XXXXXXXXXX XXXXXXXX CENTRÁLNÍ XXXXX (EU) 2021/1758
ze xxx 21. září 2021,
kterým xx xxxx xxxxxxxxxx XXX/2007/7 x&xxxx;xxxxxxxxxx XXXXXX2-XXX (XXX/2021/43)
XXXXXXX XXXX XXXXXXXX XXXXXXXXX BANKY,
s ohledem na Xxxxxxx o fungování Xxxxxxxx xxxx, x&xxxx;xxxxxxx xx xxxxx x&xxxx;xxxxxxx xxxxxxx xx.&xxxx;127 xxxx.&xxxx;2 této xxxxxxx,
x&xxxx;xxxxxxx na statut Xxxxxxxxxx systému xxxxxxxxxxx xxxx x&xxxx;Xxxxxxxx xxxxxxxxx xxxxx, x&xxxx;xxxxxxx xx xxxxxx&xxxx;11.6 a články 17, 22 x&xxxx;23 tohoto xxxxxxx,
xxxxxxxx x&xxxx;xxxxx důvodům:
(1) |
Rada xxxxxxxxx xxxxxxx&xxxx;(1) xxx 20.&xxxx;xxxxxxxx 2021 xxxxxx xxxxxx Xxxxxxxx centrální xxxxx ECB/2012/27 (2) s cílem: x) vyjasnit, xx xxxxxxxx XXXX XXX xxxxx x&xxxx;XXXXXX2 xxxxxxxxx xxxxxxxxxxxxxxx xxxxxxxxxx portálu xxxxx infrastruktury Xxxxxxxxxxx (Xxxxxxxxxx Single Market Xxxxxxxxxxxxxx Xxxxxxx) xx xxxxxxxxx 2021 x&xxxx;xxxxxxxx X2X XXX budou x&xxxx;XXXXXX2 prostřednictvím xxxxxx xxxxxxx xxxxxxxxx xx xxxxxx 2022; b) xxxxxxxx x&xxxx;xxxxxxxx xxxxxxxx xxxxxxxx se xxxxxxxxxx xxxxxxxxx xx xxxxxxxxxx xxxxxxxxx xxxx XXXXXX2, xxx xx xxxxxxxxx, xx xx systém XXXXXX2 xxxx dále xxxxxxx xxx, aby xxx xxxxxxx xxxxx xxxxxxx v oblasti xxxxxxxxxxxx xxxxxxxxxxx; x) zavést xxxxxxxxx, xxx xxxxxxxx xxxx XX, xxxxxx xxxxxxx účastníci a adresovatelní xxxxxxxx xxxx XXX, xxxxx xxxxxxxxxxx x&xxxx;xxxxxxxxxxx xxxxxxx XXX Inst xxxxxxxx dohody x&xxxx;xxxxxxxxxx xxxxxxx xxx xxxxxxxx xxxxxxxxxxxxx převody XXXX, xxxx a zůstali xxxxxx xxxxxxxxxxx xx xxxxxxxxx XXXX xxxxxxxxxxxxxxx TIPS XXX, tak aby xx xxxxxxxxx xxxxxxxxxx xxxxxxxxxx xxxxxx x&xxxx;xxxx Xxxx; x) zavést xxxxxxxxxxxxxxx, pokud xxx x&xxxx;xxxxxxx xxxxxxx zůstatků x&xxxx;xxxx xxxxxxxxx v TARGET2 xx xxxxxxxxxxxx xxxxxxxxxxx xxxx v budoucím xxxxxxx XXXXXX, aby xxxx xxxxxxxxx právní xxxxxxx, x&xxxx;x) xxxxxxxx x&xxxx;xxxxxxxxxxxx xxxxxxx xxxxx aspekty xxxxxxxx xxxxx ECB/2012/27. |
(2) |
Jakmile xxxx xxxxxxxxxx projekt xxxxxxxxxxx X2-X2X, xxxx x&xxxx;xxxxx právní xxxxxxx xxxxxx xxxxxxxx xxxxxxxx xxxxxxxxxxxxxxx, pokud xxx x&xxxx;xxxxxxx xxxxxxx xxxxxxxx x&xxxx;xxxx xxxxxxxxx v TARGET2-ECB xx xxxxxxxxxxxx xxxxxxxxxxx xxxx. |
(3) |
Xxxxx xxxxxxxx xxxxx XXX/2012/27, které xxxx xxxx xx xxxxxxxx XXXXXX2-XXX, xx třeba xxxxxxxxx x&xxxx;xxxxxxxxxx Evropské xxxxxxxxx xxxxx ECB/2007/7 (3). |
(4) |
Rozhodnutí XXX/2007/7 xx proto xxxxx xxxxxxxxxxxxx xxxxxxxx xxxxxx, |
XXXXXXX TOTO XXXXXXXXXX:
Xxxxxx&xxxx;1
Xxxxx
Xxxxxxx X, XX x&xxxx;XXX xxxxxxxxxx XXX/2007/7 xx mění x&xxxx;xxxxxxx x&xxxx;xxxxxxxxx xxxxxx xxxxxxxxxx.
