XXXXXXXXXX XXXXXXXX CENTRÁLNÍ XXXXX (XX) 2021/1758
xx xxx 21.&xxxx;xxxx 2021,
xxxxxx xx xxxx rozhodnutí XXX/2007/7 x&xxxx;xxxxxxxxxx XXXXXX2-XXX (XXX/2021/43)
XXXXXXX RADA EVROPSKÉ XXXXXXXXX XXXXX,
x&xxxx;xxxxxxx xx Xxxxxxx x&xxxx;xxxxxxxxx Evropské xxxx, x&xxxx;xxxxxxx xx xxxxx x&xxxx;xxxxxxx xxxxxxx xx.&xxxx;127 odst. 2 xxxx xxxxxxx,
x&xxxx;xxxxxxx xx xxxxxx Xxxxxxxxxx xxxxxxx xxxxxxxxxxx xxxx a Evropské xxxxxxxxx xxxxx, x&xxxx;xxxxxxx na xxxxxx&xxxx;11.6 x&xxxx;xxxxxx 17, 22 a 23 xxxxxx xxxxxxx,
xxxxxxxx x&xxxx;xxxxx xxxxxxx:
(1) |
Xxxx xxxxxxxxx xxxxxxx&xxxx;(1) xxx 20.&xxxx;xxxxxxxx 2021 obecné xxxxxx Evropské xxxxxxxxx xxxxx ECB/2012/27 (2) s cílem: x) vyjasnit, xx xxxxxxxx TIPS XXX xxxxx k TARGET2 xxxxxxxxx xxxxxxxxxxxxxxx jednotného xxxxxxx xxxxx infrastruktury Xxxxxxxxxxx (Xxxxxxxxxx Xxxxxx Market Xxxxxxxxxxxxxx Xxxxxxx) xx xxxxxxxxx 2021 a majitelé X2X XXX budou x&xxxx;XXXXXX2 xxxxxxxxxxxxxxx xxxxxx xxxxxxx xxxxxxxxx xx xxxxxx 2022; b) xxxxxxxx a rozšířit xxxxxxxx xxxxxxxx se xxxxxxxxxx xxxxxxxxx xx xxxxxxxxxx xxxxxxxxx xxxx XXXXXX2, xxx xx zajistilo, xx xx xxxxxx XXXXXX2 bude xxxx xxxxxxx tak, aby xxx schopen xxxxx xxxxxxx v oblasti xxxxxxxxxxxx xxxxxxxxxxx; c) xxxxxx xxxxxxxxx, xxx majitelé xxxx PM, xxxxxx xxxxxxx účastníci a adresovatelní xxxxxxxx kódu XXX, xxxxx xxxxxxxxxxx x&xxxx;xxxxxxxxxxx xxxxxxx XXX Xxxx xxxxxxxx dohody o dodržování xxxxxxx pro okamžité xxxxxxxxxxxxx xxxxxxx XXXX, xxxx x&xxxx;xxxxxxx xxxxxx xxxxxxxxxxx xx platformě XXXX xxxxxxxxxxxxxxx TIPS XXX, tak aby xx xxxxxxxxx xxxxxxxxxx xxxxxxxxxx plateb x&xxxx;xxxx Xxxx; x) xxxxxx xxxxxxxxxxxxxxx, xxxxx xxx x&xxxx;xxxxxxx převodu xxxxxxxx x&xxxx;xxxx xxxxxxxxx v TARGET2 xx xxxxxxxxxxxx xxxxxxxxxxx xxxx x&xxxx;xxxxxxxx systému XXXXXX, xxx byla xxxxxxxxx právní jistota, x&xxxx;x) xxxxxxxx a aktualizovat xxxxxxx další aspekty xxxxxxxx xxxxx ECB/2012/27. |
(2) |
Jakmile xxxx zprovozněn xxxxxxx xxxxxxxxxxx X2-X2X, xxxx x&xxxx;xxxxx právní jistoty xxxxxx xxxxxxxx xxxxxxxx xxxxxxxxxxxxxxx, pokud jde x&xxxx;xxxxxxx xxxxxxx xxxxxxxx x&xxxx;xxxx xxxxxxxxx v TARGET2-ECB xx odpovídající xxxxxxxxxxx xxxx. |
(3) |
Xxxxx obecných xxxxx XXX/2012/27, xxxxx mají xxxx na xxxxxxxx XXXXXX2-XXX, je xxxxx xxxxxxxxx x&xxxx;xxxxxxxxxx Evropské xxxxxxxxx banky XXX/2007/7&xxxx;(3). |
(4) |
Xxxxxxxxxx XXX/2007/7 je xxxxx xxxxx odpovídajícím xxxxxxxx xxxxxx, |
XXXXXXX XXXX ROZHODNUTÍ:
Článek 1
Změny
Přílohy I, XX x&xxxx;XXX rozhodnutí XXX/2007/7 xx mění x&xxxx;xxxxxxx x&xxxx;xxxxxxxxx xxxxxx xxxxxxxxxx.
Článek 2
Závěrečná ustanovení
Toto xxxxxxxxxx xxxxxxxx x&xxxx;xxxxxxxx xxxxx xxxx po xxxxxxxxxx x&xxxx;Xxxxxxx věstníku Xxxxxxxx xxxx.
Xxxxxxx xx xxx xxx 21.&xxxx;xxxxxxxxx 2021, x&xxxx;xxxxxxxx odst. 1 xxxx. x) x&xxxx;xxxxxxxx 7 x&xxxx;9 přílohy II xxxxxx xxxxxxxxxx, xxxxx xx použijí xxx xxx 13. června 2022.
Xx Xxxxxxxxxx nad Xxxxxxx xxx 21.&xxxx;xxxx 2021.
Xxxxxxxxxxx ECB
Christine LAGARDE
(1) Obecné xxxxxx Evropské xxxxxxxxx xxxxx (XX) 2021/1759 xx xxx 20.&xxxx;xxxxxxxx 2021, kterými se xxxx xxxxxx zásady XXX/2012/27 o transevropském expresním xxxxxxxxxxxxxxx systému xxxxxxxxx xxxxxx x&xxxx;xxxxxxx xxxx (XXXXXX2) (XXX/2021/30) [(viz xxxxxx 45 x&xxxx;xxxxx xxxxx Xxxxxxxx xxxxxxxx).
(2)&xxxx;&xxxx;Xxxxxx xxxxxx Evropské xxxxxxxxx xxxxx XXX/2012/27 ze xxx 5. prosince 2012 x&xxxx;xxxxxxxxxxxxxx xxxxxxxxx xxxxxxxxxxxxxxx xxxxxxx xxxxxxxxx plateb x&xxxx;xxxxxxx xxxx (TARGET2) (Xx. věst. X&xxxx;30, 30.1.2013, s. 1).
(3)&xxxx;&xxxx;Xxxxxxxxxx Xxxxxxxx xxxxxxxxx xxxxx XXX/2007/7 ze dne 24.&xxxx;xxxxxxxx 2007 o podmínkách XXXXXX2-XXX (Úř. xxxx. X&xxxx;237, 8.9.2007, s. 71).
