ROZHODNUTÍ XXXXXXXX XXXXXXXXX XXXXX (EU) 2021/1758
xx xxx 21.&xxxx;xxxx 2021,
xxxxxx xx xxxx xxxxxxxxxx XXX/2007/7 o podmínkách TARGET2-ECB (XXX/2021/43)
XXXXXXX XXXX XXXXXXXX XXXXXXXXX XXXXX,
x&xxxx;xxxxxxx na Xxxxxxx x&xxxx;xxxxxxxxx Xxxxxxxx xxxx, x&xxxx;xxxxxxx na xxxxx x&xxxx;xxxxxxx odrážku xx.&xxxx;127 xxxx.&xxxx;2 xxxx xxxxxxx,
x&xxxx;xxxxxxx xx statut Xxxxxxxxxx xxxxxxx xxxxxxxxxxx xxxx a Evropské xxxxxxxxx xxxxx, a zejména xx xxxxxx&xxxx;11.6 a články 17, 22 a 23 tohoto xxxxxxx,
xxxxxxxx x&xxxx;xxxxx xxxxxxx:
(1) |
Xxxx xxxxxxxxx změnila (1) dne 20.&xxxx;xxxxxxxx 2021 obecné xxxxxx Xxxxxxxx centrální xxxxx XXX/2012/27&xxxx;(2) x&xxxx;xxxxx: x) vyjasnit, xx xxxxxxxx XXXX XXX xxxxx x&xxxx;XXXXXX2 připojeni xxxxxxxxxxxxxxx jednotného portálu xxxxx xxxxxxxxxxxxxx Eurosystému (Xxxxxxxxxx Xxxxxx Xxxxxx Xxxxxxxxxxxxxx Gateway) od xxxxxxxxx 2021 x&xxxx;xxxxxxxx X2X XXX xxxxx x&xxxx;XXXXXX2 prostřednictvím xxxxxx xxxxxxx xxxxxxxxx xx xxxxxx 2022; b) xxxxxxxx x&xxxx;xxxxxxxx xxxxxxxx xxxxxxxx se xxxxxxxxxx xxxxxxxxx xx xxxxxxxxxx xxxxxxxxx xxxx XXXXXX2, xxx se xxxxxxxxx, xx xx systém XXXXXX2 xxxx xxxx xxxxxxx xxx, xxx xxx xxxxxxx xxxxx xxxxxxx v oblasti xxxxxxxxxxxx xxxxxxxxxxx; x) xxxxxx xxxxxxxxx, xxx xxxxxxxx xxxx XX, xxxxxx xxxxxxx xxxxxxxxx x&xxxx;xxxxxxxxxxxxx xxxxxxxx xxxx XXX, xxxxx xxxxxxxxxxx x&xxxx;xxxxxxxxxxx xxxxxxx XXX Inst xxxxxxxx xxxxxx x&xxxx;xxxxxxxxxx xxxxxxx xxx xxxxxxxx xxxxxxxxxxxxx xxxxxxx XXXX, xxxx x&xxxx;xxxxxxx xxxxxx xxxxxxxxxxx xx platformě XXXX xxxxxxxxxxxxxxx XXXX XXX, tak aby xx zajistila xxxxxxxxxx xxxxxxxxxx xxxxxx x&xxxx;xxxx Xxxx; x) xxxxxx xxxxxxxxxxxxxxx, xxxxx jde x&xxxx;xxxxxxx xxxxxxx xxxxxxxx x&xxxx;xxxx xxxxxxxxx x&xxxx;XXXXXX2 xx xxxxxxxxxxxx xxxxxxxxxxx xxxx x&xxxx;xxxxxxxx systému XXXXXX, xxx xxxx xxxxxxxxx xxxxxx xxxxxxx, x&xxxx;x) xxxxxxxx a aktualizovat xxxxxxx xxxxx xxxxxxx xxxxxxxx xxxxx XXX/2012/27. |
(2) |
Xxxxxxx xxxx zprovozněn projekt xxxxxxxxxxx X2-X2X, xxxx x&xxxx;xxxxx xxxxxx xxxxxxx xxxxxx xxxxxxxx zajistit xxxxxxxxxxxxxxx, xxxxx jde x&xxxx;xxxxxxx xxxxxxx xxxxxxxx x&xxxx;xxxx účastníků x&xxxx;XXXXXX2-XXX xx xxxxxxxxxxxx nástupnické xxxx. |
(3) |
Xxxxx obecných xxxxx XXX/2012/27, xxxxx mají xxxx xx xxxxxxxx XXXXXX2-XXX, xx třeba xxxxxxxxx v rozhodnutí Xxxxxxxx xxxxxxxxx banky ECB/2007/7 (3). |
(4) |
Rozhodnutí XXX/2007/7 xx xxxxx xxxxx xxxxxxxxxxxxx xxxxxxxx xxxxxx, |
XXXXXXX XXXX XXXXXXXXXX:
Xxxxxx&xxxx;1
Xxxxx
Xxxxxxx I, XX x&xxxx;XXX xxxxxxxxxx XXX/2007/7 xx xxxx v souladu x&xxxx;xxxxxxxxx xxxxxx xxxxxxxxxx.
Xxxxxx&xxxx;2
Xxxxxxxxx xxxxxxxxxx
Xxxx rozhodnutí xxxxxxxx x&xxxx;xxxxxxxx pátým xxxx xx xxxxxxxxxx x&xxxx;Xxxxxxx xxxxxxxx Evropské xxxx.
Xxxxxxx se ode xxx 21. listopadu 2021, x&xxxx;xxxxxxxx xxxx.&xxxx;1 xxxx. x) x&xxxx;xxxxxxxx 7 x&xxxx;9 xxxxxxx XX xxxxxx xxxxxxxxxx, xxxxx xx xxxxxxx ode xxx 13. června 2022.
Ve Frankfurtu nad Xxxxxxx dne 21.&xxxx;xxxx 2021.
Xxxxxxxxxxx ECB
Christine LAGARDE
(1) Obecné xxxxxx Xxxxxxxx centrální xxxxx (EU) 2021/1759 xx xxx 20. července 2021, kterými xx xxxx xxxxxx xxxxxx XXX/2012/27 o transevropském xxxxxxxxx xxxxxxxxxxxxxxx systému xxxxxxxxx xxxxxx x&xxxx;xxxxxxx xxxx (XXXXXX2) (XXX/2021/30) [(xxx xxxxxx 45 v tomto xxxxx Xxxxxxxx xxxxxxxx).
(2)&xxxx;&xxxx;Xxxxxx xxxxxx Xxxxxxxx centrální xxxxx XXX/2012/27 xx xxx 5. prosince 2012 x&xxxx;xxxxxxxxxxxxxx xxxxxxxxx automatizovaném xxxxxxx xxxxxxxxx xxxxxx x&xxxx;xxxxxxx xxxx (XXXXXX2) (Xx. xxxx. X&xxxx;30, 30.1.2013, x. 1).
(3)&xxxx;&xxxx;Xxxxxxxxxx Xxxxxxxx xxxxxxxxx xxxxx XXX/2007/7 ze dne 24.&xxxx;xxxxxxxx 2007 o podmínkách XXXXXX2-XXX (Xx. xxxx. X&xxxx;237, 8.9.2007, x. 71).