Xxxxxx&xxxx;2
Xxxxxxxxx ustanovení
Toto xxxxxxxxxx xxxxxxxx x&xxxx;xxxxxxxx xxxxx xxxx xx zveřejnění x&xxxx;Xxxxxxx xxxxxxxx Xxxxxxxx xxxx.
Xxxxxxx xx ode xxx 21. listopadu 2021, x&xxxx;xxxxxxxx xxxx.&xxxx;1 xxxx. x) x&xxxx;xxxxxxxx 7 x&xxxx;9 přílohy XX xxxxxx xxxxxxxxxx, xxxxx xx xxxxxxx xxx xxx 13. června 2022.
Xx Xxxxxxxxxx xxx Xxxxxxx xxx 21. září 2021.
Xxxxxxxxxxx XXX
Xxxxxxxxx XXXXXXX
(1)&xxxx;&xxxx;Xxxxxx xxxxxx Xxxxxxxx centrální xxxxx (EU) 2021/1759 xx dne 20.&xxxx;xxxxxxxx 2021, xxxxxxx xx xxxx obecné xxxxxx XXX/2012/27 x&xxxx;xxxxxxxxxxxxxx expresním xxxxxxxxxxxxxxx systému zúčtování xxxxxx x&xxxx;xxxxxxx xxxx (XXXXXX2) (XXX/2021/30) [(xxx xxxxxx 45 x&xxxx;xxxxx xxxxx Úředního věstníku).
(2) Obecné xxxxxx Xxxxxxxx centrální xxxxx ECB/2012/27 xx xxx 5.&xxxx;xxxxxxxx 2012 x&xxxx;xxxxxxxxxxxxxx xxxxxxxxx xxxxxxxxxxxxxxx xxxxxxx zúčtování plateb x&xxxx;xxxxxxx čase (XXXXXX2) (Xx. xxxx. X&xxxx;30, 30.1.2013, x. 1).
(3) Rozhodnutí Xxxxxxxx centrální xxxxx XXX/2007/7 ze xxx 24.&xxxx;xxxxxxxx 2007 x&xxxx;xxxxxxxxxx XXXXXX2-XXX (Xx. xxxx. X&xxxx;237, 8.9.2007, s. 71).
PŘÍLOHA X
Xxxxxxx X&xxxx;xxxxxxxxxx XXX/2007/7 xx mění xxxxx:
1. |
Xxxxxx&xxxx;1 se xxxx xxxxx:
|
2. |
X&xxxx;xxxxxx&xxxx;2 xxxxxx xxxxxxxx xx xxxxxxxx xxxx xxxx, xxxxx zní:
|
3. |
Xxxxxx&xxxx;3 xx xxxx xxxxx:
|
4. |
Xxxxxx&xxxx;5 se nahrazuje xxxxx: „Xxxxxxx&xxxx;5 Xxxxxx xxxxxxxxxxxx XX xxxxxxx xxxxxxx in XXXXXX2-XXX xxx xxxxxx xxxxxxxxxxxx xxx xxxxx comply xxxx the xxxxxxxxxxxx xxx xxx in Xxxxxxx&xxxx;8(1) and (2). Xxxx xxxxx xxxx xx xxxxx xxx XX xxxxxxx with xxx XXX. XX xxxxxxx xxxxxxx xxxx xxxx xxxxxxx to xxx XXX Xxxx xxxxxx xx xxxxxxx xxx XXXX Xxxxxxx Xxxxxx Xxxxxxxx Adherence Xxxxxxxxx xxxxx xx xxx xxxxx xxxxxx reachable xx xxx TIPS Xxxxxxxx xx xxx xxxxx, either xx x&xxxx;XXXX XXX xxxxxx xx as x&xxxx;xxxxxxxxx xxxxx xxx x&xxxx;XXXX XXX xxxxxx.“; |
5. |
Xxxxxx&xxxx;22 xx xxxxxxxxx xxxxx: „Xxxxxxx&xxxx;22 Xxxxxxxx Xxxxxxxxxxxx xxx Xxxxxxx Xxxxxxxxxx 1.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx xxxxx xxxxxxxxx adequate xxxxxxxx xxxxxxxx xx xxxxxxx xxxxx xxxxxxx xxxx unauthorised xxxxxx xxx xxx. Participants xxxxx xx exclusively xxxxxxxxxxx xxx xxx xxxxxxxx xxxxxxxxxx xx xxx xxxxxxxxxxxxxxx, xxxxxxxxx xxx xxxxxxxxxxxx of xxxxx systems. 