployment xx xxxxxxx in xxxxxxxxxx xxxxx xx xxxxxxxx xxxxxxxxxx. X&xxxx;xxxx xxxxxxxxxx xx xxx xxxxx xxxxxxx xx xx xxxxxxxx xx xxxxxxxxxx xxxxx xx conducted. Regular xxxxxxxx xxxxxxx activities xx xxxxxxx xx xxxxxxxxxx xxxxx also xx xxxxxxxxx according xx x&xxxx;xxxxxxxxxx xxxx xxxxx xx xxx xxxxxxx of x&xxxx;xxxx xxxxxxxxxx, xxx security xxxxxxx xxxxx xxxxxxx, xx xxxxx, xxxxxxxxxxxxx xxxxxxxxxxx. Xxx of xxx shortcomings xxxxxxxxxxx xxxxxx xxx security xxxxxxx xxxxxxxxxx xxxxx xx xxxxxxxx xxx xxxxxx plans xx xxxxx xxx xxxxxxxxxx xxx xxxxx xx xxxxxxxx and followed xx in x&xxxx;xxxxxx xxxxxxx. Xxxxxxxxxxx 1.11: Xxxxxxxxxxx xxxxxxxx xx xxxxxxxx&xxxx;(3) xxxxxxxxxxxxx Xx xxxxxx xxxxxxxxxx xx xxx participant’s xxxxxxxx xxxxxxxxxxx xxxxxxx xxxx xxx accessible xx xxxxxxxxx, xxxxxxxxxxx xxxxxxxx xxxxxxxxxxxx xxx xxxxxxxxxx xxx xxxxx xxxxxxxxxx xxxx supplier’s xxxxxx xxxxx xx xxxxxxxxxx xxx xxxxxxxx xxxxxx upon with xxx xxxxxxxx. Xxxxxxxxxxx 1.12: Xxxxxxxxxx xx xxxxxxxxxxx xxxxxxxx xxxxxxxxx xxx xxxxxxxxxxxx Xx ensure a consistent xxx xxxxxxxxx xxxxxxxx xx the xxxxxxxxxx xx xxxxxxxxxxx xxxxxxxx xxxxxxxxx, xxxxxxxxx communication xx xxxxxxxx events xxx xxxxxxxxxx, roles, xxxxxxxxxxxxxxxx xxx xxxxxxxxxx, xx xxxxxxxx xxx xxxxxxxxx xxxxx, shall xx xxxxxxxxxxx and xxxxxx xx xxxxxx x&xxxx;xxxxx, xxxxxxxxx and xxxxxxx xxx xxxxxx xxxxxxx xxxx xxxxxxxxxxx xxxxxxxx xxxxxxxxx xxxxxxxxx xxxxxxxxx xxxxxxx to x&xxxx;xxxxx-xxxxxxx xxxxx (x.x. x&xxxx;xxxxx xxxxxxx by xx external xxxxxxxx xx xx an xxxxxxx). Personnel involved xx xxxxx xxxxxxxxxx xxxxx be adequately xxxxxxx. Xxxxxxxxxxx 1.13: Technical xxxxxxxxxx xxxxxx X&xxxx;xxxxxxxxxxx’x xxxxxxxx xxxxxxxxxxx systems (e.g. xxxx xxxxxx xxxxxxx, xxxxxxxx xxxxxxxx xxx xxxxxxxx xxxxxxx xxxxxxxxxxxx) xxxxx be regularly xxxxxxxx xxx xxxxxxxxxx xxxx xxx organisation’s xxxxxxxxxxx framework of xxxxxxxx (x.x. information xxxxxxxx xxxxxx, xxxxxxxxxxxxx xxxxxxx policy). Requirement 1.14: Xxxxxxxxxxxxxx Xxxxx xxxxxxx xxxxxxxx xxxxx comply xxxx xxx xxx security xxxxxxxx xxxx xxx xxx xxx xxxxxxxx xxxxxxxx xxx systems (x.x. hardening, logging). Xxxxxxxx xxxxxxxx to xxxxxxxxxxx xxxx xxxxxxx: xxxxxxxxx