XXXXXXX X
Xxxxxxx X&xxxx;xxxxxxxxxx XXX/2007/7 se mění xxxxx:
1. |
Xxxxxx&xxxx;1 xx xxxx xxxxx:
|
2. |
X&xxxx;xxxxxx&xxxx;2 xxxxxx odstavci xx xxxxxxxx xxxx xxxx, xxxxx xxx:
|
3. |
Xxxxxx&xxxx;3 se xxxx xxxxx:
|
4. |
Xxxxxx&xxxx;5 xx xxxxxxxxx xxxxx: „Xxxxxxx&xxxx;5 Xxxxxx xxxxxxxxxxxx XX account xxxxxxx xx TARGET2-ECB xxx xxxxxx xxxxxxxxxxxx xxx shall xxxxxx xxxx xxx xxxxxxxxxxxx xxx xxx xx Xxxxxxx&xxxx;8(1) xxx&xxxx;(2). Xxxx xxxxx xxxx xx xxxxx xxx XX xxxxxxx with xxx XXX. XX xxxxxxx xxxxxxx xxxx xxxx xxxxxxx xx the XXX Inst xxxxxx xx signing xxx XXXX Instant Xxxxxx Xxxxxxxx Adherence Xxxxxxxxx xxxxx be xxx xxxxx remain reachable xx the TIPS Xxxxxxxx at xxx xxxxx, xxxxxx xx x&xxxx;XXXX XXX holder xx xx a reachable xxxxx xxx a TIPS XXX xxxxxx.“; |
5. |
Xxxxxx&xxxx;22 se xxxxxxxxx tímto: „Article 22 Security Xxxxxxxxxxxx xxx Control Xxxxxxxxxx 1.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx xxxxx implement xxxxxxxx xxxxxxxx xxxxxxxx to xxxxxxx xxxxx systems xxxx xxxxxxxxxxxx xxxxxx xxx xxx. Xxxxxxxxxxxx xxxxx xx xxxxxxxxxxx xxxxxxxxxxx xxx xxx xxxxxxxx xxxxxxxxxx xx xxx confidentiality, xxxxxxxxx xxx xxxxxxxxxxxx xx xxxxx xxxxxxx. 2.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx xxxxx xxxxxx xxx XXX xx xxx security-related xxxxxxxxx xx xxxxx xxxxxxxxx infrastructure xxx, xxxxx xxxxxxxxxxx, security-related xxxxxxxxx xxxx occur xx xxx xxxxxxxxx xxxxxxxxxxxxxx xx xxx xxxxx xxxxx xxxxxxxxx. Xxx ECB xxx xxxxxxx further information xxxxx xxx incident xxx, if xxxxxxxxx, xxxxxxx xxxx the xxxxxxxxxxx xxxx xxxxxxxxxxx xxxxxxxx to xxxxxxx x&xxxx;xxxxxxxxxx xx xxxx xx xxxxx. 3.&xxxx;&xxxx;&xxxx;Xxx XXX xxx xxxxxx additional xxxxxxxx xxxxxxxxxxxx, in xxxxxxxxxx with xxxxxx xx cybersecurity or xxx prevention of xxxxx, xx xxx xxxxxxxxxxxx xxx/xx on xxxxxxxxxxxx xxxx xxx xxxxxxxxxx xxxxxxxx by xxx XXX. 4.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx xxxxx xxxxxxx the XXX xxxx: (i) permanent xxxxxx xx their xxxxxxxxxxx xx xxxxxxxxx xx their xxxxxx xxxxxxx xxxxxxx provider’s xxxxxxxx xxxxxxxx xxxxxxxxxxxx, xxx (ii) xx xx annual basis xxx TARGET2 xxxx-xxxxxxxxxxxxx xxxxxxxxx xx xxxxxxxxx xx the XXX’x xxxxxxx xx Xxxxxxx. 4x.&xxxx;&xxxx;&xxxx;Xxx XXX shall xxxxxx xxx participant’s xxxx-xxxxxxxxxxxxx xxxxxxxxx(x) xx xxx xxxxxxxxxxxx xxxxx of xxxxxxxxxx xxxx xxxx xx the xxxxxxxxxxxx xxx xxx xx xxx XXXXXX2 xxxx-xxxxxxxxxxxxx xxxxxxxxxxxx. These xxxxxxxxxxxx xxx xxxxxx in Xxxxxxxx XXX, which xx addition xx xxx other Xxxxxxxxxx xxxxxx xx Article 2(1), xxxxx xxxx xx xxxxxxxx part xx xxxxx Xxxxxxxxxx. 4x.&xxxx;&xxxx;&xxxx;Xxx xxxxxxxxxxx’x xxxxx xx xxxxxxxxxx xxxx the xxxxxxxxxxxx xx xxx XXXXXX2 xxxx-xxxxxxxxxxxxx shall xx xxxxxxxxxxx xx xxxxxxx, xx xxxxxxxxxx xxxxx xx xxxxxxxx: ‘full xxxxxxxxxx’; ‘xxxxx xxx-xxxxxxxxxx’; xx ‘xxxxx non-compliance’. Xxx xxxxxxxxx xxxxxxxx xxxxx: xxxx xxxxxxxxxx xx reached where xxxxxxxxxxxx xxxxxxx 100% xx the xxxxxxxxxxxx; xxxxx xxx-xxxxxxxxxx xx xxxxx a participant xxxxxxxxx xxxx xxxx 100% xxx xx xxxxx 66% xx the xxxxxxxxxxxx xxx xxxxx xxx-xxxxxxxxxx where a participant xxxxxxxxx xxxx xxxx 66% xx xxx xxxxxxxxxxxx. Xx x&xxxx;xxxxxxxxxxx xxxxxxxxxxxx xxxx x&xxxx;xxxxxxxx xxxxxxxxxxx xx xxx xxxxxxxxxx xx xx, xx xxxxx xx xxxxxxxxxx as xxxxxxxxx xxxx the xxxxxxxxxx xxxxxxxxxxx xxx xxx xxxxxxxx xx xxx xxxxxxxxxxxxxx. A participant which xxxxx to reach ‘xxxx xxxxxxxxxx’ xxxxx xxxxxx an xxxxxx xxxx demonstrating xxx xx xxxxxxx xx xxxxx full xxxxxxxxxx. Xxx ECB xxxxx xxxxxx the xxxxxxxx xxxxxxxxxxx xxxxxxxxxxx of xxx xxxxxx xx xxxx xxxxxxxxxxx’x xxxxxxxxxx. 4x.&xxxx;&xxxx;&xxxx;Xx xxx xxxxxxxxxxx xxxxxxx xx grant xxxxxxxxx xxxxxx xx its xxxxxxxxxxx xx xxxxxxxxx xx xxxxx chosen XXXx xxxxxxxx security xxxxxxxxxxxx or xxxx xxx xxxxxxx xxx XXXXXX2 xxxx-xxxxxxxxxxxxx xxx xxxxxxxxxxx’x xxxxx xx xxxxxxxxxx xxxxx be xxxxxxxxxxx as ‘xxxxx xxx-xxxxxxxxxx’. 4x.&xxxx;&xxxx;&xxxx;Xxx ECB xxxxx xxxxxxxx compliance xx xxxxxxxxxxxx xx an xxxxxx xxxxx. 4x.&xxxx;&xxxx;&xxxx;Xxx XXX xxx impose xxx xxxxxxxxx xxxxxxxx of xxxxxxx xx xxxxxxxxxxxx xxxxx xxxxx xx xxxxxxxxxx xxx xxxxxxxx xx xxxxx xx xxxxx xxx-xxxxxxxxxx, in xxxxxxxxxx xxxxx of xxxxxxxx:
|
6. |
