Remove 2014 Remove Management Remove Risk Management Remove Security
article thumbnail

U.S. Regulations to Consider When Managing a Cryptocurrency Fund

Perficient

However, in this blog, we will discuss the regulatory landscape surrounding cryptocurrency from an asset manager or fund manager perspective. We’ll then move to the federal level, seeking regulatory guidance as to whether digital tokens are securities under the jurisdiction of the U.S. Central Bank Digital Currency (CBDC) ).

article thumbnail

Decomposing changes in the functioning of the sterling repo market from 2014 to 2018

BankUnderground

Since 2014 there have been significant changes in repo functioning, causing policymakers to question why these changes are happening and what it means for financial stability. We find fluctuations in repo were driven by changes in dealers’ supply in the pre-Covid period 2014–18. Our paper addresses these questions.

Marketing 106
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

TS Imagine Extends Crypto Exchange Connectivity with Gemini

Bobsguide

London (5 April 2022): TS Imagine , the leader in trading, portfolio and risk management solutions for capital markets, today announces that it has successfully integrated with crypto platform Gemini. Gemini’s simple, reliable, and secure products are built to unlock the next era of financial, creative & personal freedom.

Bitcoin 147
article thumbnail

6 Tips for Shipping Data Securely

Jack Henry

But it also made me think - what about data security at your work place? However, in May 2014 the software company announced that it was no longer supporting TrueCrypt and users should find another avenue to encrypt their data as there could be issues with using it securely. Information Security & Risk Management'

article thumbnail

April 2014: A Busy Month for Fraud Alerts!

Jack Henry

The following steps are expected of FIs: Maintain an information security program and risk assessment, Monitor Internet traffic to your website in order to detect an attack (establish a baseline so you can easily discern an increase in activity). Ensure adherence to appropriate patch management policy and procedures.

Fraud 88
article thumbnail

OCC outlines risk plan as Northeastern loan growth doubles

Abrigo

” As a regulatory body, the OCC said it will focus on the following to address the increasing risk: • Execution of bank strategic plans and management of strategic risk. • Board risk parameters, adequacy of staffing, succession planning and audit. • Vendor and third-party management processes.

article thumbnail

It Started with a Tweet #SocialMedia #Banks @ICBA

Independent Banker

According to a statistic released as part of the ICBA 2014 Top 50 Community Bank Leaders in Social Media, nearly 2,500 banks have a Facebook or Twitter presence, and the numbers continue to exponentially grow. Section IV, Risk Areas, is helpful in evaluating risk and ensuring social media activity complies with regulations.