xx xxx xxxxxxxxxx xxx xxx xxxxxxx operating xxxxxx, xxxxxxx xxxxxxxx, xxxxxx xxxxxxxxxx of xxxxxxxxx xxxxxxxxxxxx (x.x. production xxx xxxxxxxxxxx). Xxxxxxxxxxx xxxxxxxxxx, logging and xxxxxxxxxx as xxxx xx xxxxxxxx xx xxxxxx rights, in xxxxxxxxxx for xxxx xxxxxxxxxx xxxxxxxx, xxxxx xx xxxxxxxxxxx xxxxx xx x&xxxx;xxxx xxxxxxxxxx. Xxxxx xxxxxxx xxxxxxxx xxxxxxx by xxx xxxx hypervisor xxxxx xxxx a similar xxxx xxxxxxx. Xxxxxxxxxxx 1.15: Xxxxx xxxxxxxxx Xxx xxxxx xx xxxxxx and/or xxxxxx xxxxx solutions in xxx Xxxxxxx Transaction Xxxxx xxxx xx xxxxx xx a formal xxxx assessment, xxxxxx xxxx account xxx xxxxxxxxx controls xxx xxx contractual xxxxxxx xxxxxxx to xxx xxxxx xxxxxxxx. Xx xxxxxx xxxxx xxxxxxxxx xxx xxxx, xx xx xxxxxxxxxx xxxx xxx xxxxxxxxxxx xxxxx xx xxx xxxxxxx xxxxxx xx the xxxxxxx xxx xx the xxxxxxxxx systems. Xxx xx-xxxxxxxx xxxxxxxxxx xx xxx hybrid xxxxxxxxx xxxx xx xxxxxxxxxx xxxx the xxxxx xx-xxxxxxxx systems. Business continuity xxxxxxxxxx (applicable xxxx xx xxxxxxxx xxxxxxxxxxxx) Xxx xxxxxxxxx requirements (2.1 xx 2.6) relate xx xxxxxxxx xxxxxxxxxx xxxxxxxxxx. Xxxx XXXXXX2 xxxxxxxxxxx classified xx xxx Xxxxxxxxxx xx xxxxx xxxxxxxx xxx xxx xxxxxx xxxxxxxxxxx xx the TARGET2 xxxxxx xxxxx xxxx x&xxxx;xxxxxxxx continuity xxxxxxxx xx xxxxx xxxxxxxxxx xxx xxxxxxxxx elements.
|
(1) The xxxx-xx-xxxx principle xxxxxx xx xxx xxxxxxxxxxxxxx xx xxx xxx xx xxxxxxxxxxx xxxx xx xxxxxxxxxx xxxxx xxxxxx xx xx xxxxx xx xxxxx xxx her/his duties.
(2) The xxxxxxxxx xx least xxxxxxxxx refers xx xxxxxxxxx x&xxxx;xxxxxxx’x access xxxxxxx xx an XX xxxxxx xx xxxxx xx xxxxx xxx xxxxxxxxxxxxx xxxxxxxx xxxx.
(3)&xxxx;&xxxx;X&xxxx;xxxxxxxx xx xxx xxxxxxx xx xxxx xxxxxxxx xxxxxx be xxxxxxxxxx xx xxx xxxxx party (xxx xxx personnel) xxxxx xx xxxxx contract (xxxxxxxxx), xxxx the xxxxxxxxxxx, to xxxxxxx x&xxxx;xxxxxxx xxx under xxx xxxxxxx agreement xxx third party (xxx xxx xxxxxxxxx) xx xxxxxxx xxxxxx, xxxxxx xxxxxxxx xx xx-xxxx, xx xxxxxxxxxxx xxx/xx xxxxxxxxxxx xxxxxxx xxx/xx information xxxxxxxxxx xxxxxxxxxx xx the xxxxxxxxxxx xx xxxxx xx xxxxxxxxxx to xxx scope xxxxxxx xxxxx xxx xxxxxxxx xx the TARGET2 xxxx-xxxxxxxxxxxxx.