XXXXXXX X
Xxxxxxx I rozhodnutí XXX/2007/7 xx mění xxxxx:
1. |
Xxxxxx&xxxx;1 se xxxx xxxxx:
|
2. |
X&xxxx;xxxxxx&xxxx;2 xxxxxx xxxxxxxx xx xxxxxxxx xxxx xxxx, xxxxx zní:
|
3. |
Článek 3 xx xxxx takto:
|
4. |
Xxxxxx&xxxx;5 xx xxxxxxxxx xxxxx: „Xxxxxxx&xxxx;5 Xxxxxx participants PM xxxxxxx xxxxxxx xx XXXXXX2-XXX xxx xxxxxx xxxxxxxxxxxx xxx xxxxx xxxxxx xxxx xxx requirements xxx out xx Xxxxxxx&xxxx;8(1) xxx&xxxx;(2). Xxxx xxxxx have xx xxxxx xxx XX xxxxxxx xxxx the XXX. XX account xxxxxxx xxxx xxxx xxxxxxx to xxx XXX Xxxx xxxxxx xx signing xxx XXXX Instant Xxxxxx Xxxxxxxx Adherence Xxxxxxxxx xxxxx xx xxx xxxxx remain xxxxxxxxx xx xxx XXXX Xxxxxxxx at all xxxxx, xxxxxx as x&xxxx;XXXX DCA xxxxxx xx xx a reachable xxxxx via a TIPS XXX xxxxxx.“; |
5. |
Xxxxxx&xxxx;22 xx xxxxxxxxx xxxxx: „Xxxxxxx&xxxx;22 Xxxxxxxx Xxxxxxxxxxxx xxx Xxxxxxx Xxxxxxxxxx 1.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx xxxxx xxxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx xx xxxxxxx xxxxx xxxxxxx xxxx xxxxxxxxxxxx xxxxxx xxx xxx. Xxxxxxxxxxxx xxxxx xx xxxxxxxxxxx xxxxxxxxxxx for xxx xxxxxxxx xxxxxxxxxx of xxx xxxxxxxxxxxxxxx, xxxxxxxxx xxx availability of xxxxx systems. 2. Participants shall xxxxxx the XXX xx xxx xxxxxxxx-xxxxxxx xxxxxxxxx in their xxxxxxxxx xxxxxxxxxxxxxx xxx, xxxxx appropriate, xxxxxxxx-xxxxxxx xxxxxxxxx xxxx xxxxx xx the xxxxxxxxx xxxxxxxxxxxxxx xx xxx xxxxx xxxxx xxxxxxxxx. Xxx XXX xxx xxxxxxx xxxxxxx xxxxxxxxxxx xxxxx xxx xxxxxxxx xxx, if xxxxxxxxx, xxxxxxx that xxx xxxxxxxxxxx take xxxxxxxxxxx xxxxxxxx xx prevent x&xxxx;xxxxxxxxxx xx xxxx xx xxxxx. 3.&xxxx;&xxxx;&xxxx;Xxx ECB xxx xxxxxx xxxxxxxxxx xxxxxxxx xxxxxxxxxxxx, xx xxxxxxxxxx xxxx regard xx xxxxxxxxxxxxx xx xxx xxxxxxxxxx xx xxxxx, xx all xxxxxxxxxxxx xxx/xx xx xxxxxxxxxxxx xxxx xxx xxxxxxxxxx xxxxxxxx by xxx XXX. 4.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx xxxxx xxxxxxx xxx ECB xxxx: (x) xxxxxxxxx xxxxxx to xxxxx xxxxxxxxxxx of adherence xx their chosen xxxxxxx service xxxxxxxx’x xxxxxxxx xxxxxxxx requirements, xxx (xx) on xx xxxxxx xxxxx xxx XXXXXX2 xxxx-xxxxxxxxxxxxx xxxxxxxxx xx published xx xxx XXX’x xxxxxxx in English. 4a. The XXX xxxxx assess xxx xxxxxxxxxxx’x self-certification xxxxxxxxx(x) xx xxx xxxxxxxxxxxx xxxxx xx xxxxxxxxxx xxxx xxxx xx xxx requirements xxx xxx xx xxx TARGET2 xxxx-xxxxxxxxxxxxx xxxxxxxxxxxx. These requirements xxx xxxxxx in Xxxxxxxx XXX, xxxxx xx xxxxxxxx to xxx xxxxx Appendices xxxxxx xx Xxxxxxx&xxxx;2(1), xxxxx xxxx xx xxxxxxxx part of xxxxx Xxxxxxxxxx. 4x.&xxxx;&xxxx;&xxxx;Xxx participant’s xxxxx xx compliance xxxx xxx requirements xx xxx TARGET2 xxxx-xxxxxxxxxxxxx xxxxx xx xxxxxxxxxxx xx xxxxxxx, xx xxxxxxxxxx order xx xxxxxxxx: ‘xxxx xxxxxxxxxx’; ‘xxxxx xxx-xxxxxxxxxx’; xx ‘xxxxx non-compliance’. Xxx following criteria xxxxx: xxxx xxxxxxxxxx xx xxxxxxx xxxxx xxxxxxxxxxxx xxxxxxx 100% xx the xxxxxxxxxxxx; xxxxx xxx-xxxxxxxxxx xx xxxxx a participant xxxxxxxxx xxxx than 100% xxx xx xxxxx 66% xx xxx xxxxxxxxxxxx xxx xxxxx xxx-xxxxxxxxxx xxxxx x&xxxx;xxxxxxxxxxx xxxxxxxxx xxxx than 66% xx xxx xxxxxxxxxxxx. Xx x&xxxx;xxxxxxxxxxx xxxxxxxxxxxx that a specific xxxxxxxxxxx is xxx xxxxxxxxxx xx xx, xx shall be xxxxxxxxxx xx xxxxxxxxx xxxx xxx respective xxxxxxxxxxx for xxx xxxxxxxx xx the xxxxxxxxxxxxxx. A participant which xxxxx to xxxxx ‘xxxx xxxxxxxxxx’ shall xxxxxx an action xxxx xxxxxxxxxxxxx xxx xx intends xx xxxxx xxxx xxxxxxxxxx. Xxx ECB xxxxx xxxxxx the xxxxxxxx xxxxxxxxxxx xxxxxxxxxxx xx xxx xxxxxx xx xxxx participant’s compliance. 4c. If xxx participant refuses xx xxxxx xxxxxxxxx xxxxxx to its xxxxxxxxxxx xx xxxxxxxxx xx their chosen XXXx xxxxxxxx xxxxxxxx xxxxxxxxxxxx xx xxxx xxx xxxxxxx xxx XXXXXX2 xxxx-xxxxxxxxxxxxx the xxxxxxxxxxx’x xxxxx of xxxxxxxxxx xxxxx xx xxxxxxxxxxx xx ‘xxxxx xxx-xxxxxxxxxx’. 4x.&xxxx;&xxxx;&xxxx;Xxx XXX shall xxxxxxxx xxxxxxxxxx xx xxxxxxxxxxxx xx an xxxxxx xxxxx. 4x.&xxxx;&xxxx;&xxxx;Xxx XXX xxx xxxxxx the xxxxxxxxx measures xx xxxxxxx xx xxxxxxxxxxxx xxxxx level of xxxxxxxxxx xxx xxxxxxxx xx xxxxx xx xxxxx non-compliance, xx xxxxxxxxxx xxxxx xx xxxxxxxx:
|
6. |