X&xxxx;xxxxxx&xxxx;33 xx xxxxxxxx 1 xxxxxxxxx xxxxx: „1.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx xxxxx be deemed xx xx aware xx, xxxxx xxxxxx xxxx, and xxxxx xx xxxx xx xxxxxxxxxxx that xxxxxxxxxx xx xxx xxxxxxxx xxxxxxxxx xxxxxxxxxxx with xxx xxxxxxxxxxx on xxxx xxxxxxxx xx xxxxxxxxxxx xx data xxxxxxxxxx. They shall xx xxxxxx xx xx xxxxx xx, xxx xxxxx comply xxxx xxx xxxxxxxxxxx xx them xxxxxxxx xx legislation xx xxxxxxxxxx of money xxxxxxxxxx and xxx xxxxxxxxx xx xxxxxxxxx, xxxxxxxxxxxxx-xxxxxxxxx xxxxxxx activities xxx xxx xxxxxxxxxxx xx xxxxxxx weapons xxxxxxxx xxxxxxx, xx xxxxxxxxxx xx xxxxx xx implementing xxxxxxxxxxx xxxxxxxx concerning xxx xxxxxxxx debited or xxxxxxxx on their XX accounts. Xxxxxxxxxxxx xxxxx xxxxxx xxxx xxxx xxx informed xxxxx the XXXXXX2 xxxxxxx xxxxxxx xxxxxxxx’x xxxx xxxxxxxxx xxxxxx xxxxx xx xxxxxxxx xxxx xxx xxxxxxxxxxx xxxxxxxxxxxx with the XXXXXX2 xxxxxxx xxxxxxx xxxxxxxx.“; |
7. |
Xxxxxx se xxxx xxxxxx&xxxx;39x, který zní: „Article 39a Transitional xxxxxxxxxx 1.&xxxx;&xxxx;&xxxx;Xxxx xxx XXXXXX xxxxxx xx operational xxx TARGET2 xxx xxxxxx xxxxxxxxx, PM xxxxxxx xxxxxxxx xxxxx xx transferred xx xxx xxxxxxx xxxxxx’x xxxxxxxxxxxxx xxxxxxxxx accounts xx the XXXXXX xxxxxx. 2.&xxxx;&xxxx;&xxxx;Xxx xxxxxxxxxxx xxxx XX xxxxxxx xxxxxxx, xxxxxxxx Participants and xxxxxxxxxxx XXX holders xxxxxxxx xx xxx XXX Inst xxxxxx xx xxxxxxxxx xx xxx TIPS Platform xxxxxxxx xx Xxxxxxx&xxxx;5 xxxxx xxxxx as xx 25 Xxxxxxxx 2022.“; |
8. |
X&xxxx;xxxxxxx X&xxxx;xx v odst. 8 xxxxxxx. 4 nahrazuje xxxxxxx x) tímto:
|
9. |
X&xxxx;xxxxxxx XX xx x&xxxx;xxxxxxxx 6 nahrazuje xxxxxxx x) xxxxx:
|
10. |
Xxxxxxxx xx nový xxxxxxx VII, který xxx: „Xxxxxxxx XXX Xxxxxxxxxxxx regarding xxxxxxxxxxx xxxxxxxx xxxxxxxxxx xxx xxxxxxxx continuity xxxxxxxxxx Xxxxxxxxxxx xxxxxxxx management These xxxxxxxxxxxx xxx xxxxxxxxxx xx xxxx xxxxxxxxxxx, xxxxxx xxx participant xxxxxxxxxxxx that x&xxxx;xxxxxxxx xxxxxxxxxxx xx xxx xxxxxxxxxx to xx. Xx xxxxxxxxxxxx xxx xxxxx of application xx xxx requirements xxxxxx xxx infrastructure, xxx xxxxxxxxxxx xxxxxx xxxxxxxx xxx xxxxxxxx xxxx xxx part xx xxx Xxxxxxx Xxxxxxxxxxx Xxxxx (PTC). Xxxxxxxxxxxx, the PTC xxxxxx xx x&xxxx;Xxxxx xx Xxxxx (XxX), x.x. a system involved xx xxx xxxxxxxx xx xxxxxxxxxxxx (x.x. xxxxxxxxxxxx, xxxxx-xxxxxx xxx xxxx-xxxxxx xxxxxxxxxxxx, xxxxxxxxxx), xxx xxxx at xxx xxxxxx responsible xx send the xxxxxxx xx SWIFT (x.x. XXXXX XXX Xxx) xx Xxxxxxxx (xxxx the xxxxxx xxxxxxxxxx xx Xxxxxxxx-xxxxx Xxxxxx). Xxxxxxxxxxx 1.1: Information xxxxxxxx policy The xxxxxxxxxx xxxxx set x&xxxx;xxxxx xxxxxx xxxxxxxxx in xxxx xxxx xxxxxxxx xxxxxxxxxx and xxxxxxxxxxx xxxxxxx for xxx xxxxxxxxxx xx xxxxxxxxxxx xxxxxxxx xxxxxxx xxx xxxxxxxx, xxxxxxxx and xxxxxxxxxxx xx xx xxxxxxxxxxx xxxxxxxx policy xxxxxx xx managing xxxxxxxxxxx security xxx xxxxx xxxxxxxxxx xxxxxx xxx organisation xx xxxxx xx identification, xxxxxxxxxx and treatment xx xxxxxxxxxxx xxxxxxxx xxx xxxxx xxxxxxxxxx xxxxx. The xxxxxx xxxxxx xxxxxxx xx xxxxx xxx xxxxxxxxx xxxxxxxx: xxxxxxxxxx, xxxxx (xxxxxxxxx xxxxxxx xxxx xx xxxxxxxxxxxx, human xxxxxxxxx, asset xxxxxxxxxx xxx.), principles xxx xxxxxxxxxx xx xxxxxxxxxxxxxxxx. Xxxxxxxxxxx 1.2: Xxxxxxxx organisation An xxxxxxxxxxx xxxxxxxx xxxxxxxxx xxxxx xx xxxxxxxxxxx xx xxxxxxxxx xxx xxxxxxxxxxx security policy xxxxxx the xxxxxxxxxxxx. Xxx xxxxxxxxxx xxxxx xxxxxxxxxx xxx review xxx xxxxxxxxxxxxx of xxx xxxxxxxxxxx xxxxxxxx xxxxxxxxx xx ensure xxx xxxxxxxxxxxxxx of xxx xxxxxxxxxxx security xxxxxx (as per Xxxxxxxxxxx 1.1) across xxx xxxxxxxxxxxx, xxxxxxxxx xxx allocation xx xxxxxxxxxx xxxxxxxxx xxx xxxxxxxxxx xx xxxxxxxx xxxxxxxxxxxxxxxx xxx xxxx xxxxxxx. Xxxxxxxxxxx 1.3: External xxxxxxx Xxx xxxxxxxx xx xxx xxxxxxxxxxxx’x information xxx xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx should not xx reduced xx xxx introduction of, xxx/xx xxx xxxxxxxxxx xx, xx xxxxxxxx xxxxx/xxxxxxx xx products/services xxxxxxxx by xxxx. Xxx xxxxxx to xxx xxxxxxxxxxxx’x xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx by xxxxxxxx xxxxxxx shall xx xxxxxxxxxx. Xxxx xxxxxxxx parties xx xxxxxxxx/xxxxxxxx xx xxxxxxxx xxxxxxx xxx required xx access xxx xxxxxxxxxxxx’x xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx, a risk xxxxxxxxxx xxxxx be carried xxx xx xxxxxxxxx xxx xxxxxxxx implications xxx xxxxxxx xxxxxxxxxxxx. Xxxxxxxx xxxxx be xxxxxx and xxxxxxx xx an agreement xxxx xxxx xxxxxxxx xxxxxxxx xxxxx. Xxxxxxxxxxx 1.4: Xxxxx xxxxxxxxxx Xxx xxxxxxxxxxx xxxxxx, xxx business xxxxxxxxx and xxx xxxxxxxxxx xxxxxxxxxxx xxxxxxx, xxxx xx xxxxxxxxx xxxxxxx, xxxxxxxxxxxxxxx, xxxxxxxx xxxxxxxxxxxx, xxx-xxx-xxxxx xxxxxxxx, xxxxxxxx xxx xxxx-xxxxxxxxx xxxxxxxxxxxx, xx xxx xxxxx xx the Xxxxxxx Xxxxxxxxxxx Chain xxxxx xx xxxxxxxxx xxx xxx xxxx x&xxxx;xxxxxxxxx owner. Xxx xxxxxxxxxxxxxx xxx the xxxxxxxxxxx and xxx xxxxxxxxx xx xxxxxxxxxxx xxxxxxxx xx the xxxxxxxx processes and xxx xxxxxxx XX xxxxxxxxxx xx xxxxxxxxx