GRC hot topics
The 2020 edition of the GIPS Standards was released on June 28, 2019. One of the major initiatives of the overhaul was to make compliance with the GIPS standards easier for alternative managers.
Is your code of ethics monitoring and personal trade surveillance compliance program built to beat the heat? This blog post recaps our recent webcast on this topic and provides best practices for navigating complex and evolving areas of compliance management, including cryptocurrency, pay-to-play, robo-advisors, and more.
- Regulatory Technology
Effective AML compliance requires a data governance program to address the acquisition and management of the data – also known as “know your data” or KYD. This is a hot topic for financial institutions monitoring client transactions for money laundering, terrorist financing, or other forms of financial crime.
- AML and Financial Crime
Sexual harassment and other forms of “non-financial misconduct” are now on equal footing with types of financial misconduct with the FCA. Firms and employees are at risk of regulatory sanctions for failure to fulfill the FCA’s evolving diversity and inclusion expectations.
A company that effects transactions in digital asset securities for its own account or the accounts of others must register as a broker-dealer under Section 15 of the Securities Exchange Act of 1934. In addition, these companies must meet the requirements of Rule 15c3-3 (the “Customer Protection Rule”) if they intend to custody digital asset securities.
ACA has sold its majority stake in Cordium Malta Limited (“CML”) to Adam de Domenico. ACA acquired the entity in August 2018 as part of the acquisition of Cordium.
- ACA News
Companies are relying increasingly on cloud service providers for conducting business, including storing data, hosting email, and more. But with the increasing regulatory focus on the risk of cloud data storage, is the forecast for cloud solutions stormy?
On July 29, Capital One Financial Corporation announced that it had suffered a breach on July 19. On that date, an outside individual illegally accessed the personally identifiable information of over 100 million of its customers.