X&xxxx;xxxxxx&xxxx;33 xx odstavec 1 xxxxxxxxx tímto: „1. Participants xxxxx xx xxxxxx xx xx xxxxx xx, xxxxx xxxxxx xxxx, xxx xxxxx xx xxxx to xxxxxxxxxxx xxxx compliance xx the xxxxxxxx xxxxxxxxx xxxxxxxxxxx with xxx obligations xx xxxx xxxxxxxx to xxxxxxxxxxx xx xxxx xxxxxxxxxx. Xxxx xxxxx xx xxxxxx to xx xxxxx xx, xxx shall comply xxxx all xxxxxxxxxxx xx them xxxxxxxx xx xxxxxxxxxxx on xxxxxxxxxx xx money xxxxxxxxxx xxx the xxxxxxxxx xx xxxxxxxxx, xxxxxxxxxxxxx-xxxxxxxxx xxxxxxx xxxxxxxxxx xxx xxx xxxxxxxxxxx xx xxxxxxx weapons xxxxxxxx systems, in xxxxxxxxxx xx xxxxx xx xxxxxxxxxxxx xxxxxxxxxxx xxxxxxxx xxxxxxxxxx any xxxxxxxx xxxxxxx or xxxxxxxx on xxxxx XX accounts. Xxxxxxxxxxxx xxxxx xxxxxx that xxxx are xxxxxxxx xxxxx xxx TARGET2 xxxxxxx service provider’s xxxx xxxxxxxxx policy xxxxx xx entering xxxx xxx contractual xxxxxxxxxxxx xxxx xxx XXXXXX2 xxxxxxx service xxxxxxxx.“; |
7. |
Xxxxxx xx nový xxxxxx&xxxx;39x, xxxxx xxx: „Xxxxxxx&xxxx;39x Xxxxxxxxxxxx xxxxxxxxxx 1.&xxxx;&xxxx;&xxxx;Xxxx the TARGET xxxxxx is operational xxx XXXXXX2 has xxxxxx xxxxxxxxx, PM xxxxxxx xxxxxxxx xxxxx xx xxxxxxxxxxx xx xxx account xxxxxx’x xxxxxxxxxxxxx xxxxxxxxx accounts xx xxx XXXXXX xxxxxx. 2.&xxxx;&xxxx;&xxxx;Xxx xxxxxxxxxxx xxxx XX xxxxxxx xxxxxxx, xxxxxxxx Xxxxxxxxxxxx xxx xxxxxxxxxxx XXX holders xxxxxxxx xx xxx XXX Xxxx xxxxxx xx reachable xx xxx XXXX Xxxxxxxx xxxxxxxx to Xxxxxxx&xxxx;5 xxxxx xxxxx as xx 25 Xxxxxxxx 2022.“; |
8. |
X&xxxx;xxxxxxx I se v odst. 8 xxxxxxx. 4 xxxxxxxxx xxxxxxx x) xxxxx:
|
9. |
X&xxxx;xxxxxxx XX xx x&xxxx;xxxxxxxx 6 xxxxxxxxx xxxxxxx x) xxxxx:
|
10. |
Xxxxxxxx se xxxx xxxxxxx XXX, xxxxx xxx: „Xxxxxxxx VII Requirements xxxxxxxxx xxxxxxxxxxx security xxxxxxxxxx xxx business xxxxxxxxxx xxxxxxxxxx Xxxxxxxxxxx security xxxxxxxxxx Xxxxx xxxxxxxxxxxx xxx applicable xx each xxxxxxxxxxx, xxxxxx the xxxxxxxxxxx xxxxxxxxxxxx xxxx x&xxxx;xxxxxxxx xxxxxxxxxxx xx xxx xxxxxxxxxx to it. Xx xxxxxxxxxxxx the xxxxx xx xxxxxxxxxxx xx the xxxxxxxxxxxx xxxxxx xxx xxxxxxxxxxxxxx, xxx xxxxxxxxxxx xxxxxx xxxxxxxx the xxxxxxxx xxxx are xxxx xx xxx Xxxxxxx Xxxxxxxxxxx Chain (PTC). Xxxxxxxxxxxx, the PTC xxxxxx at a Point xx Xxxxx (XxX), x.x. x&xxxx;xxxxxx involved xx xxx xxxxxxxx xx xxxxxxxxxxxx (x.x. xxxxxxxxxxxx, xxxxx-xxxxxx xxx xxxx-xxxxxx applications, xxxxxxxxxx), xxx xxxx xx xxx xxxxxx xxxxxxxxxxx xx xxxx xxx xxxxxxx xx XXXXX (x.x. XXXXX XXX Xxx) or Xxxxxxxx (xxxx the xxxxxx xxxxxxxxxx xx Xxxxxxxx-xxxxx Xxxxxx). Xxxxxxxxxxx 1.1: Information xxxxxxxx xxxxxx Xxx xxxxxxxxxx xxxxx xxx a clear xxxxxx direction in xxxx xxxx xxxxxxxx xxxxxxxxxx and demonstrate xxxxxxx for xxx xxxxxxxxxx xx xxxxxxxxxxx xxxxxxxx xxxxxxx xxx xxxxxxxx, xxxxxxxx and xxxxxxxxxxx xx an xxxxxxxxxxx xxxxxxxx policy xxxxxx xx xxxxxxxx xxxxxxxxxxx security xxx xxxxx xxxxxxxxxx xxxxxx xxx organisation xx xxxxx of identification, xxxxxxxxxx and xxxxxxxxx xx xxxxxxxxxxx security xxx xxxxx xxxxxxxxxx xxxxx. Xxx policy xxxxxx xxxxxxx xx xxxxx xxx xxxxxxxxx xxxxxxxx: xxxxxxxxxx, xxxxx (xxxxxxxxx xxxxxxx such xx organisation, human xxxxxxxxx, xxxxx xxxxxxxxxx xxx.), xxxxxxxxxx xxx xxxxxxxxxx xx xxxxxxxxxxxxxxxx. Xxxxxxxxxxx 1.2: Xxxxxxxx xxxxxxxxxxxx Xx xxxxxxxxxxx xxxxxxxx xxxxxxxxx xxxxx be established xx xxxxxxxxx the xxxxxxxxxxx security xxxxxx xxxxxx xxx organisation. Xxx xxxxxxxxxx shall xxxxxxxxxx and xxxxxx xxx xxxxxxxxxxxxx xx xxx xxxxxxxxxxx security xxxxxxxxx xx ensure xxx implementation xx xxx xxxxxxxxxxx xxxxxxxx xxxxxx (xx per Xxxxxxxxxxx 1.1) xxxxxx xxx xxxxxxxxxxxx, including xxx xxxxxxxxxx of xxxxxxxxxx xxxxxxxxx xxx xxxxxxxxxx xx xxxxxxxx xxxxxxxxxxxxxxxx for xxxx xxxxxxx. Xxxxxxxxxxx 1.3: Xxxxxxxx xxxxxxx Xxx security xx xxx xxxxxxxxxxxx’x xxxxxxxxxxx xxx information xxxxxxxxxx xxxxxxxxxx xxxxxx xxx xx xxxxxxx xx xxx xxxxxxxxxxxx of, xxx/xx the xxxxxxxxxx xx, an xxxxxxxx xxxxx/xxxxxxx xx xxxxxxxx/xxxxxxxx xxxxxxxx xx them. Xxx access xx xxx organisation’s xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx xx xxxxxxxx xxxxxxx xxxxx xx controlled. Xxxx xxxxxxxx xxxxxxx xx xxxxxxxx/xxxxxxxx xx external xxxxxxx xxx required xx xxxxxx xxx xxxxxxxxxxxx’x information processing xxxxxxxxxx, x&xxxx;xxxx assessment xxxxx xx xxxxxxx xxx xx xxxxxxxxx xxx xxxxxxxx implications xxx xxxxxxx requirements. Xxxxxxxx xxxxx be xxxxxx xxx xxxxxxx xx xx xxxxxxxxx xxxx each relevant xxxxxxxx party. Requirement 1.4: Xxxxx xxxxxxxxxx Xxx xxxxxxxxxxx xxxxxx, xxx xxxxxxxx xxxxxxxxx xxx the xxxxxxxxxx information xxxxxxx, xxxx xx xxxxxxxxx xxxxxxx, infrastructures, xxxxxxxx xxxxxxxxxxxx, xxx-xxx-xxxxx xxxxxxxx, xxxxxxxx xxx user-developed xxxxxxxxxxxx, xx xxx xxxxx xx xxx Xxxxxxx Xxxxxxxxxxx Xxxxx xxxxx xx accounted xxx and xxxx x&xxxx;xxxxxxxxx xxxxx. Xxx xxxxxxxxxxxxxx xxx xxx xxxxxxxxxxx xxx xxx xxxxxxxxx xx xxxxxxxxxxx xxxxxxxx in xxx xxxxxxxx xxxxxxxxx xxx xxx xxxxxxx XX xxxxxxxxxx xx xxxxxxxxx xxx xxxxxxxxxxx xxxxxx xxxxx xx assigned. Xxxx: the xxxxx xxx xxxxxxxx xxx xxxxxxxxxxxxxx xx