xxx xxxxxxxxxxx assets xxxxx be xxxxxxxx. Xxxx: xxx xxxxx xxx xxxxxxxx xxx xxxxxxxxxxxxxx of xxxxxxxx xxxxxxxx xx appropriate, xxx xxxxxxx xxxxxxxxxxx xxx the proper xxxxxxxxxx xx the xxxxxx. Xxxxxxxxxxx 1.5: Xxxxxxxxxxx xxxxxx xxxxxxxxxxxxxx Xxxxxxxxxxx xxxxxx xxxxx xx xxxxxxxxxx xx xxxxx xx xxxxx criticality xx xxx xxxxxx xxxxxxxx xx xxx xxxxxxx xx xxx xxxxxxxxxxx. Xxx classification xxxxx xxxxxxxx xxx xxxx, xxxxxxxxxx xxx xxxxxx xx xxxxxxxxxx xxxxxxxx xxxx xxxxxxxx the xxxxxxxxxxx asset xx xxx xxxxxxxx business xxxxxxxxx xxx shall xxxx xxxx xxxx xxxxxxxxxxxxx the xxxxxxxxxx XX xxxxxxxxxx. Xx xxxxxxxxxxx asset xxxxxxxxxxxxxx xxxxxx xxxxxxxx xx xxx xxxxxxxxxx xxxxx xx xxxx xx xxxxxx xx xxxxxxxxxxx xxx xx protection xxxxxxxx throughout xxx xxxxxxxxxxx xxxxx lifecycle (xxxxxxxxx xxxxxxx xxx xxxxxxxxxxx xx information xxxxxx) xxx xx xxxxxxxxxxx xxx need xxx specific handling xxxxxxxx. Xxxxxxxxxxx 1.6: Xxxxx xxxxxxxxx security Security xxxxxxxxxxxxxxxx xxxxx xx xxxxxxxxx xxxxx xx xxxxxxxxxx xx xxxxxxxx xxx xxxxxxxxxxxx xxx xx xxxxx xxx conditions xx xxxxxxxxxx. Xxx xxxxxxxxxx xxx employment, xxxxxxxxxxx and xxxxx xxxxx xxxxx shall xx adequately screened, xxxxxxxxxx for xxxxxxxxx xxxx. Employees, xxxxxxxxxxx xxx xxxxx party xxxxx xx xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx xxxxx xxxx xx xxxxxxxxx xx xxxxx xxxxxxxx xxxxx and responsibilities. Xx xxxxxxxx level xx awareness shall xx ensured among xxx xxxxxxxxx, xxxxxxxxxxx xxx xxxxx xxxxx xxxxx, xxx education xxx xxxxxxxx in xxxxxxxx procedures xxx xxx xxxxxxx use xx information processing xxxxxxxxxx shall xx xxxxxxxx xx xxxx xx minimise xxxxxxxx xxxxxxxx xxxxx. A formal xxxxxxxxxxxx xxxxxxx xxx xxxxxxxx xxxxxxxx breaches xxxxx xx xxxxxxxxxxx xxx xxxxxxxxx. Xxxxxxxxxxxxxxxx xxxxx be xx xxxxx to xxxxxx xxxx xx xxxxxxxx’x, xxxxxxxxxx’x xx xxxxx xxxxx xxxx’x xxxx xxxx xx transfer xxxxxx xxx xxxxxxxxxxxx xx xxxxxxx, xxx xxxx the return xx xxx xxxxxxxxx xxx xxx xxxxxxx xx xxx access xxxxxx xxx xxxxxxxxx. Xxxxxxxxxxx 1.7: Xxxxxxxx xxx xxxxxxxxxxxxx xxxxxxxx Xxxxxxxx or xxxxxxxxx information xxxxxxxxxx xxxxxxxxxx shall xx xxxxxx xx xxxxxx xxxxx, xxxxxxxxx xx xxxxxxx security xxxxxxxxxx, xxxx xxxxxxxxxxx security xxxxxxxx xxx xxxxx xxxxxxxx. Xxxx xxxxx xx physically xxxxxxxxx xxxx xxxxxxxxxxxx xxxxxx, xxxxxx and interference. Xxxxxx xxxxx be xxxxxxx xxxx xx xxxxxxxxxxx xxx xxxx xxxxxx xxx xxxxx xx Xxxxxxxxxxx 1.6. Xxxxxxxxxx xxx xxxxxxxxx xxxxx xx xxxxxxxxxxx xx xxxxxxx xxxxxxxx xxxxx xxxxxxxxxx xxxxxxxxxxx xxxxxx xxxx xx xxxxxxx. Xxxxxxxxx xxxxx be xxxxxxxxx xxxx xxxxxxxx xxx environmental xxxxxxx. Xxxxxxxxxx xx equipment (xxxxxxxxx equipment xxxx xxx-xxxx) and xxxxxxx xxx xxxxxxx xx xxxxxxxx xx xxxxxxxxx xx reduce the xxxx xx xxxxxxxxxxxx xxxxxx xx information xxx xx xxxxx xxxxxxx xxxx xx xxxxxx of xxxxxxxxx xx xxxxxxxxxxx. Xxxxxxx xxxxxxxx xxx xx xxxxxxxx xx xxxxxxx xxxxxxx xxxxxxxx xxxxxxx xxx xx safeguard xxxxxxxxxx xxxxxxxxxx xxxx xx xxx xxxxxxxxxx xxxxxx xxx xxxxxxx xxxxxxxxxxxxxx. Xxxxxxxxxxx 1.8: Xxxxxxxxxx xxxxxxxxxx Xxxxxxxxxxxxxxxx and xxxxxxxxxx xxxxx be xxxxxxxxxxx xxx xxx management xxx operation xx xxxxxxxxxxx processing xxxxxxxxxx xxxxxxxx xxx xxx xxxxxxxxxx xxxxxxx xx xxx Xxxxxxx Transaction Xxxxx xxx-xx-xxx. Xx xxxxxxx xxxxxxxxx xxxxxxxxxx, xxxxxxxxx xxxxxxxxx administration of XX xxxxxxx, segregation xx xxxxxx xxxxx xx xxxxxxxxxxx, where xxxxxxxxxxx, to reduce xxx xxxx xx xxxxxxxxx xx xxxxxxxxxx xxxxxx xxxxxx. Xxxxx xxxxxxxxxxx xx xxxxxx xxxxxx be implemented xxx to documented xxxxxxxxx reasons, xxxxxxxxxxxx xxxxxxxx xxxxx xx xxxxxxxxxxx following a formal xxxx xxxxxxxx. Controls xxxxx xx xxxxxxxxxxx xx prevent and xxxxxx xxx xxxxxxxxxxxx xx xxxxxxxxx xxxx xxx systems xx xxx Xxxxxxx Xxxxxxxxxxx Xxxxx. Controls shall xx xxxx xxxxxxxxxxx (xxxxxxxxx xxxx xxxxxxxxx) xx prevent, xxxxxx xxx remove xxxxxxxxx xxxx. Xxxxxx xxxx xxxxx be xxxx xxxx xxxx trusted xxxxxxx (x.x. signed Xxxxxxxxx XXX xxxxxxxxxx xxx Xxxx Xxxxxxx). Xxx xxxxxxxxxxxxx xx xxx xxxxxxx (e.g. xxx xxx of xxxxxxxxxx xxx xxxxxxx) xxxxx xx xxxxxxxx xxxxxxxxxx. Xxxx xxxxxx xxx xxxxxxxx xxxxxxxx xxxxx xx implemented xx xxx xxxxxxxxxx; xxxxx xxxxxxxx xxxxxxxx xxxxx xxxxxxx x&xxxx;xxxx xx xxx xxxxxxxxxxx xxxxxxx xxxxx xx tested xx xxxxxxx xxxxxxxxx xx xxxxx annually. Systems xxxx xxx xxxxxxxx xxx xxx security xx payments shall xx monitored xxx xxxxxx relevant xx xxxxxxxxxxx xxxxxxxx shall xx recorded. Xxxxxxxx xxxx xxxxx be xxxx xx xxxxxx xxxx xxxxxxxxxxx xxxxxx xxxxxxxx xxx identified. Xxxxxxxx logs xxxxx xx xxxxxxxxx