2. Participants xxxxx xxxxxx xxx XXX xx any xxxxxxxx-xxxxxxx xxxxxxxxx xx their xxxxxxxxx xxxxxxxxxxxxxx xxx, xxxxx xxxxxxxxxxx, security-related xxxxxxxxx that xxxxx xx xxx technical xxxxxxxxxxxxxx xx xxx xxxxx xxxxx xxxxxxxxx. Xxx XXX xxx xxxxxxx further xxxxxxxxxxx xxxxx the incident xxx, xx xxxxxxxxx, xxxxxxx that the xxxxxxxxxxx xxxx xxxxxxxxxxx xxxxxxxx xx xxxxxxx x&xxxx;xxxxxxxxxx of xxxx xx event. 3. The XXX xxx xxxxxx xxxxxxxxxx xxxxxxxx xxxxxxxxxxxx, xx xxxxxxxxxx xxxx xxxxxx xx xxxxxxxxxxxxx xx xxx xxxxxxxxxx xx xxxxx, on xxx xxxxxxxxxxxx xxx/xx xx xxxxxxxxxxxx xxxx xxx xxxxxxxxxx xxxxxxxx xx xxx XXX. 4.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx shall xxxxxxx xxx ECB xxxx: (x) xxxxxxxxx xxxxxx to their xxxxxxxxxxx xx xxxxxxxxx xx xxxxx chosen xxxxxxx xxxxxxx xxxxxxxx’x xxxxxxxx security requirements, xxx (ii) xx xx annual xxxxx xxx XXXXXX2 xxxx-xxxxxxxxxxxxx xxxxxxxxx as xxxxxxxxx xx the ECB’s xxxxxxx in Xxxxxxx. 4x.&xxxx;&xxxx;&xxxx;Xxx XXX shall assess xxx xxxxxxxxxxx’x xxxx-xxxxxxxxxxxxx xxxxxxxxx(x) on xxx xxxxxxxxxxxx xxxxx of xxxxxxxxxx xxxx each xx the xxxxxxxxxxxx xxx xxx xx xxx XXXXXX2 xxxx-xxxxxxxxxxxxx xxxxxxxxxxxx. Xxxxx xxxxxxxxxxxx xxx xxxxxx xx Xxxxxxxx XXX, which xx xxxxxxxx xx xxx xxxxx Xxxxxxxxxx xxxxxx xx Xxxxxxx&xxxx;2(1), xxxxx form an xxxxxxxx xxxx xx xxxxx Xxxxxxxxxx. 4x.&xxxx;&xxxx;&xxxx;Xxx xxxxxxxxxxx’x xxxxx xx xxxxxxxxxx xxxx the xxxxxxxxxxxx xx xxx TARGET2 xxxx-xxxxxxxxxxxxx shall xx xxxxxxxxxxx xx follows, xx xxxxxxxxxx xxxxx xx xxxxxxxx: ‘xxxx xxxxxxxxxx’; ‘minor xxx-xxxxxxxxxx’; xx ‘major non-compliance’. Xxx following xxxxxxxx xxxxx: full xxxxxxxxxx xx xxxxxxx xxxxx xxxxxxxxxxxx xxxxxxx 100% xx xxx requirements; xxxxx non-compliance is xxxxx x&xxxx;xxxxxxxxxxx satisfies xxxx xxxx 100% xxx xx xxxxx 66% xx xxx xxxxxxxxxxxx xxx major xxx-xxxxxxxxxx xxxxx a participant xxxxxxxxx xxxx than 66% xx xxx xxxxxxxxxxxx. If x&xxxx;xxxxxxxxxxx xxxxxxxxxxxx xxxx x&xxxx;xxxxxxxx xxxxxxxxxxx xx xxx xxxxxxxxxx to it, xx xxxxx xx xxxxxxxxxx as compliant xxxx xxx respective xxxxxxxxxxx for xxx xxxxxxxx of the xxxxxxxxxxxxxx. A participant which xxxxx to xxxxx ‘xxxx compliance’ xxxxx xxxxxx xx xxxxxx xxxx demonstrating xxx xx intends xx xxxxx xxxx xxxxxxxxxx. Xxx XXX xxxxx xxxxxx the xxxxxxxx xxxxxxxxxxx authorities xx xxx xxxxxx of xxxx participant’s compliance. 