specific xxxxxxxx xx xxxxxxxxxxx, xxx xxxxxxx xxxxxxxxxxx xxx the xxxxxx xxxxxxxxxx of xxx xxxxxx. Xxxxxxxxxxx 1.5: Xxxxxxxxxxx xxxxxx classification Information xxxxxx xxxxx xx xxxxxxxxxx xx terms xx xxxxx xxxxxxxxxxx to xxx smooth delivery xx xxx xxxxxxx xx the participant. Xxx classification xxxxx xxxxxxxx xxx xxxx, xxxxxxxxxx xxx xxxxxx xx protection xxxxxxxx xxxx xxxxxxxx the xxxxxxxxxxx asset xx xxx xxxxxxxx xxxxxxxx xxxxxxxxx xxx shall xxxx xxxx into xxxxxxxxxxxxx the underlying XX components. Xx xxxxxxxxxxx xxxxx xxxxxxxxxxxxxx xxxxxx xxxxxxxx by xxx xxxxxxxxxx xxxxx xx used to xxxxxx an appropriate xxx xx xxxxxxxxxx xxxxxxxx xxxxxxxxxx xxx xxxxxxxxxxx xxxxx lifecycle (xxxxxxxxx xxxxxxx xxx xxxxxxxxxxx of xxxxxxxxxxx xxxxxx) and to xxxxxxxxxxx xxx xxxx xxx xxxxxxxx xxxxxxxx xxxxxxxx. Xxxxxxxxxxx 1.6: Xxxxx xxxxxxxxx xxxxxxxx Xxxxxxxx xxxxxxxxxxxxxxxx xxxxx xx xxxxxxxxx xxxxx xx xxxxxxxxxx xx adequate job xxxxxxxxxxxx xxx xx xxxxx and conditions xx employment. Xxx xxxxxxxxxx for xxxxxxxxxx, xxxxxxxxxxx xxx xxxxx xxxxx users xxxxx xx xxxxxxxxxx screened, xxxxxxxxxx xxx xxxxxxxxx xxxx. Xxxxxxxxx, xxxxxxxxxxx xxx third party xxxxx xx xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx shall xxxx xx xxxxxxxxx xx their xxxxxxxx xxxxx xxx xxxxxxxxxxxxxxxx. Xx xxxxxxxx xxxxx xx xxxxxxxxx xxxxx xx ensured xxxxx xxx employees, xxxxxxxxxxx xxx third xxxxx xxxxx, xxx xxxxxxxxx xxx xxxxxxxx xx xxxxxxxx procedures xxx xxx xxxxxxx xxx xx xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx xxxxx xx xxxxxxxx xx xxxx xx xxxxxxxx xxxxxxxx xxxxxxxx risks. X&xxxx;xxxxxx xxxxxxxxxxxx xxxxxxx xxx xxxxxxxx xxxxxxxx xxxxxxxx xxxxx xx xxxxxxxxxxx xxx employees. Xxxxxxxxxxxxxxxx xxxxx xx xx xxxxx to xxxxxx xxxx xx xxxxxxxx’x, xxxxxxxxxx’x xx xxxxx xxxxx xxxx’x xxxx xxxx or xxxxxxxx xxxxxx xxx xxxxxxxxxxxx xx xxxxxxx, xxx xxxx xxx xxxxxx xx xxx xxxxxxxxx xxx the xxxxxxx xx xxx xxxxxx xxxxxx are xxxxxxxxx. Xxxxxxxxxxx 1.7: Xxxxxxxx xxx xxxxxxxxxxxxx security Critical xx xxxxxxxxx information processing xxxxxxxxxx shall xx xxxxxx xx xxxxxx xxxxx, xxxxxxxxx by xxxxxxx security xxxxxxxxxx, xxxx xxxxxxxxxxx security xxxxxxxx xxx xxxxx xxxxxxxx. Xxxx xxxxx xx xxxxxxxxxx xxxxxxxxx xxxx xxxxxxxxxxxx access, xxxxxx xxx xxxxxxxxxxxx. Xxxxxx xxxxx xx xxxxxxx xxxx to xxxxxxxxxxx xxx xxxx xxxxxx xxx xxxxx xx Xxxxxxxxxxx 1.6. Xxxxxxxxxx and xxxxxxxxx xxxxx xx xxxxxxxxxxx xx protect physical xxxxx containing xxxxxxxxxxx xxxxxx when in xxxxxxx. Xxxxxxxxx shall be xxxxxxxxx xxxx xxxxxxxx xxx xxxxxxxxxxxxx threats. Xxxxxxxxxx xx xxxxxxxxx (xxxxxxxxx xxxxxxxxx xxxx xxx-xxxx) and xxxxxxx xxx removal of xxxxxxxx xx xxxxxxxxx xx xxxxxx xxx xxxx xx xxxxxxxxxxxx xxxxxx to xxxxxxxxxxx xxx to guard xxxxxxx xxxx xx xxxxxx xx equipment xx xxxxxxxxxxx. Special xxxxxxxx may be xxxxxxxx xx xxxxxxx xxxxxxx xxxxxxxx threats xxx to xxxxxxxxx xxxxxxxxxx xxxxxxxxxx such xx the xxxxxxxxxx xxxxxx xxx xxxxxxx xxxxxxxxxxxxxx. Xxxxxxxxxxx 1.8: Operations xxxxxxxxxx Xxxxxxxxxxxxxxxx xxx xxxxxxxxxx xxxxx xx xxxxxxxxxxx xxx the xxxxxxxxxx xxx operation xx xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx xxxxxxxx all xxx xxxxxxxxxx xxxxxxx xx xxx Xxxxxxx Transaction Xxxxx xxx-xx-xxx. Xx regards xxxxxxxxx xxxxxxxxxx, including xxxxxxxxx xxxxxxxxxxxxxx xx XX xxxxxxx, xxxxxxxxxxx xx duties xxxxx xx implemented, where xxxxxxxxxxx, xx xxxxxx xxx xxxx of xxxxxxxxx xx xxxxxxxxxx xxxxxx misuse. Where xxxxxxxxxxx xx duties xxxxxx xx xxxxxxxxxxx xxx to xxxxxxxxxx xxxxxxxxx xxxxxxx, compensatory xxxxxxxx xxxxx xx xxxxxxxxxxx xxxxxxxxx x&xxxx;xxxxxx xxxx xxxxxxxx. Xxxxxxxx xxxxx xx xxxxxxxxxxx xx xxxxxxx and xxxxxx xxx introduction xx xxxxxxxxx code xxx systems xx xxx Xxxxxxx Xxxxxxxxxxx Xxxxx. Xxxxxxxx xxxxx xx xxxx xxxxxxxxxxx (xxxxxxxxx user xxxxxxxxx) xx xxxxxxx, xxxxxx xxx xxxxxx xxxxxxxxx xxxx. Mobile xxxx xxxxx xx used xxxx xxxx trusted xxxxxxx (e.g. signed Xxxxxxxxx COM components xxx Java Xxxxxxx). Xxx configuration of xxx browser (x.x. xxx xxx xx xxxxxxxxxx xxx xxxxxxx) xxxxx xx strictly xxxxxxxxxx. Xxxx xxxxxx xxx xxxxxxxx xxxxxxxx xxxxx xx implemented xx xxx xxxxxxxxxx; xxxxx xxxxxxxx xxxxxxxx shall xxxxxxx x&xxxx;xxxx xx xxx xxxxxxxxxxx xxxxxxx xxxxx is xxxxxx xx xxxxxxx intervals xx xxxxx xxxxxxxx. Xxxxxxx xxxx are xxxxxxxx xxx xxx security xx xxxxxxxx shall xx xxxxxxxxx xxx xxxxxx xxxxxxxx to xxxxxxxxxxx security xxxxx xx recorded. Xxxxxxxx xxxx shall xx xxxx xx ensure xxxx xxxxxxxxxxx xxxxxx xxxxxxxx are xxxxxxxxxx. Xxxxxxxx xxxx xxxxx xx xxxxxxxxx xxxxxxxx xx a sample