xxxxxxxx xx a sample basis, xxxxx xx xxx xxxxxxxxxxx xx the xxxxxxxxxx. System xxxxxxxxxx xxxxx xx xxxx xx xxxxx xxx xxxxxxxxxxxxx xx xxxxxxxx xxxxx are xxxxxxxxxx xx xxxxxxxx xxx xxx xxxxxxxx xx xxxxxxxx and xx xxxxxx xxxxxxxxxx xx xx access policy xxxxx. Xxxxxxxxx xx xxxxxxxxxxx xxxxxxx organisations shall xx xxxxx on x&xxxx;xxxxxx xxxxxxxx xxxxxx, xxxxxxx xxx xx xxxx with xxxxxxxx xxxxxxxxxx xxxxx the xxxxxxxx xxxxxxx xxx xxxxx xx xxxxxxxxx xxxx any xxxxxxxx xxxxxxxxxxx. Xxxxx xxxxx xxxxxxxx components xxxxxxxx xx the xxxxxxxx xx information xxxx XXXXXX2 (like software xxxxxxxx xxxx a Service Xxxxxx xx xxxxxxxx 2 xx xxx xxxxx xxxxxxx of xxx TARGET2 xxxx-xxxxxxxxxxxxx xxxxxxxxxxx xxxxxxxx) xxxx xx xxxx xxxxx x&xxxx;xxxxxx xxxxxxxxx xxxx xxx third party. Requirement 1.9: Xxxxxx control Access xx xxxxxxxxxxx xxxxxx xxxxx xx xxxxxxxxx xx the xxxxx xx xxxxxxxx xxxxxxxxxxxx (xxxx-xx-xxxx&xxxx;(1)) xxx according xx xxx xxxxxxxxxxx xxxxxxxxx xx corporate xxxxxxxx (including the xxxxxxxxxxx xxxxxxxx policy). Xxxxx xxxxxx control xxxxx shall xx xxxxxxx xxxxx on xxx xxxxxxxxx xx xxxxx xxxxxxxxx&xxxx;(2) to xxxxxxx xxxxxxx xxx xxxxx of the xxxxxxxxxxxxx xxxxxxxx xxx XX xxxxxxxxx. Where xxxxxxxx (x.x. xxx xxxxxx xxxxxxxxxx) xxxxxxx xxxxxx xxxxxxx should xx xxxxxxxxxx xxxx xxxxxxxx access xxxxxxx xxxxxx xxxxx xxx xxxxxxxx compensatory xxxxxxxx xx xxxxx (x.x. xxxxxxxxxx, xxxxxxxx xxxx xxxxxxxxxxxxx). Xxxxxx and documented xxxxxxxxxx xxxxx xx xx xxxxx xx xxxxxxx xxx xxxxxxxxxx xx xxxxxx xxxxxx xx xxxxxxxxxxx systems xxx services that xxxx xxxxxx xxx xxxxx xx the Xxxxxxx Xxxxxxxxxxx Chain. Xxx xxxxxxxxxx xxxxx xxxxx xxx stages xx the xxxxxxxxx xx xxxx access, xxxx xxx xxxxxxx xxxxxxxxxxxx xx xxx xxxxx xx xxx xxxxx xxxxxxxxxxxxxx of xxxxx that xx xxxxxx xxxxxxx access. Special xxxxxxxxx xxxxx xx xxxxx, where appropriate, xx xxx allocation xx xxxxxx xxxxxx xx xxxx criticality xxxx the xxxxx xx those xxxxxx xxxxxx could xxxx xx x&xxxx;xxxxxx xxxxxxx xxxxxx xx xxx xxxxxxxxxx of xxx xxxxxxxxxxx (x.x. xxxxxx xxxxxx xxxxxxxx system xxxxxxxxxxxxxx, override of xxxxxx controls, xxxxxx xxxxxx to xxxxxxxx xxxx). Xxxxxxxxxxx xxxxxxxx xxxxx xx xxx in xxxxx xx identify, xxxxxxxxxxxx and authorise xxxxx xx specific xxxxxx in xxx xxxxxxxxxxxx’x xxxxxxx, x.x. xxx local xxx xxxxxx xxxxxx xx xxxxxxx xx the Xxxxxxx Transaction Xxxxx. Xxxxxxxx accounts shall xxx xx xxxxxx xx xxxxx xx xxxxxx xxxxxxxxxxxxxx. Xxx xxxxxxxxx, xxxxx xxxxx xx xxxxxxxxxxx and xxxxxxxx xx specific xxxxxxxx xx ensure xxxx xxxxxxxxx xxxxxx be xxxxxx guessed, x.x. xxxxxxxxxx xxxxx xxx xxxxxxx-xxxx validity. A safe xxxxxxxx xxxxxxxx xxx/xx xxxxx xxxxxxxx shall xx xxxxxxxxxxx. X&xxxx;xxxxxx xxxxx xx xxxxxxxxx and xxxxxxxxxxx xx the xxx xx xxxxxxxxxxxxx xxxxxxxx xx protect xxx xxxxxxxxxxxxxxx, xxxxxxxxxxxx xxx integrity of xxxxxxxxxxx. X&xxxx;xxx management xxxxxx shall be xxxxxxxxxxx to xxxxxxx xxx use of xxxxxxxxxxxxx xxxxxxxx. Xxxxx xxxxx xx xxxxxx xxx xxxxxxx xxxxxxxxxxxx information xx xxxxxx xx xx xxxxx (x.x. x&xxxx;xxxxx xxxxxx, x&xxxx;xxxxx xxxx policy) xx xxxxxx the xxxx xx unauthorised xxxxxx. Xxxx xxxxxxx remotely, the xxxxx of xxxxxxx xx an unprotected xxxxxxxxxxx xxxxx be xxxxxxxxxx xxx xxxxxxxxxxx xxxxxxxxx xxx xxxxxxxxxxxxxx xxxxxxxx xxxxx xx xxxxxxx. Xxxxxxxxxxx 1.10: Xxxxxxxxxxx xxxxxxx xxxxxxxxxxx, development xxx xxxxxxxxxxx Xxxxxxxx requirements xxxxx be identified xxx xxxxxx xxxxx xx xxx xxxxxxxxxxx xxx/xx xxxxxxxxxxxxxx xx xxxxxxxxxxx xxxxxxx. Xxxxxxxxxxx xxxxxxxx xxxxx be built xxxx xxxxxxxxxxxx, xxxxxxxxx xxxx-xxxxxxxxx xxxxxxxxxxxx, xx xxxxxx xxxxxxx xxxxxxxxxx. Xxxxx controls xxxxx xxxxxxx xxx xxxxxxxxxx xx input xxxx, xxxxxxxx xxxxxxxxxx xxx xxxxxx xxxx. Xxxxxxxxxx xxxxxxxx xxx be xxxxxxxx xxx systems xxxx process, xx xxxx xx impact xx, xxxxxxxxx, xxxxxxxx xx xxxxxxxx information. Xxxx xxxxxxxx xxxxx xx xxxxxxxxxx on xxx xxxxx of xxxxxxxx xxxxxxxxxxxx xxx xxxx assessment according xx xxx established xxxxxxxx (x.x. xxxxxxxxxxx xxxxxxxx xxxxxx, xxxxxxxxxxxxx xxxxxxx xxxxxx). Xxx operational xxxxxxxxxxxx xx xxx xxxxxxx xxxxx xx xxxxxxxxxxx, documented and xxxxxx prior to xxxxx acceptance xxx xxx. Xx xxxxxxx xxxxxxx security, xxxxxxxxxxx xxxxxxxx, xxxxxxxxx xxxxxxxxxxxx xxx secure xxxxxxxxxx, xxxxxx xx xxxxxxxxxxx xxxxx on the xxxxxxxxxxx xx xxxx xxxxx xxx xxx xxxxx xx risk xx xxx xxxxxxx xxxxx in the xxxxxxxxxxxx. There xxxxx xx specific xxxxxxxx xx xxxxxxx xxxxxxxxx xxxxxxxxxxx xxxxxxx xxxx xxxxxx networks. Access xx xxxxxx files xxx xxxxxxx xxxxxx code xxxxx xx xxxxxxxxxx xxx XX projects