4c. If xxx xxxxxxxxxxx xxxxxxx xx xxxxx permanent xxxxxx xx xxx xxxxxxxxxxx xx xxxxxxxxx xx xxxxx xxxxxx XXXx xxxxxxxx xxxxxxxx xxxxxxxxxxxx or xxxx xxx xxxxxxx the XXXXXX2 xxxx-xxxxxxxxxxxxx xxx xxxxxxxxxxx’x xxxxx xx xxxxxxxxxx xxxxx be xxxxxxxxxxx as ‘major xxx-xxxxxxxxxx’. 4x.&xxxx;&xxxx;&xxxx;Xxx XXX xxxxx xxxxxxxx xxxxxxxxxx xx xxxxxxxxxxxx on xx xxxxxx xxxxx. 4x.&xxxx;&xxxx;&xxxx;Xxx XXX xxx xxxxxx xxx xxxxxxxxx xxxxxxxx xx xxxxxxx on participants xxxxx xxxxx xx xxxxxxxxxx was assessed xx xxxxx or xxxxx non-compliance, xx xxxxxxxxxx xxxxx of xxxxxxxx:
|
6. |
X&xxxx;xxxxxx&xxxx;33 xx odstavec 1 xxxxxxxxx xxxxx: „1.&xxxx;&xxxx;&xxxx;Xxxxxxxxxxxx xxxxx xx xxxxxx xx xx xxxxx xx, xxxxx xxxxxx xxxx, and shall xx xxxx xx xxxxxxxxxxx xxxx xxxxxxxxxx xx xxx xxxxxxxx xxxxxxxxx xxxxxxxxxxx xxxx xxx xxxxxxxxxxx xx xxxx xxxxxxxx xx xxxxxxxxxxx on xxxx xxxxxxxxxx. They xxxxx xx xxxxxx xx xx xxxxx xx, xxx shall comply xxxx all xxxxxxxxxxx xx them xxxxxxxx xx legislation xx xxxxxxxxxx xx xxxxx xxxxxxxxxx xxx the xxxxxxxxx xx terrorism, xxxxxxxxxxxxx-xxxxxxxxx xxxxxxx xxxxxxxxxx xxx xxx development xx xxxxxxx xxxxxxx xxxxxxxx xxxxxxx, in xxxxxxxxxx in xxxxx xx implementing xxxxxxxxxxx xxxxxxxx concerning xxx xxxxxxxx debited or xxxxxxxx xx xxxxx XX xxxxxxxx. Xxxxxxxxxxxx xxxxx xxxxxx xxxx xxxx xxx informed xxxxx xxx XXXXXX2 xxxxxxx service xxxxxxxx’x xxxx xxxxxxxxx xxxxxx xxxxx xx xxxxxxxx xxxx xxx xxxxxxxxxxx xxxxxxxxxxxx with xxx XXXXXX2 xxxxxxx xxxxxxx xxxxxxxx.“; |
7. |
Xxxxxx xx nový xxxxxx&xxxx;39x, který xxx: „Xxxxxxx&xxxx;39x Xxxxxxxxxxxx xxxxxxxxxx 1.&xxxx;&xxxx;&xxxx;Xxxx xxx TARGET xxxxxx xx xxxxxxxxxxx xxx XXXXXX2 xxx xxxxxx xxxxxxxxx, PM xxxxxxx xxxxxxxx xxxxx xx xxxxxxxxxxx xx xxx account xxxxxx’x xxxxxxxxxxxxx xxxxxxxxx xxxxxxxx xx xxx TARGET xxxxxx. 2.&xxxx;&xxxx;&xxxx;Xxx xxxxxxxxxxx xxxx XX account xxxxxxx, xxxxxxxx Xxxxxxxxxxxx xxx xxxxxxxxxxx BIC xxxxxxx xxxxxxxx xx the XXX Xxxx xxxxxx xx reachable in xxx TIPS Platform xxxxxxxx xx Xxxxxxx&xxxx;5 xxxxx xxxxx as xx 25 Xxxxxxxx 2022.“; |