xxxxx, xxxxx on the xxxxxxxxxxx of xxx xxxxxxxxxx. Xxxxxx xxxxxxxxxx xxxxx xx xxxx xx xxxxx xxx xxxxxxxxxxxxx of xxxxxxxx xxxxx xxx xxxxxxxxxx xx xxxxxxxx for xxx security of xxxxxxxx xxx to xxxxxx conformity to xx xxxxxx xxxxxx xxxxx. Xxxxxxxxx of xxxxxxxxxxx xxxxxxx xxxxxxxxxxxxx shall xx xxxxx xx x&xxxx;xxxxxx xxxxxxxx xxxxxx, xxxxxxx xxx xx xxxx xxxx exchange xxxxxxxxxx among the xxxxxxxx parties and xxxxx xx compliant xxxx any relevant xxxxxxxxxxx. Xxxxx party xxxxxxxx components xxxxxxxx xx xxx xxxxxxxx xx information with XXXXXX2 (like xxxxxxxx xxxxxxxx from x&xxxx;Xxxxxxx Xxxxxx xx scenario 2 of the xxxxx xxxxxxx xx xxx XXXXXX2 xxxx-xxxxxxxxxxxxx xxxxxxxxxxx xxxxxxxx) xxxx xx xxxx xxxxx x&xxxx;xxxxxx xxxxxxxxx xxxx xxx xxxxx xxxxx. Xxxxxxxxxxx 1.9: Xxxxxx control Access xx xxxxxxxxxxx xxxxxx xxxxx xx xxxxxxxxx xx the basis xx business xxxxxxxxxxxx (xxxx-xx-xxxx&xxxx;(1)) and xxxxxxxxx xx xxx xxxxxxxxxxx xxxxxxxxx xx xxxxxxxxx xxxxxxxx (xxxxxxxxx the xxxxxxxxxxx xxxxxxxx policy). Xxxxx xxxxxx xxxxxxx xxxxx xxxxx xx xxxxxxx based on xxx xxxxxxxxx of xxxxx xxxxxxxxx&xxxx;(2) xx xxxxxxx xxxxxxx xxx xxxxx xx xxx xxxxxxxxxxxxx xxxxxxxx xxx XX processes. Xxxxx xxxxxxxx (x.x. xxx xxxxxx xxxxxxxxxx) xxxxxxx xxxxxx xxxxxxx should xx xxxxxxxxxx with xxxxxxxx access control xxxxxx xxxxx are xxxxxxxx xxxxxxxxxxxx xxxxxxxx xx xxxxx (e.g. xxxxxxxxxx, xxxxxxxx data xxxxxxxxxxxxx). Xxxxxx xxx xxxxxxxxxx xxxxxxxxxx shall xx xx xxxxx xx xxxxxxx xxx xxxxxxxxxx xx xxxxxx rights xx xxxxxxxxxxx systems xxx services xxxx xxxx xxxxxx xxx xxxxx xx xxx Xxxxxxx Xxxxxxxxxxx Chain. Xxx xxxxxxxxxx shall xxxxx xxx xxxxxx xx xxx lifecycle xx user xxxxxx, xxxx xxx xxxxxxx xxxxxxxxxxxx of xxx xxxxx to xxx xxxxx deregistration of xxxxx xxxx no xxxxxx xxxxxxx access. Special xxxxxxxxx shall xx xxxxx, where appropriate, xx the xxxxxxxxxx xx xxxxxx xxxxxx xx such criticality xxxx xxx xxxxx xx xxxxx xxxxxx xxxxxx xxxxx lead xx x&xxxx;xxxxxx xxxxxxx xxxxxx on the xxxxxxxxxx xx the xxxxxxxxxxx (e.g. xxxxxx xxxxxx allowing xxxxxx xxxxxxxxxxxxxx, xxxxxxxx xx xxxxxx controls, direct xxxxxx xx xxxxxxxx xxxx). Xxxxxxxxxxx xxxxxxxx shall xx put in xxxxx xx xxxxxxxx, xxxxxxxxxxxx xxx xxxxxxxxx xxxxx at xxxxxxxx xxxxxx xx xxx xxxxxxxxxxxx’x network, e.g. xxx local xxx xxxxxx access xx xxxxxxx in xxx Xxxxxxx Xxxxxxxxxxx Xxxxx. Xxxxxxxx xxxxxxxx xxxxx xxx be xxxxxx xx xxxxx xx xxxxxx xxxxxxxxxxxxxx. Xxx xxxxxxxxx, xxxxx xxxxx be xxxxxxxxxxx and xxxxxxxx xx specific xxxxxxxx xx xxxxxx xxxx xxxxxxxxx xxxxxx be xxxxxx xxxxxxx, e.g. xxxxxxxxxx xxxxx xxx xxxxxxx-xxxx validity. X&xxxx;xxxx xxxxxxxx recovery and/or xxxxx xxxxxxxx xxxxx xx xxxxxxxxxxx. X&xxxx;xxxxxx xxxxx xx xxxxxxxxx xxx xxxxxxxxxxx xx xxx xxx of xxxxxxxxxxxxx xxxxxxxx to protect xxx xxxxxxxxxxxxxxx, xxxxxxxxxxxx xxx xxxxxxxxx xx xxxxxxxxxxx. X&xxxx;xxx management xxxxxx xxxxx xx xxxxxxxxxxx xx support xxx xxx xx xxxxxxxxxxxxx controls. There xxxxx xx policy xxx xxxxxxx confidential xxxxxxxxxxx xx xxxxxx xx xx xxxxx (x.x. x&xxxx;xxxxx xxxxxx, a clear xxxx policy) xx xxxxxx the xxxx xx xxxxxxxxxxxx access. When xxxxxxx xxxxxxxx, xxx xxxxx xx xxxxxxx xx an unprotected xxxxxxxxxxx xxxxx be xxxxxxxxxx and xxxxxxxxxxx xxxxxxxxx and xxxxxxxxxxxxxx xxxxxxxx xxxxx xx xxxxxxx. Xxxxxxxxxxx 1.10: Xxxxxxxxxxx xxxxxxx acquisition, development xxx maintenance Security xxxxxxxxxxxx xxxxx xx xxxxxxxxxx xxx xxxxxx xxxxx xx the xxxxxxxxxxx xxx/xx xxxxxxxxxxxxxx xx xxxxxxxxxxx xxxxxxx. Xxxxxxxxxxx controls xxxxx xx built xxxx xxxxxxxxxxxx, xxxxxxxxx xxxx-xxxxxxxxx applications, xx xxxxxx xxxxxxx xxxxxxxxxx. Xxxxx xxxxxxxx shall xxxxxxx the xxxxxxxxxx xx input xxxx, xxxxxxxx processing xxx xxxxxx data. Xxxxxxxxxx xxxxxxxx xxx be xxxxxxxx xxx xxxxxxx xxxx xxxxxxx, or xxxx an xxxxxx xx, xxxxxxxxx, valuable xx xxxxxxxx information. Xxxx xxxxxxxx xxxxx xx xxxxxxxxxx xx xxx basis xx xxxxxxxx xxxxxxxxxxxx and xxxx xxxxxxxxxx xxxxxxxxx xx the established xxxxxxxx (e.g. information xxxxxxxx xxxxxx, xxxxxxxxxxxxx xxxxxxx policy). The xxxxxxxxxxx xxxxxxxxxxxx xx xxx xxxxxxx xxxxx xx xxxxxxxxxxx, documented xxx xxxxxx xxxxx xx xxxxx xxxxxxxxxx xxx xxx. Xx xxxxxxx xxxxxxx xxxxxxxx, xxxxxxxxxxx xxxxxxxx, including xxxxxxxxxxxx xxx xxxxxx xxxxxxxxxx, xxxxxx xx xxxxxxxxxxx xxxxx xx xxx xxxxxxxxxxx of xxxx xxxxx xxx xxx xxxxx of xxxx xx xxx xxxxxxx xxxxx xx the xxxxxxxxxxxx. There shall xx xxxxxxxx xxxxxxxx xx xxxxxxx sensitive xxxxxxxxxxx xxxxxxx xxxx xxxxxx xxxxxxxx. Xxxxxx xx xxxxxx xxxxx xxx xxxxxxx xxxxxx xxxx xxxxx xx controlled xxx IT xxxxxxxx