xxx xxxxxxx activities xxxxxxxxx xx x&xxxx;xxxxxx xxxxxx. Xxxx xxxxx xx taken to xxxxx exposure of xxxxxxxxx xxxx xx xxxx environments. Xxxxxxx xxx xxxxxxx xxxxxxxxxxxx xxxxx xx xxxxxxxx xxxxxxxxxx. Xxxxxxxxxx of xxxxxxx xx production xxxxx xx xxxxxxxx xxxxxxxxxx. A risk xxxxxxxxxx xx the xxxxx xxxxxxx xx xx xxxxxxxx xx production xxxxx xx xxxxxxxxx. Xxxxxxx xxxxxxxx xxxxxxx xxxxxxxxxx xx systems in xxxxxxxxxx shall xxxx xx conducted xxxxxxxxx xx x&xxxx;xxxxxxxxxx plan xxxxx xx xxx xxxxxxx xx x&xxxx;xxxx xxxxxxxxxx, xxx xxxxxxxx xxxxxxx xxxxx xxxxxxx, xx xxxxx, vulnerability xxxxxxxxxxx. Xxx xx xxx xxxxxxxxxxxx highlighted xxxxxx xxx security xxxxxxx xxxxxxxxxx xxxxx xx xxxxxxxx and xxxxxx xxxxx xx xxxxx any xxxxxxxxxx xxx shall be xxxxxxxx xxx xxxxxxxx xx xx a timely xxxxxxx. Xxxxxxxxxxx 1.11: Information xxxxxxxx xx xxxxxxxx&xxxx;(3) xxxxxxxxxxxxx Xx xxxxxx xxxxxxxxxx xx the participant’s xxxxxxxx information xxxxxxx xxxx are xxxxxxxxxx xx xxxxxxxxx, information xxxxxxxx xxxxxxxxxxxx xxx xxxxxxxxxx xxx xxxxx xxxxxxxxxx xxxx supplier’s xxxxxx shall xx xxxxxxxxxx and formally xxxxxx xxxx xxxx xxx supplier. Requirement 1.12: Xxxxxxxxxx xx information xxxxxxxx xxxxxxxxx and xxxxxxxxxxxx Xx xxxxxx a consistent xxx xxxxxxxxx xxxxxxxx xx xxx xxxxxxxxxx xx information security xxxxxxxxx, xxxxxxxxx communication xx xxxxxxxx xxxxxx xxx xxxxxxxxxx, roles, xxxxxxxxxxxxxxxx xxx xxxxxxxxxx, xx business xxx xxxxxxxxx xxxxx, xxxxx xx xxxxxxxxxxx xxx xxxxxx xx ensure x&xxxx;xxxxx, xxxxxxxxx xxx xxxxxxx xxx safely xxxxxxx xxxx xxxxxxxxxxx xxxxxxxx incidents xxxxxxxxx xxxxxxxxx xxxxxxx to x&xxxx;xxxxx-xxxxxxx xxxxx (x.x. x&xxxx;xxxxx pursued xx xx xxxxxxxx xxxxxxxx xx xx xx xxxxxxx). Personnel involved xx xxxxx procedures xxxxx xx xxxxxxxxxx xxxxxxx. Xxxxxxxxxxx 1.13: Xxxxxxxxx xxxxxxxxxx review A participant’s xxxxxxxx xxxxxxxxxxx systems (x.x. xxxx office systems, xxxxxxxx xxxxxxxx and xxxxxxxx xxxxxxx xxxxxxxxxxxx) xxxxx xx regularly xxxxxxxx xxx xxxxxxxxxx xxxx xxx organisation’s xxxxxxxxxxx framework xx xxxxxxxx (x.x. xxxxxxxxxxx xxxxxxxx policy, xxxxxxxxxxxxx xxxxxxx xxxxxx). Xxxxxxxxxxx 1.14: Xxxxxxxxxxxxxx Xxxxx xxxxxxx machines xxxxx comply with xxx xxx xxxxxxxx xxxxxxxx xxxx xxx xxx for xxxxxxxx xxxxxxxx and systems (x.x. xxxxxxxxx, xxxxxxx). Xxxxxxxx xxxxxxxx xx xxxxxxxxxxx xxxx include: xxxxxxxxx of the xxxxxxxxxx xxx xxx xxxxxxx xxxxxxxxx xxxxxx, xxxxxxx patching, strict xxxxxxxxxx of xxxxxxxxx xxxxxxxxxxxx (x.x. xxxxxxxxxx xxx xxxxxxxxxxx). Xxxxxxxxxxx xxxxxxxxxx, xxxxxxx and xxxxxxxxxx as xxxx xx xxxxxxxx of xxxxxx xxxxxx, xx xxxxxxxxxx xxx high xxxxxxxxxx xxxxxxxx, shall xx xxxxxxxxxxx based xx x&xxxx;xxxx xxxxxxxxxx. Xxxxx xxxxxxx xxxxxxxx xxxxxxx by xxx xxxx hypervisor shall xxxx x&xxxx;xxxxxxx xxxx xxxxxxx. Xxxxxxxxxxx 1.15: Xxxxx xxxxxxxxx Xxx xxxxx xx xxxxxx xxx/xx xxxxxx xxxxx xxxxxxxxx in xxx Payment Xxxxxxxxxxx Xxxxx must xx xxxxx xx x&xxxx;xxxxxx xxxx assessment, xxxxxx xxxx account xxx xxxxxxxxx controls xxx xxx xxxxxxxxxxx clauses xxxxxxx xx xxx xxxxx solution. If xxxxxx xxxxx xxxxxxxxx xxx xxxx, it is xxxxxxxxxx xxxx xxx xxxxxxxxxxx level of xxx xxxxxxx system xx xxx highest xxx xx xxx xxxxxxxxx systems. All xx-xxxxxxxx xxxxxxxxxx xx xxx xxxxxx xxxxxxxxx xxxx xx xxxxxxxxxx xxxx xxx xxxxx xx-xxxxxxxx systems. Business xxxxxxxxxx xxxxxxxxxx (xxxxxxxxxx xxxx xx xxxxxxxx xxxxxxxxxxxx) Xxx xxxxxxxxx xxxxxxxxxxxx (2.1 xx 2.6) xxxxxx xx business xxxxxxxxxx xxxxxxxxxx. Xxxx XXXXXX2 xxxxxxxxxxx classified xx xxx Eurosystem xx xxxxx critical xxx xxx smooth functioning xx xxx XXXXXX2 xxxxxx xxxxx xxxx x&xxxx;xxxxxxxx xxxxxxxxxx strategy xx xxxxx xxxxxxxxxx xxx xxxxxxxxx xxxxxxxx.
|
(1)&xxxx;&xxxx;Xxx xxxx-xx-xxxx principle xxxxxx xx xxx xxxxxxxxxxxxxx xx xxx xxx xx information xxxx xx individual xxxxx xxxxxx to in xxxxx xx carry xxx her/his xxxxxx.
(2)&xxxx;&xxxx;Xxx xxxxxxxxx xx least xxxxxxxxx refers xx xxxxxxxxx a subject’s xxxxxx xxxxxxx to xx XX xxxxxx in xxxxx xx xxxxx xxx xxxxxxxxxxxxx xxxxxxxx xxxx.
(3)&xxxx;&xxxx;X&xxxx;xxxxxxxx xx xxx xxxxxxx of this xxxxxxxx should xx xxxxxxxxxx xx xxx xxxxx xxxxx (xxx xxx personnel) xxxxx xx xxxxx xxxxxxxx (xxxxxxxxx), xxxx xxx xxxxxxxxxxx, to provide x&xxxx;xxxxxxx xxx xxxxx xxx xxxxxxx agreement xxx xxxxx xxxxx (xxx xxx xxxxxxxxx) xx granted access, xxxxxx xxxxxxxx or xx-xxxx, to information xxx/xx xxxxxxxxxxx xxxxxxx xxx/xx xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx xx xxx xxxxxxxxxxx xx xxxxx xx xxxxxxxxxx to xxx scope xxxxxxx xxxxx xxx xxxxxxxx xx xxx XXXXXX2 xxxx-xxxxxxxxxxxxx.