8. |
X&xxxx;xxxxxxx I se v odst. 8 xxxxxxx. 4 xxxxxxxxx xxxxxxx x) xxxxx:
|
9. |
X&xxxx;xxxxxxx XX se v odstavci 6 xxxxxxxxx xxxxxxx x) xxxxx:
|
10. |
Xxxxxxxx xx xxxx xxxxxxx VII, který xxx: „Xxxxxxxx XXX Xxxxxxxxxxxx xxxxxxxxx xxxxxxxxxxx security xxxxxxxxxx xxx xxxxxxxx xxxxxxxxxx xxxxxxxxxx Xxxxxxxxxxx xxxxxxxx xxxxxxxxxx Xxxxx xxxxxxxxxxxx xxx xxxxxxxxxx xx xxxx participant, xxxxxx the xxxxxxxxxxx xxxxxxxxxxxx that a specific xxxxxxxxxxx xx xxx xxxxxxxxxx xx it. Xx xxxxxxxxxxxx xxx xxxxx xx application xx xxx requirements xxxxxx its xxxxxxxxxxxxxx, xxx xxxxxxxxxxx xxxxxx xxxxxxxx the elements xxxx are xxxx xx xxx Xxxxxxx Xxxxxxxxxxx Xxxxx (XXX). Xxxxxxxxxxxx, xxx XXX xxxxxx xx x&xxxx;Xxxxx xx Xxxxx (XxX), x.x. x&xxxx;xxxxxx xxxxxxxx xx the creation xx xxxxxxxxxxxx (x.x. xxxxxxxxxxxx, xxxxx-xxxxxx and xxxx-xxxxxx xxxxxxxxxxxx, xxxxxxxxxx), xxx ends xx xxx xxxxxx xxxxxxxxxxx xx send the xxxxxxx to XXXXX (x.x. XXXXX XXX Xxx) xx Xxxxxxxx (xxxx xxx xxxxxx xxxxxxxxxx xx Xxxxxxxx-xxxxx Xxxxxx). Xxxxxxxxxxx 1.1: Information xxxxxxxx xxxxxx Xxx management xxxxx xxx x&xxxx;xxxxx xxxxxx xxxxxxxxx in xxxx xxxx business xxxxxxxxxx xxx xxxxxxxxxxx xxxxxxx xxx and xxxxxxxxxx to information xxxxxxxx xxxxxxx xxx xxxxxxxx, xxxxxxxx xxx xxxxxxxxxxx of an xxxxxxxxxxx security xxxxxx xxxxxx xx xxxxxxxx xxxxxxxxxxx xxxxxxxx xxx xxxxx xxxxxxxxxx xxxxxx xxx xxxxxxxxxxxx xx xxxxx of xxxxxxxxxxxxxx, xxxxxxxxxx and xxxxxxxxx xx information xxxxxxxx xxx cyber resilience xxxxx. Xxx xxxxxx xxxxxx xxxxxxx xx xxxxx xxx xxxxxxxxx xxxxxxxx: xxxxxxxxxx, xxxxx (xxxxxxxxx xxxxxxx xxxx xx organisation, human xxxxxxxxx, xxxxx xxxxxxxxxx xxx.), xxxxxxxxxx xxx xxxxxxxxxx xx xxxxxxxxxxxxxxxx. Xxxxxxxxxxx 1.2: Internal xxxxxxxxxxxx Xx xxxxxxxxxxx xxxxxxxx xxxxxxxxx xxxxx xx established xx xxxxxxxxx xxx xxxxxxxxxxx security xxxxxx xxxxxx xxx organisation. Xxx xxxxxxxxxx xxxxx xxxxxxxxxx and xxxxxx xxx establishment xx xxx xxxxxxxxxxx xxxxxxxx xxxxxxxxx to ensure xxx xxxxxxxxxxxxxx xx xxx xxxxxxxxxxx xxxxxxxx xxxxxx (xx per Xxxxxxxxxxx 1.1) across xxx organisation, including xxx xxxxxxxxxx xx xxxxxxxxxx xxxxxxxxx xxx xxxxxxxxxx xx xxxxxxxx xxxxxxxxxxxxxxxx xxx xxxx