xxx xxxxxxx xxxxxxxxxx xxxxxxxxx xx x&xxxx;xxxxxx xxxxxx. Care xxxxx xx xxxxx xx xxxxx xxxxxxxx xx xxxxxxxxx data xx xxxx xxxxxxxxxxxx. Xxxxxxx xxx xxxxxxx environments xxxxx xx xxxxxxxx xxxxxxxxxx. Deployment of xxxxxxx xx xxxxxxxxxx xxxxx be xxxxxxxx xxxxxxxxxx. X&xxxx;xxxx xxxxxxxxxx xx the major xxxxxxx to xx xxxxxxxx xx production xxxxx be xxxxxxxxx. Xxxxxxx xxxxxxxx xxxxxxx xxxxxxxxxx xx xxxxxxx in xxxxxxxxxx xxxxx also xx xxxxxxxxx according xx a predefined plan xxxxx xx xxx xxxxxxx xx x&xxxx;xxxx xxxxxxxxxx, xxx xxxxxxxx xxxxxxx xxxxx xxxxxxx, xx xxxxx, xxxxxxxxxxxxx xxxxxxxxxxx. All of xxx xxxxxxxxxxxx xxxxxxxxxxx xxxxxx xxx xxxxxxxx xxxxxxx xxxxxxxxxx shall xx assessed and xxxxxx xxxxx to xxxxx xxx identified xxx xxxxx be xxxxxxxx xxx xxxxxxxx xx xx a timely xxxxxxx. Xxxxxxxxxxx 1.11: Xxxxxxxxxxx xxxxxxxx xx supplier (3) xxxxxxxxxxxxx Xx xxxxxx xxxxxxxxxx xx the xxxxxxxxxxx’x xxxxxxxx information xxxxxxx xxxx are accessible xx xxxxxxxxx, information xxxxxxxx xxxxxxxxxxxx xxx xxxxxxxxxx xxx risks xxxxxxxxxx with supplier’s xxxxxx xxxxx be xxxxxxxxxx xxx xxxxxxxx xxxxxx xxxx with xxx xxxxxxxx. Xxxxxxxxxxx 1.12: Xxxxxxxxxx of xxxxxxxxxxx xxxxxxxx xxxxxxxxx xxx xxxxxxxxxxxx Xx xxxxxx x&xxxx;xxxxxxxxxx xxx effective approach xx xxx xxxxxxxxxx xx information security xxxxxxxxx, xxxxxxxxx xxxxxxxxxxxxx xx security xxxxxx xxx xxxxxxxxxx, roles, xxxxxxxxxxxxxxxx and procedures, xx xxxxxxxx and xxxxxxxxx level, xxxxx xx xxxxxxxxxxx and xxxxxx xx xxxxxx x&xxxx;xxxxx, effective xxx xxxxxxx xxx safely xxxxxxx xxxx xxxxxxxxxxx xxxxxxxx xxxxxxxxx xxxxxxxxx xxxxxxxxx related xx x&xxxx;xxxxx-xxxxxxx cause (x.x. x&xxxx;xxxxx xxxxxxx xx xx xxxxxxxx xxxxxxxx xx xx xx xxxxxxx). Xxxxxxxxx involved xx these procedures xxxxx xx adequately xxxxxxx. Xxxxxxxxxxx 1.13: Xxxxxxxxx xxxxxxxxxx xxxxxx X&xxxx;xxxxxxxxxxx’x internal xxxxxxxxxxx systems (x.x. xxxx office xxxxxxx, xxxxxxxx xxxxxxxx xxx xxxxxxxx xxxxxxx xxxxxxxxxxxx) xxxxx be xxxxxxxxx xxxxxxxx xxx compliance xxxx xxx xxxxxxxxxxxx’x xxxxxxxxxxx xxxxxxxxx of xxxxxxxx (x.x. xxxxxxxxxxx xxxxxxxx xxxxxx, cryptographic xxxxxxx policy). Requirement 1.14: Xxxxxxxxxxxxxx Xxxxx virtual xxxxxxxx xxxxx xxxxxx with xxx xxx xxxxxxxx xxxxxxxx xxxx are xxx xxx xxxxxxxx xxxxxxxx xxx xxxxxxx (x.x. hardening, xxxxxxx). Xxxxxxxx xxxxxxxx to xxxxxxxxxxx xxxx xxxxxxx: xxxxxxxxx of the xxxxxxxxxx and the xxxxxxx xxxxxxxxx system, xxxxxxx patching, strict xxxxxxxxxx of xxxxxxxxx xxxxxxxxxxxx (x.x. xxxxxxxxxx xxx xxxxxxxxxxx). Xxxxxxxxxxx xxxxxxxxxx, logging and xxxxxxxxxx xx well xx managing xx xxxxxx xxxxxx, xx xxxxxxxxxx xxx xxxx xxxxxxxxxx xxxxxxxx, xxxxx xx implemented xxxxx xx a risk assessment. Xxxxx virtual xxxxxxxx xxxxxxx by xxx xxxx xxxxxxxxxx xxxxx xxxx x&xxxx;xxxxxxx xxxx xxxxxxx. Xxxxxxxxxxx 1.15: Xxxxx xxxxxxxxx Xxx xxxxx xx xxxxxx xxx/xx hybrid xxxxx xxxxxxxxx xx xxx Payment Xxxxxxxxxxx Xxxxx must xx xxxxx xx x&xxxx;xxxxxx xxxx xxxxxxxxxx, taking xxxx xxxxxxx xxx xxxxxxxxx xxxxxxxx xxx xxx xxxxxxxxxxx clauses xxxxxxx xx xxx xxxxx xxxxxxxx. Xx xxxxxx xxxxx solutions xxx xxxx, xx is xxxxxxxxxx that the xxxxxxxxxxx xxxxx xx xxx overall system xx the xxxxxxx xxx xx xxx xxxxxxxxx systems. Xxx xx-xxxxxxxx xxxxxxxxxx xx xxx xxxxxx xxxxxxxxx xxxx xx xxxxxxxxxx xxxx xxx xxxxx xx-xxxxxxxx xxxxxxx. Xxxxxxxx xxxxxxxxxx xxxxxxxxxx (xxxxxxxxxx only xx xxxxxxxx participants) The xxxxxxxxx requirements (2.1 xx 2.6) xxxxxx xx xxxxxxxx continuity xxxxxxxxxx. Xxxx XXXXXX2 xxxxxxxxxxx xxxxxxxxxx by xxx Xxxxxxxxxx xx xxxxx critical xxx xxx xxxxxx xxxxxxxxxxx xx xxx XXXXXX2 xxxxxx shall have x&xxxx;xxxxxxxx xxxxxxxxxx xxxxxxxx xx place xxxxxxxxxx xxx following elements.
|
(1)&xxxx;&xxxx;Xxx xxxx-xx-xxxx xxxxxxxxx xxxxxx xx xxx identification xx xxx xxx xx xxxxxxxxxxx xxxx xx xxxxxxxxxx xxxxx xxxxxx xx xx xxxxx xx carry xxx her/his xxxxxx.
(2)&xxxx;&xxxx;Xxx xxxxxxxxx of xxxxx xxxxxxxxx xxxxxx xx xxxxxxxxx x&xxxx;xxxxxxx’x access xxxxxxx to xx XX system xx xxxxx xx match xxx corresponding xxxxxxxx xxxx.
(3)&xxxx;&xxxx;X&xxxx;xxxxxxxx in the xxxxxxx of xxxx xxxxxxxx should be xxxxxxxxxx xx any xxxxx party (xxx xxx xxxxxxxxx) which xx under xxxxxxxx (xxxxxxxxx), xxxx xxx xxxxxxxxxxx, xx xxxxxxx x&xxxx;xxxxxxx and xxxxx xxx xxxxxxx agreement xxx xxxxx party (xxx its personnel) xx xxxxxxx access, xxxxxx remotely or xx-xxxx, xx xxxxxxxxxxx xxx/xx xxxxxxxxxxx systems xxx/xx xxxxxxxxxxx processing xxxxxxxxxx xx xxx xxxxxxxxxxx xx xxxxx xx associated xx xxx xxxxx xxxxxxx xxxxx the xxxxxxxx xx xxx TARGET2 xxxx-xxxxxxxxxxxxx.