XXXXXXX XX
Xxxxxxx II xxxxxxxxxx XXX/2007/7 se xxxx takto:
1. |
Článek 1 xx xxxx xxxxx:
|
2. |
V čl. 4 odst. 2 xx xxxxxxx fc) xxxxxxxxx tímto:
|
3. |
X&xxxx;xx.&xxxx;4 odst. 2 xx xxxxxx xxxx xxxxxxx xx), xxxxx xxx:
|
4. |
V článku 4 xx xxxxxxxx 3 xxxxxxxxx tímto: „3. TARGET2 provides xxxx-xxxx xxxxx xxxxxxxxxx xxx payments in xxxx, xxxx xxxxxxxxxx xx xxxxxxx bank xxxxx xxxxxx XX xxxxxxxx, T2S DCAs xxx XXXX XXXx. XXXXXX2 xx xxxxxxxxxxx xxx xxxxxxxxx xx xxx xxxxx xx xxx XXX xxxxxxx xxxxx payment xxxxxx xxx xxxxxxxxx and xxxxxxxxx and through xxxxx xxxxxxxx xxx xxxxxxxxxx xxxxxxxx xx xxx xxxx xxxxxxxxx xxxxxx. Xx far xx the xxxxxxxxx xxxxxxxxx xx the X2X XXXx xx xxxxxxxxx, XXXXXX2 xx xxxxxxxxxxx established and xxxxxxxxx xx the xxxxx xx xxx X2X Xxxxxxxx. Xx xxx as the xxxxxxxxx xxxxxxxxx xx xxx XXXX XXXx xxx XXXX AS xxxxxxxxx accounts xx xxxxxxxxx, XXXXXX2 xx xxxxxxxxxxx xxxxxxxxxxx xxx xxxxxxxxx xx xxx xxxxx xx the XXXX Platform. Xxx XXX xx xxx xxxxxxxx xx xxxxxxxx xxxxx these Xxxxxxxxxx. Xxxx xxx xxxxxxxxx xx xxx XXX-xxxxxxxxx XXXx and xxx 4XXx shall xx xxxxxxxxxx acts xxx xxxxxxxxx xx the XXX, xxx xxxxx xx shall assume xxxxxxxxx xx xxxxxxxxxx xxxx Xxxxxxx&xxxx;21 xx xxxx Xxxxx. Xxxxxxxxxxxxx xxxxxxxx to xxxxx Xxxxxxxxxx xxxxx xxx xxxxxx a contractual relationship xxxxxxx X2X XXX xxxxxxx and xxx XXX-xxxxxxxxx XXXx xx xxx 4CBs xxxx xxx of the xxxxxx xxxx in xxxx xxxxxxxx. Instructions, xxxxxxxx xx information xxxxx x&xxxx;X2X XXX xxxxxx xxxxxxxx from, xx sends to, xxx SSP or X2X Platform in xxxxxxxx xx the xxxxxxxx provided under xxxxx Xxxxxxxxxx xxx xxxxxx to xx xxxxxxxx from, xx xxxx to, xxx XXX.“; |
5. |
X&xxxx;xxxxxx&xxxx;8 se xxxxxxxx 3 xxxxxxxxx tímto: „3. Where xxx ECB has xxxxxxx x&xxxx;xxxxxxx xx x&xxxx;X2X DCA xxxxxx xxxxxxxx xx paragraph 1, xxxx X2X XXX xxxxxx xx xxxxxx xx xxxx xxxxx xxx participating XXX(x) x&xxxx;xxxxxxx to xxxxx the T2S XXX xxxx the xxxxxxx relating xx xxxxxxxxxx xxxxxxxxxxxx xxxxxxxx xx xxxxx securities xxxxxxxx.“; |
6. |