PŘÍLOHA XX
Xxxxxxx XX xxxxxxxxxx XXX/2007/7 se xxxx xxxxx:
1. |
Xxxxxx&xxxx;1 se xxxx xxxxx:
|
2. |
X&xxxx;xx.&xxxx;4 odst. 2 xx xxxxxxx fc) xxxxxxxxx xxxxx:
|
3. |
X&xxxx;xx.&xxxx;4 xxxx.&xxxx;2 se xxxxxx xxxx xxxxxxx xx), které xxx:
|
4. |
X&xxxx;xxxxxx&xxxx;4 xx xxxxxxxx 3 xxxxxxxxx xxxxx: „3.&xxxx;&xxxx;&xxxx;XXXXXX2 xxxxxxxx xxxx-xxxx xxxxx xxxxxxxxxx xxx xxxxxxxx in xxxx, xxxx xxxxxxxxxx xx xxxxxxx xxxx xxxxx xxxxxx PM xxxxxxxx, X2X XXXx xxx XXXX XXXx. XXXXXX2 is established xxx xxxxxxxxx xx xxx xxxxx xx xxx XXX xxxxxxx xxxxx xxxxxxx xxxxxx xxx xxxxxxxxx xxx xxxxxxxxx and xxxxxxx xxxxx xxxxxxxx xxx xxxxxxxxxx xxxxxxxx xx xxx xxxx xxxxxxxxx xxxxxx. Xx xxx xx xxx xxxxxxxxx xxxxxxxxx xx xxx X2X XXXx xx xxxxxxxxx, XXXXXX2 xx xxxxxxxxxxx xxxxxxxxxxx xxx xxxxxxxxx xx xxx xxxxx of xxx X2X Platform. As xxx xx xxx xxxxxxxxx operation xx xxx TIPS XXXx xxx TIPS XX xxxxxxxxx xxxxxxxx is xxxxxxxxx, XXXXXX2 xx xxxxxxxxxxx xxxxxxxxxxx and xxxxxxxxx on xxx xxxxx xx the XXXX Platform. Xxx XXX xx xxx xxxxxxxx of xxxxxxxx xxxxx these Xxxxxxxxxx. Xxxx xxx xxxxxxxxx xx xxx SSP-providing XXXx xxx xxx 4XXx xxxxx xx xxxxxxxxxx acts xxx xxxxxxxxx xx the XXX, xxx xxxxx xx shall xxxxxx xxxxxxxxx xx xxxxxxxxxx xxxx Xxxxxxx&xxxx;21 xx xxxx Annex. Xxxxxxxxxxxxx xxxxxxxx xx xxxxx Xxxxxxxxxx xxxxx xxx xxxxxx a contractual relationship xxxxxxx T2S XXX xxxxxxx and the XXX-xxxxxxxxx XXXx or xxx 4XXx xxxx xxx xx the xxxxxx acts in xxxx capacity. Instructions, xxxxxxxx xx xxxxxxxxxxx xxxxx x&xxxx;X2X DCA xxxxxx xxxxxxxx xxxx, xx sends xx, xxx XXX xx X2X Xxxxxxxx xx xxxxxxxx to xxx xxxxxxxx provided xxxxx xxxxx Xxxxxxxxxx xxx xxxxxx xx xx xxxxxxxx from, xx xxxx to, xxx XXX.“; |
5. |
X&xxxx;xxxxxx&xxxx;8 xx xxxxxxxx 3 xxxxxxxxx tímto: „3. Where xxx ECB has xxxxxxx x&xxxx;xxxxxxx xx x&xxxx;X2X XXX xxxxxx xxxxxxxx xx xxxxxxxxx 1, that X2X XXX xxxxxx xx xxxxxx xx have xxxxx xxx participating XXX(x) x&xxxx;xxxxxxx to xxxxx xxx T2S XXX xxxx the xxxxxxx xxxxxxxx to xxxxxxxxxx transactions executed xx xxxxx xxxxxxxxxx xxxxxxxx.“; |
6. |
X&xxxx;xxxxxx&xxxx;28 xx xxxxxxxx 1 nahrazuje tímto: „1. T2S XXX xxxxxxx shall xx xxxxxx xx xx xxxxx of, xxxxx comply with, xxx xxxxx be xxxx xx xxxxxxxxxxx xxxx xxxxxxxxxx xx xxx relevant competent xxxxxxxxxxx xxxx all xxxxxxxxxxx xx them xxxxxxxx to legislation xx data xxxxxxxxxx. Xxxx xxxxx xx xxxxxx xx be xxxxx of, xxx xxxxx comply with xxx obligations on xxxx relating to xxxxxxxxxxx xx xxxxxxxxxx xx xxxxx xxxxxxxxxx xxx xxx xxxxxxxxx xx terrorism, proliferation-sensitive xxxxxxx activities xxx xxx xxxxxxxxxxx xx xxxxxxx weapons xxxxxxxx xxxxxxx, xx xxxxxxxxxx xx xxxxx xx xxxxxxxxxxxx appropriate xxxxxxxx xxxxxxxxxx xxx xxxxxxxx xxxxxxx xx credited xx xxxxx X2X XXXx. Xxxxx to xxxxxxxx xxxx the xxxxxxxxxxx relationship xxxx xxx X2X network xxxxxxx xxxxxxxx, X2X XXX xxxxxxx xxxxx xxxxxx xxxx xxxx xxx informed about xxx data xxxxxxxxx xxxxxx.“; |
7. |
Xxxxxx&xxxx;30 se xxxxxxxxx xxxxx: „Xxxxxxx&xxxx;30 Xxxxxxxxxxx xxxxxxxxxxxx with xx XXX 1.&xxxx;&xxxx;&xxxx;X2X XXX xxxxxxx xxxxx either:
2. The xxxxx relationship xxxxxxx x&xxxx;X2X XXX xxxxxx xxx xxx XXX xxxxx be xxxxxxxxxxx xxxxxxxx xx xxx xxxxx xxx xxxxxxxxxx xx xxx xxxxxxxx xxxxxxxx xxxxxxxxx with xx NSP as xxxxxxxx xx xx xxxxxxxxx 1(x). 3.&xxxx;&xxxx;&xxxx;Xxx xxxxxxxx xx be xxxxxxxx xx xxx NSP xxxxx xxx xxxx xxxx of xxx xxxxxxxx to xx xxxxxxxxx by the XXX xx respect xx XXXXXX2. 4.&xxxx;&xxxx;&xxxx;Xxx XXX xxxxx xxx xx xxxxxx xxx xxx xxxx, xxxxxx xx xxxxxxxxx xx xxx XXX (xxxxxxxxx xxx xxxxxxxxx, xxxxx xxx xxxxxxxxxxxxxx), or xxx xxx xxxx, xxxxxx xx xxxxxxxxx xx xxxxx parties selected xx xxxxxxxxxxxx xx xxxx access xx xxx XXX’x xxxxxxx.“; |
8. |
Xxxxxx xx xxxx xxxxxx&xxxx;34x, xxxxx xxx: „Xxxxxxx&xxxx;34x Xxxxxxxxxxxx provisions Once xxx XXXXXX xxxxxx xx xxxxxxxxxxx xxx XXXXXX2 has ceased xxxxxxxxx, X2X DCA xxxxxxx xxxxx xxxxxx X2X XXX xxxxxxx xx the XXXXXX xxxxxx.“; |
9. |
Xxxxxx na xxxxx „X2X xxxxxxx xxxxxxx xxxxxxxx“ (v jednotném xxxx xxxxxxx xxxxx) x&xxxx;xx.&xxxx;6 xxxx.&xxxx;1 písm. a) xxxx x), čl. 9 xxxx.&xxxx;5, xx.&xxxx;10 odst. 6, xx.&xxxx;14 xxxx.&xxxx;1 xxxx. x), čl. 22 xxxx.&xxxx;1, xx.&xxxx;22 xxxx.&xxxx;2, xx.&xxxx;22 xxxx.&xxxx;3, xx.&xxxx;27 xxxx.&xxxx;5, xx.&xxxx;28 xxxx.&xxxx;1, xx.&xxxx;29 xxxx.&xxxx;1 xxxxxxx XX x&xxxx;x&xxxx;xxxxxxxx 1 xxxxxxx X&xxxx;xx nahrazují xxxxxxx „XXX“; |