XXXXXXX XX
Xxxxxxx XX xxxxxxxxxx XXX/2007/7 xx xxxx xxxxx:
1. |
Xxxxxx&xxxx;1 xx xxxx xxxxx:
|
2. |
V čl. 4 odst. 2 xx písmeno xx) xxxxxxxxx xxxxx:
|
3. |
X&xxxx;xx.&xxxx;4 xxxx.&xxxx;2 se xxxxxx nové xxxxxxx xx), které zní:
|
4. |
X&xxxx;xxxxxx&xxxx;4 xx odstavec 3 xxxxxxxxx xxxxx: „3.&xxxx;&xxxx;&xxxx;XXXXXX2 xxxxxxxx xxxx-xxxx xxxxx settlement xxx xxxxxxxx in xxxx, with settlement xx central bank xxxxx xxxxxx PM xxxxxxxx, X2X DCAs xxx TIPS XXXx. XXXXXX2 xx xxxxxxxxxxx xxx xxxxxxxxx xx xxx basis xx xxx SSP through xxxxx payment xxxxxx xxx xxxxxxxxx xxx xxxxxxxxx xxx xxxxxxx xxxxx payments xxx xxxxxxxxxx received in xxx xxxx xxxxxxxxx xxxxxx. Xx far xx xxx technical xxxxxxxxx xx the X2X XXXx is xxxxxxxxx, XXXXXX2 xx xxxxxxxxxxx xxxxxxxxxxx xxx xxxxxxxxx xx the xxxxx of the X2X Xxxxxxxx. As xxx xx xxx xxxxxxxxx xxxxxxxxx xx xxx TIPS DCAs xxx XXXX AS xxxxxxxxx accounts xx xxxxxxxxx, XXXXXX2 xx xxxxxxxxxxx xxxxxxxxxxx xxx xxxxxxxxx on the xxxxx of the XXXX Platform. Xxx XXX is xxx xxxxxxxx xx xxxxxxxx xxxxx xxxxx Xxxxxxxxxx. Xxxx xxx xxxxxxxxx xx xxx XXX-xxxxxxxxx XXXx and xxx 4XXx shall xx xxxxxxxxxx xxxx xxx xxxxxxxxx of xxx XXX, for xxxxx xx shall assume xxxxxxxxx xx xxxxxxxxxx xxxx Article 21 xx xxxx Xxxxx. Xxxxxxxxxxxxx xxxxxxxx xx xxxxx Xxxxxxxxxx xxxxx xxx xxxxxx x&xxxx;xxxxxxxxxxx relationship xxxxxxx X2X XXX xxxxxxx and xxx XXX-xxxxxxxxx XXXx or xxx 4XXx when xxx xx the xxxxxx xxxx xx xxxx xxxxxxxx. Instructions, xxxxxxxx xx xxxxxxxxxxx xxxxx a T2S XXX xxxxxx xxxxxxxx from, xx xxxxx xx, xxx SSP xx X2X Xxxxxxxx xx xxxxxxxx xx the xxxxxxxx provided xxxxx xxxxx Conditions xxx xxxxxx xx be xxxxxxxx xxxx, xx xxxx xx, the XXX.“; |
5. |
X&xxxx;xxxxxx&xxxx;8 xx xxxxxxxx 3 xxxxxxxxx tímto: „3. Where xxx XXX has xxxxxxx a request xx x&xxxx;X2X DCA xxxxxx xxxxxxxx xx xxxxxxxxx 1, xxxx X2X XXX holder xx xxxxxx xx xxxx xxxxx xxx participating XXX(x) a mandate xx xxxxx xxx X2X XXX xxxx xxx xxxxxxx xxxxxxxx to xxxxxxxxxx transactions executed xx xxxxx securities xxxxxxxx.“; |
6. |
X&xxxx;xxxxxx&xxxx;28 xx odstavec 1 xxxxxxxxx xxxxx: „1.&xxxx;&xxxx;&xxxx;X2X XXX xxxxxxx xxxxx xx xxxxxx xx xx aware of, xxxxx xxxxxx xxxx, xxx shall xx xxxx xx xxxxxxxxxxx xxxx xxxxxxxxxx xx xxx xxxxxxxx xxxxxxxxx xxxxxxxxxxx xxxx all xxxxxxxxxxx on xxxx xxxxxxxx to xxxxxxxxxxx xx xxxx xxxxxxxxxx. Xxxx xxxxx xx xxxxxx to xx xxxxx xx, xxx xxxxx xxxxxx with xxx xxxxxxxxxxx on xxxx xxxxxxxx xx xxxxxxxxxxx on xxxxxxxxxx xx xxxxx xxxxxxxxxx xxx xxx xxxxxxxxx xx xxxxxxxxx, xxxxxxxxxxxxx-xxxxxxxxx xxxxxxx xxxxxxxxxx xxx xxx xxxxxxxxxxx xx xxxxxxx xxxxxxx xxxxxxxx xxxxxxx, xx particular xx terms xx xxxxxxxxxxxx appropriate xxxxxxxx xxxxxxxxxx xxx xxxxxxxx xxxxxxx xx credited xx xxxxx X2X XXXx. Xxxxx xx xxxxxxxx xxxx the xxxxxxxxxxx xxxxxxxxxxxx with xxx X2X xxxxxxx xxxxxxx provider, X2X XXX xxxxxxx shall xxxxxx xxxx they xxx xxxxxxxx about xxx xxxx xxxxxxxxx xxxxxx.“; |
7. |
Xxxxxx&xxxx;30 se nahrazuje xxxxx: „Xxxxxxx&xxxx;30 Xxxxxxxxxxx xxxxxxxxxxxx with xx XXX 1.&xxxx;&xxxx;&xxxx;X2X XXX xxxxxxx xxxxx xxxxxx:
2. The xxxxx xxxxxxxxxxxx xxxxxxx x&xxxx;X2X DCA xxxxxx xxx xxx XXX xxxxx be xxxxxxxxxxx xxxxxxxx xx xxx xxxxx and xxxxxxxxxx xx the xxxxxxxx xxxxxxxx xxxxxxxxx with xx XXX xx xxxxxxxx to in xxxxxxxxx 1(x). 3.&xxxx;&xxxx;&xxxx;Xxx services xx be xxxxxxxx xx xxx XXX xxxxx not form xxxx of xxx xxxxxxxx xx xx xxxxxxxxx xx the XXX xx xxxxxxx xx XXXXXX2. 4.&xxxx;&xxxx;&xxxx;Xxx XXX xxxxx xxx be xxxxxx for xxx xxxx, xxxxxx or xxxxxxxxx xx xxx XXX (including its xxxxxxxxx, xxxxx xxx xxxxxxxxxxxxxx), or xxx xxx xxxx, xxxxxx xx xxxxxxxxx of xxxxx xxxxxxx selected xx participants xx xxxx xxxxxx xx xxx XXX’x network.“; |
8. |
Vkládá xx xxxx xxxxxx&xxxx;34x, xxxxx xxx: „Xxxxxxx&xxxx;34x Xxxxxxxxxxxx xxxxxxxxxx Xxxx xxx TARGET system xx operational xxx XXXXXX2 has ceased xxxxxxxxx, T2S DCA xxxxxxx xxxxx become X2X XXX holders xx the XXXXXX xxxxxx.“; |
9. |
Xxxxxx xx xxxxx „X2X xxxxxxx service xxxxxxxx“ (x&xxxx;xxxxxxxxx nebo xxxxxxx xxxxx) v čl. 6 xxxx.&xxxx;1 xxxx. a) xxxx x), čl. 9 xxxx.&xxxx;5, xx.&xxxx;10 odst. 6, xx.&xxxx;14 xxxx.&xxxx;1 písm. x), xx.&xxxx;22 xxxx.&xxxx;1, xx.&xxxx;22 odst. 2, čl. 22 xxxx.&xxxx;3, čl. 27 xxxx.&xxxx;5, xx.&xxxx;28 odst. 1, xx.&xxxx;29 xxxx.&xxxx;1 přílohy XX x&xxxx;x&xxxx;xxxxxxxx 1 dodatku X&xxxx;xx xxxxxxxxx odkazem „XXX“; |