X&xxxx;xxxxxx&xxxx;28 xx odstavec 1 xxxxxxxxx tímto: „1. T2S XXX xxxxxxx xxxxx xx xxxxxx xx xx aware xx, xxxxx xxxxxx xxxx, xxx xxxxx be xxxx xx xxxxxxxxxxx xxxx xxxxxxxxxx to xxx xxxxxxxx competent xxxxxxxxxxx xxxx xxx xxxxxxxxxxx on xxxx xxxxxxxx xx xxxxxxxxxxx xx data xxxxxxxxxx. Xxxx xxxxx xx xxxxxx xx be xxxxx xx, and xxxxx xxxxxx xxxx xxx xxxxxxxxxxx xx xxxx xxxxxxxx to xxxxxxxxxxx xx xxxxxxxxxx xx xxxxx xxxxxxxxxx xxx xxx xxxxxxxxx xx terrorism, xxxxxxxxxxxxx-xxxxxxxxx xxxxxxx activities xxx xxx development of xxxxxxx weapons xxxxxxxx xxxxxxx, xx xxxxxxxxxx xx xxxxx of xxxxxxxxxxxx xxxxxxxxxxx xxxxxxxx xxxxxxxxxx any xxxxxxxx xxxxxxx xx credited xx xxxxx T2S XXXx. Prior xx xxxxxxxx xxxx xxx xxxxxxxxxxx xxxxxxxxxxxx xxxx xxx X2X xxxxxxx xxxxxxx xxxxxxxx, T2S XXX xxxxxxx shall xxxxxx xxxx xxxx xxx xxxxxxxx xxxxx xxx xxxx xxxxxxxxx xxxxxx.“; |
7. |
Xxxxxx&xxxx;30 xx xxxxxxxxx xxxxx: „Xxxxxxx&xxxx;30 Xxxxxxxxxxx xxxxxxxxxxxx with xx XXX 1.&xxxx;&xxxx;&xxxx;X2X XXX xxxxxxx xxxxx either:
2.&xxxx;&xxxx;&xxxx;Xxx xxxxx xxxxxxxxxxxx xxxxxxx x&xxxx;X2X XXX holder xxx the XXX xxxxx xx xxxxxxxxxxx xxxxxxxx xx xxx xxxxx xxx xxxxxxxxxx xx xxx xxxxxxxx xxxxxxxx concluded xxxx xx XXX xx xxxxxxxx xx xx xxxxxxxxx 1(a). 3. The services xx xx xxxxxxxx xx xxx NSP xxxxx xxx xxxx xxxx xx xxx xxxxxxxx xx xx xxxxxxxxx xx the XXX xx respect xx XXXXXX2. 4.&xxxx;&xxxx;&xxxx;Xxx ECB xxxxx xxx xx xxxxxx xxx any xxxx, xxxxxx xx xxxxxxxxx xx xxx XXX (xxxxxxxxx its xxxxxxxxx, xxxxx xxx xxxxxxxxxxxxxx), xx xxx xxx xxxx, xxxxxx xx xxxxxxxxx of xxxxx xxxxxxx xxxxxxxx xx participants xx xxxx access to xxx XXX’x network.“; |
8. |
Vkládá xx xxxx článek 34a, xxxxx xxx: „Xxxxxxx&xxxx;34x Xxxxxxxxxxxx xxxxxxxxxx Xxxx xxx TARGET system xx operational and XXXXXX2 xxx ceased xxxxxxxxx, T2S XXX xxxxxxx shall become X2X XXX holders xx xxx XXXXXX xxxxxx.“; |
9. |
Xxxxxx xx xxxxx „X2X xxxxxxx service xxxxxxxx“ (v jednotném nebo xxxxxxx xxxxx) v čl. 6 xxxx.&xxxx;1 písm. a) xxxx x), xx.&xxxx;9 xxxx.&xxxx;5, čl. 10 odst. 6, xx.&xxxx;14 xxxx.&xxxx;1 písm. x), xx.&xxxx;22 xxxx.&xxxx;1, xx.&xxxx;22 xxxx.&xxxx;2, xx.&xxxx;22 xxxx.&xxxx;3, xx.&xxxx;27 odst. 5, xx.&xxxx;28 odst. 1, xx.&xxxx;29 xxxx.&xxxx;1 xxxxxxx II x&xxxx;x&xxxx;xxxxxxxx 1 xxxxxxx X&xxxx;xx xxxxxxxxx xxxxxxx „XXX“; |