10. |
X&xxxx;xxxxxxx X&xxxx;xx v odst. 8 xxxxxxx. 4 xxxxxxxxx xxxxxxx b) xxxxx:
|
XXXXXXX XXX
Xxxxxxx III xxxxxxxxxx XXX/2007/7 xx xxxx xxxxx:
1. |
Xxxxxx xx xxxxx „XXXX network xxxxxxx provider“ (x&xxxx;xxxxxxxxx xxxx množném čísle) x&xxxx;xxxx příloze xx xxxxxxxxx odkazem „XXX“; |
2. |
Xxxxxx&xxxx;1 xx mění xxxxx:
|
3. |
X&xxxx;xx.&xxxx;3 xxxx.&xxxx;1 xx zrušuje xxxxx na „Appendix X: XXXX xxxxxxxxxxxx xxxxxxxxx xxxxxxxxxxxx“; |
4. |
Xxxxxx&xxxx;4 xx xxxx takto:
|
5. |
X&xxxx;xx.&xxxx;6 xxxx.&xxxx;1 xxxx. x) xx xxx x) xxxxxxxxx xxxxx:
|
6. |
Xxxxxx&xxxx;9 xx xxxxxxxxx xxxxx: „Xxxxxxx&xxxx;9 Xxxxxxxxxxx relationship with xx XXX 1.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx shall xxxxxx:
2.&xxxx;&xxxx;&xxxx;Xxx xxxxx xxxxxxxxxxxx xxxxxxx x&xxxx;xxxxxxxxxxx xxx the XXX xxxxx xx xxxxxxxxxxx xxxxxxxx xx xxx xxxxx xxx xxxxxxxxxx xx xxxxx xxxxxxxx xxxxxxxx as xxxxxxxx xx xx xxxxxxxxx 1(x). 3.&xxxx;&xxxx;&xxxx;Xxx xxxxxxxx xx xx xxxxxxxx xx xxx XXX shall xxx form part xx xxx services xx xx xxxxxxxxx xx the ECB xx xxxxxxx xx XXXXXX2. 4.&xxxx;&xxxx;&xxxx;Xxx XXX xxxxx xxx xx xxxxxx xxx any xxxx, xxxxxx xx omissions xx xxx XXX (xxxxxxxxx xxx xxxxxxxxx, xxxxx xxx xxxxxxxxxxxxxx), xx for any xxxx, errors xx xxxxxxxxx by third xxxxxxx xxxxxxxx xx xxxxxxxxxxxx xx xxxx xxxxxx xx xxx XXX’x xxxxxxx.“; |
7. |
Xxxxxx&xxxx;10 xx xxxxxxx; |
8. |
Xxxxxx xx nový xxxxxx&xxxx;11x, xxxxx xxx: „Xxxxxxx&xxxx;11x XXX xxxxxxxxxx 1.&xxxx;&xxxx;&xxxx;Xxx xxxxxxx MPL xxxxxxxxxx xxxxxxxx xxx xxxxx – XXXX xxxxxxx table xxx xxx xxxxxxxx of xxx XXX xxxxxxx. 2.&xxxx;&xxxx;&xxxx;Xxxx xxxxx xxx be xxxxxx xx only xxx IBAN. Xx XXXX xxx be xxxxxx to xxx xx multiple proxies. 3. Article 29 xxxxx xxxxx xx xxx xxxx xxxxxxxxx xx xxx XXX xxxxxxxxxx.“; |
9. |
X&xxxx;xxxxxx&xxxx;12 xx zrušuje xxxxxxxx 9; |
10. |
Xxxxxx&xxxx;16 xx xxxxxxxxx tímto: „Article 16 Types xx xxxxxxx xxxxxx xx XXXX XXX Xxx xxxxxxxxx xxx xxxxxxxxxx xx xxxxxxx xxxxxx xxx xxx purposes xx xxx XXXX service:
|
11. |
X&xxxx;xxxxxx&xxxx;18 se xxxxxxxx 6 xxxxxxxxx xxxxx: „6.&xxxx;&xxxx;&xxxx;Xxxxx x&xxxx;XXXX XXX xx XX liquidity xxxxxxxx xxxxx, x&xxxx;XXXX XXX xx TIPS XX xxxxxxxxx xxxxxxx xxxxxxxxx xxxxxxxx xxxxx xx a TIPS AS xxxxxxxxx account to XXXX XXX liquidity xxxxxxxx order has xxxx xxxxxxxx xx xxxxxxxx xx in Xxxxxxx&xxxx;17, the TARGET2-ECB xxxxx check xxxxxxx xxxxxxxxxx xxxxx xxx xxxxxxxxx on xxx xxxxx'x account. Xx xxxxxxxxxx xxxxx xxx xxx xxxxxxxxx the xxxxxxxxx xxxxxxxx xxxxx xxxxx xx rejected. Xx sufficient xxxxx xxx available the xxxxxxxxx xxxxxxxx xxxxx xxxxx xx xxxxxxx xxxxxxxxxxx.“; |
12. |
X&xxxx;xx.&xxxx;20 xxxx.&xxxx;1 se xxxxxxx x) nahrazuje xxxxx:
|
13. |
X&xxxx;xxxxxx&xxxx;30 se odstavec 1 xxxxxxxxx tímto: „1. TIPS XXX holders xxxxx xx xxxxxx xx xx aware xx, xxxxx comply xxxx xxx shall xx xxxx to xxxxxxxxxxx xxxx compliance to xxx xxxxxxxx xxxxxxxxx xxxxxxxxxxx with xxx xxxxxxxxxxx xx them xxxxxxxx xx legislation xx xxxx protection. Xxxx xxxxx be xxxxxx xx xx xxxxx of, xxx xxxxx xxxxxx xxxx xxx xxxxxxxxxxx xx xxxx relating xx xxxxxxxxxxx xx xxxxxxxxxx xx xxxxx xxxxxxxxxx xxx xxx xxxxxxxxx xx xxxxxxxxx, xxxxxxxxxxxxx-xxxxxxxxx xxxxxxx activities and xxx xxxxxxxxxxx xx xxxxxxx xxxxxxx xxxxxxxx xxxxxxx, xx xxxxxxxxxx xx xxxxx of xxxxxxxxxxxx xxxxxxxxxxx xxxxxxxx xxxxxxxxxx xxx payments xxxxxxx xx xxxxxxxx xx xxxxx TIPS XXXx. TIPS XXX xxxxxxx xxxxxx that xxxx xxx xxxxxxxx xxxxx xxxxx chosen XXX'x data xxxxxxxxx xxxxxx xxxxx xx xxxxxxxx xxxx x&xxxx;xxxxxxxxxxx xxxxxxxxxxxx xxxx xxxx XXX.“; |
14. |
Xxxxxx xx xxxx xxxxxx&xxxx;35x, který xxx: „Xxxxxxx&xxxx;35x Xxxxxxxxxxxx xxxxxxxxx Xxxx the XXXXXX xxxxxx is operational xxx xxx XXXXXX2 xxx ceased operation, XXXX DCA xxxxxxx xxxxx xxxxxx TIPS XXX xxxxxxx in xxx XXXXXX system.“; |
15. |
V dodatku X&xxxx;xx tabulka x&xxxx;xxxxxxxx 2 nahrazuje tímto:
|
16. |
X&xxxx;xxxxxxx X&xxxx;xx x&xxxx;xxxx.&xxxx;6 xxxxxxx. 1 nahrazuje xxxxxxx b) xxxxx:
|
17. |
X&xxxx;xxxxxxx XX xx xxxxxxx xxxxxxxx 2; |
18. |
Dodatek V se xxxxxxx. |