10. |
X&xxxx;xxxxxxx I se x&xxxx;xxxx.&xxxx;8 xxxxxxx. 4 xxxxxxxxx xxxxxxx x) tímto:
|
XXXXXXX XXX
Xxxxxxx XXX xxxxxxxxxx XXX/2007/7 xx xxxx takto:
1. |
Odkazy xx xxxxx „XXXX xxxxxxx xxxxxxx xxxxxxxx“ (x&xxxx;xxxxxxxxx xxxx xxxxxxx xxxxx) x&xxxx;xxxx xxxxxxx xx xxxxxxxxx odkazem „NSP“; |
2. |
Článek 1 xx xxxx xxxxx:
|
3. |
V čl. 3 xxxx.&xxxx;1 xx zrušuje xxxxx xx „Xxxxxxxx X: XXXX connectivity xxxxxxxxx requirements“; |
4. |
Článek 4 se xxxx xxxxx:
|
5. |
X&xxxx;xx.&xxxx;6 xxxx.&xxxx;1 xxxx. x) xx bod x) nahrazuje tímto:
|
6. |
Xxxxxx&xxxx;9 se nahrazuje xxxxx: „Xxxxxxx&xxxx;9 Xxxxxxxxxxx xxxxxxxxxxxx xxxx xx XXX 1.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx xxxxx xxxxxx:
2.&xxxx;&xxxx;&xxxx;Xxx xxxxx xxxxxxxxxxxx xxxxxxx a participant xxx the XXX xxxxx xx xxxxxxxxxxx xxxxxxxx xx xxx xxxxx and xxxxxxxxxx xx their separate xxxxxxxx xx xxxxxxxx xx in paragraph 1(x). 3.&xxxx;&xxxx;&xxxx;Xxx services xx xx xxxxxxxx xx xxx XXX xxxxx xxx xxxx xxxx xx xxx xxxxxxxx xx be xxxxxxxxx xx xxx XXX xx xxxxxxx xx XXXXXX2. 4.&xxxx;&xxxx;&xxxx;Xxx ECB xxxxx xxx xx xxxxxx xxx any xxxx, xxxxxx xx xxxxxxxxx xx the NSP (xxxxxxxxx xxx xxxxxxxxx, xxxxx and subcontractors), xx xxx xxx xxxx, xxxxxx or xxxxxxxxx xx xxxxx xxxxxxx xxxxxxxx xx xxxxxxxxxxxx xx xxxx xxxxxx to xxx XXX’x network.“; |
7. |
Článek 10 xx xxxxxxx; |
8. |
Xxxxxx xx xxxx xxxxxx&xxxx;11x, který xxx: „Xxxxxxx&xxxx;11x XXX xxxxxxxxxx 1.&xxxx;&xxxx;&xxxx;Xxx central XXX xxxxxxxxxx xxxxxxxx the xxxxx – XXXX xxxxxxx xxxxx xxx xxx xxxxxxxx xx xxx MPL xxxxxxx. 2.&xxxx;&xxxx;&xxxx;Xxxx xxxxx xxx xx xxxxxx xx only xxx XXXX. An XXXX xxx be xxxxxx to one xx multiple xxxxxxx. 3.&xxxx;&xxxx;&xxxx;Xxxxxxx&xxxx;29 xxxxx xxxxx xx xxx xxxx contained xx the XXX xxxxxxxxxx.“; |
9. |
X&xxxx;xxxxxx&xxxx;12 xx xxxxxxx xxxxxxxx 9; |
10. |
Xxxxxx&xxxx;16 se xxxxxxxxx xxxxx: „Xxxxxxx&xxxx;16 Xxxxx xx xxxxxxx xxxxxx xx XXXX XXX Xxx following xxx xxxxxxxxxx as xxxxxxx xxxxxx for xxx xxxxxxxx xx xxx TIPS xxxxxxx:
|
11. |
X&xxxx;xxxxxx&xxxx;18 se xxxxxxxx 6 nahrazuje xxxxx: „6.&xxxx;&xxxx;&xxxx;Xxxxx a TIPS XXX xx XX liquidity xxxxxxxx xxxxx, x&xxxx;XXXX XXX to TIPS XX xxxxxxxxx xxxxxxx xxxxxxxxx xxxxxxxx xxxxx xx x&xxxx;XXXX AS xxxxxxxxx xxxxxxx xx XXXX XXX liquidity xxxxxxxx xxxxx xxx xxxx xxxxxxxx xx xxxxxxxx xx in Xxxxxxx&xxxx;17, xxx XXXXXX2-XXX xxxxx xxxxx xxxxxxx xxxxxxxxxx xxxxx xxx xxxxxxxxx xx the xxxxx'x account. Xx xxxxxxxxxx xxxxx xxx xxx xxxxxxxxx xxx xxxxxxxxx xxxxxxxx xxxxx xxxxx xx xxxxxxxx. Xx xxxxxxxxxx xxxxx xxx xxxxxxxxx xxx xxxxxxxxx xxxxxxxx order xxxxx xx xxxxxxx xxxxxxxxxxx.“; |
12. |
X&xxxx;xx.&xxxx;20 xxxx.&xxxx;1 se xxxxxxx b) xxxxxxxxx xxxxx:
|
13. |
X&xxxx;xxxxxx&xxxx;30 xx xxxxxxxx 1 xxxxxxxxx tímto: „1. TIPS XXX holders xxxxx xx xxxxxx xx xx xxxxx of, xxxxx xxxxxx xxxx xxx shall xx xxxx xx demonstrate xxxx xxxxxxxxxx xx xxx relevant xxxxxxxxx xxxxxxxxxxx xxxx xxx xxxxxxxxxxx xx them xxxxxxxx to xxxxxxxxxxx xx data protection. Xxxx shall be xxxxxx to xx xxxxx of, xxx xxxxx comply with xxx xxxxxxxxxxx xx xxxx xxxxxxxx xx xxxxxxxxxxx on xxxxxxxxxx xx xxxxx xxxxxxxxxx xxx the xxxxxxxxx xx terrorism, xxxxxxxxxxxxx-xxxxxxxxx xxxxxxx xxxxxxxxxx and xxx xxxxxxxxxxx xx xxxxxxx xxxxxxx xxxxxxxx xxxxxxx, xx xxxxxxxxxx xx xxxxx of xxxxxxxxxxxx appropriate xxxxxxxx xxxxxxxxxx xxx xxxxxxxx xxxxxxx xx credited xx xxxxx TIPS XXXx. XXXX XXX xxxxxxx xxxxxx that xxxx xxx informed xxxxx xxxxx chosen XXX'x xxxx xxxxxxxxx xxxxxx xxxxx to xxxxxxxx into a contractual xxxxxxxxxxxx xxxx xxxx XXX.“; |
14. |
Xxxxxx xx xxxx xxxxxx&xxxx;35x, xxxxx xxx: „Xxxxxxx&xxxx;35x Xxxxxxxxxxxx xxxxxxxxx Xxxx the XXXXXX xxxxxx xx operational xxx the TARGET2 xxx xxxxxx operation, XXXX DCA xxxxxxx xxxxx become XXXX XXX holders xx xxx XXXXXX xxxxxx.“; |
15. |
X&xxxx;xxxxxxx X&xxxx;xx xxxxxxx x&xxxx;xxxxxxxx 2 xxxxxxxxx xxxxx:
|
16. |
X&xxxx;xxxxxxx X&xxxx;xx x&xxxx;xxxx.&xxxx;6 xxxxxxx. 1 xxxxxxxxx xxxxxxx b) xxxxx:
|
17. |
X&xxxx;xxxxxxx XX xx zrušuje xxxxxxxx 2; |
18. |
Xxxxxxx X&xxxx;xx xxxxxxx. |