10. |
X&xxxx;xxxxxxx X&xxxx;xx v odst. 8 xxxxxxx. 4 nahrazuje xxxxxxx b) tímto:
|
PŘÍLOHA XXX
Xxxxxxx III xxxxxxxxxx XXX/2007/7 se xxxx xxxxx:
1. |
Xxxxxx xx xxxxx „TIPS xxxxxxx xxxxxxx xxxxxxxx“ (x&xxxx;xxxxxxxxx xxxx xxxxxxx xxxxx) x&xxxx;xxxx xxxxxxx se xxxxxxxxx odkazem „XXX“; |
2. |
Xxxxxx&xxxx;1 xx xxxx xxxxx:
|
3. |
V čl. 3 xxxx.&xxxx;1 xx zrušuje xxxxx xx „Appendix X: XXXX xxxxxxxxxxxx xxxxxxxxx requirements“; |
4. |
Článek 4 se xxxx xxxxx:
|
5. |
X&xxxx;xx.&xxxx;6 odst. 1 písm. x) xx xxx x) xxxxxxxxx xxxxx:
|
6. |
Xxxxxx&xxxx;9 xx xxxxxxxxx xxxxx: „Xxxxxxx&xxxx;9 Xxxxxxxxxxx relationship xxxx xx NSP 1. Participants xxxxx xxxxxx:
2. The xxxxx xxxxxxxxxxxx xxxxxxx x&xxxx;xxxxxxxxxxx xxx the NSP xxxxx be exclusively xxxxxxxx xx the xxxxx xxx conditions xx xxxxx xxxxxxxx xxxxxxxx xx xxxxxxxx xx xx paragraph 1(x). 3.&xxxx;&xxxx;&xxxx;Xxx xxxxxxxx xx xx xxxxxxxx xx xxx XXX xxxxx xxx xxxx xxxx xx xxx xxxxxxxx xx xx xxxxxxxxx xx xxx ECB xx respect xx XXXXXX2. 4.&xxxx;&xxxx;&xxxx;Xxx XXX shall xxx xx xxxxxx xxx xxx acts, xxxxxx or omissions xx the XXX (xxxxxxxxx xxx directors, xxxxx xxx xxxxxxxxxxxxxx), xx xxx any xxxx, errors xx xxxxxxxxx xx xxxxx xxxxxxx xxxxxxxx by xxxxxxxxxxxx xx xxxx xxxxxx xx the XXX’x network.“; |
7. |
Článek 10 se xxxxxxx; |
8. |
Xxxxxx xx xxxx xxxxxx&xxxx;11x, xxxxx zní: „Article 11a MPL xxxxxxxxxx 1.&xxxx;&xxxx;&xxxx;Xxx central XXX xxxxxxxxxx xxxxxxxx xxx xxxxx – XXXX xxxxxxx xxxxx xxx xxx purposes xx xxx MPL service. 2. Each xxxxx xxx xx xxxxxx to xxxx xxx IBAN. An XXXX xxx xx xxxxxx xx xxx xx xxxxxxxx proxies. 3. Article 29 xxxxx apply xx xxx xxxx contained xx xxx XXX xxxxxxxxxx.“; |
9. |
X&xxxx;xxxxxx&xxxx;12 xx xxxxxxx xxxxxxxx 9; |
10. |
Xxxxxx&xxxx;16 xx xxxxxxxxx xxxxx: „Xxxxxxx&xxxx;16 Xxxxx of xxxxxxx xxxxxx in XXXX DCA The xxxxxxxxx xxx xxxxxxxxxx xx xxxxxxx xxxxxx xxx xxx xxxxxxxx of xxx TIPS xxxxxxx:
|
11. |
V článku 18 se xxxxxxxx 6 xxxxxxxxx xxxxx: „6.&xxxx;&xxxx;&xxxx;Xxxxx x&xxxx;XXXX XXX xx PM xxxxxxxxx xxxxxxxx xxxxx, x&xxxx;XXXX XXX to XXXX XX xxxxxxxxx account xxxxxxxxx transfer xxxxx xx a TIPS XX xxxxxxxxx xxxxxxx xx XXXX XXX xxxxxxxxx xxxxxxxx xxxxx xxx xxxx xxxxxxxx as xxxxxxxx xx xx Xxxxxxx&xxxx;17, xxx TARGET2-ECB xxxxx xxxxx whether xxxxxxxxxx xxxxx are xxxxxxxxx xx the xxxxx'x account. If xxxxxxxxxx xxxxx are xxx available xxx xxxxxxxxx xxxxxxxx xxxxx xxxxx be rejected. Xx xxxxxxxxxx xxxxx xxx xxxxxxxxx the xxxxxxxxx xxxxxxxx order xxxxx be settled xxxxxxxxxxx.“; |
12. |
X&xxxx;xx.&xxxx;20 xxxx.&xxxx;1 xx xxxxxxx x) nahrazuje xxxxx:
|
13. |
X&xxxx;xxxxxx&xxxx;30 se xxxxxxxx 1 xxxxxxxxx tímto: „1. TIPS XXX holders xxxxx xx xxxxxx to xx xxxxx xx, xxxxx comply xxxx xxx xxxxx xx xxxx xx xxxxxxxxxxx xxxx xxxxxxxxxx xx xxx relevant xxxxxxxxx xxxxxxxxxxx xxxx xxx xxxxxxxxxxx on xxxx xxxxxxxx xx xxxxxxxxxxx xx xxxx protection. Xxxx shall be xxxxxx xx be xxxxx xx, and xxxxx xxxxxx xxxx xxx obligations xx xxxx xxxxxxxx xx xxxxxxxxxxx xx xxxxxxxxxx xx money xxxxxxxxxx xxx xxx xxxxxxxxx xx xxxxxxxxx, proliferation-sensitive xxxxxxx xxxxxxxxxx and xxx development xx xxxxxxx xxxxxxx xxxxxxxx xxxxxxx, in particular xx terms of xxxxxxxxxxxx appropriate xxxxxxxx xxxxxxxxxx xxx payments xxxxxxx xx credited xx their TIPS XXXx. XXXX XXX xxxxxxx ensure that xxxx xxx xxxxxxxx xxxxx their chosen XXX'x xxxx xxxxxxxxx xxxxxx xxxxx xx xxxxxxxx xxxx x&xxxx;xxxxxxxxxxx xxxxxxxxxxxx xxxx that XXX.“; |
14. |
Xxxxxx xx xxxx xxxxxx&xxxx;35x, xxxxx xxx: „Xxxxxxx&xxxx;35x Xxxxxxxxxxxx xxxxxxxxx Xxxx the XXXXXX xxxxxx xx xxxxxxxxxxx xxx the XXXXXX2 xxx xxxxxx xxxxxxxxx, XXXX DCA holders xxxxx xxxxxx TIPS XXX xxxxxxx in xxx TARGET xxxxxx.“; |
15. |
X&xxxx;xxxxxxx X&xxxx;xx xxxxxxx x&xxxx;xxxxxxxx 2 xxxxxxxxx xxxxx:
|
16. |
X&xxxx;xxxxxxx X&xxxx;xx x&xxxx;xxxx.&xxxx;6 xxxxxxx. 1 nahrazuje xxxxxxx b) xxxxx:
|
17. |
X&xxxx;xxxxxxx XX se xxxxxxx xxxxxxxx 2; |
18. |
Dodatek V se xxxxxxx. |