xxxxxxx. Xxxxxxxxxxx 1.3: External xxxxxxx Xxx xxxxxxxx of xxx organisation’s xxxxxxxxxxx xxx xxxxxxxxxxx processing xxxxxxxxxx xxxxxx not xx xxxxxxx xx xxx xxxxxxxxxxxx of, xxx/xx the xxxxxxxxxx xx, xx xxxxxxxx xxxxx/xxxxxxx xx xxxxxxxx/xxxxxxxx xxxxxxxx xx them. Xxx access to xxx organisation’s information xxxxxxxxxx xxxxxxxxxx xx xxxxxxxx parties shall xx xxxxxxxxxx. Xxxx xxxxxxxx xxxxxxx or xxxxxxxx/xxxxxxxx xx xxxxxxxx xxxxxxx are required xx xxxxxx the xxxxxxxxxxxx’x xxxxxxxxxxx processing xxxxxxxxxx, x&xxxx;xxxx xxxxxxxxxx xxxxx xx xxxxxxx xxx to determine xxx xxxxxxxx xxxxxxxxxxxx xxx xxxxxxx xxxxxxxxxxxx. Xxxxxxxx xxxxx xx xxxxxx xxx xxxxxxx xx an agreement xxxx xxxx xxxxxxxx xxxxxxxx xxxxx. Xxxxxxxxxxx 1.4: Xxxxx management All xxxxxxxxxxx xxxxxx, the xxxxxxxx xxxxxxxxx xxx the xxxxxxxxxx information systems, xxxx xx xxxxxxxxx xxxxxxx, infrastructures, business xxxxxxxxxxxx, off-the-shelf products, xxxxxxxx xxx xxxx-xxxxxxxxx xxxxxxxxxxxx, in the xxxxx xx xxx Xxxxxxx Xxxxxxxxxxx Xxxxx xxxxx xx xxxxxxxxx xxx xxx xxxx x&xxxx;xxxxxxxxx xxxxx. Xxx xxxxxxxxxxxxxx for the xxxxxxxxxxx and the xxxxxxxxx xx xxxxxxxxxxx xxxxxxxx in xxx xxxxxxxx xxxxxxxxx xxx xxx xxxxxxx XX xxxxxxxxxx xx safeguard xxx xxxxxxxxxxx xxxxxx xxxxx xx assigned. Xxxx: xxx xxxxx xxx xxxxxxxx xxx xxxxxxxxxxxxxx of xxxxxxxx xxxxxxxx xx xxxxxxxxxxx, xxx remains accountable xxx the xxxxxx xxxxxxxxxx xx xxx xxxxxx. Xxxxxxxxxxx 1.5: Information xxxxxx xxxxxxxxxxxxxx Xxxxxxxxxxx xxxxxx xxxxx be xxxxxxxxxx xx terms xx xxxxx criticality xx xxx xxxxxx xxxxxxxx xx the service xx xxx participant. Xxx classification xxxxx xxxxxxxx xxx need, xxxxxxxxxx xxx xxxxxx xx xxxxxxxxxx required xxxx handling xxx xxxxxxxxxxx asset xx xxx xxxxxxxx xxxxxxxx xxxxxxxxx xxx xxxxx xxxx xxxx xxxx xxxxxxxxxxxxx xxx xxxxxxxxxx XX components. Xx xxxxxxxxxxx asset xxxxxxxxxxxxxx xxxxxx xxxxxxxx by xxx management xxxxx xx xxxx to xxxxxx xx appropriate xxx xx xxxxxxxxxx xxxxxxxx xxxxxxxxxx the xxxxxxxxxxx asset xxxxxxxxx (xxxxxxxxx xxxxxxx and xxxxxxxxxxx xx xxxxxxxxxxx xxxxxx) xxx xx xxxxxxxxxxx the need xxx xxxxxxxx xxxxxxxx xxxxxxxx. Xxxxxxxxxxx 1.6: Human xxxxxxxxx security Security xxxxxxxxxxxxxxxx xxxxx be xxxxxxxxx xxxxx xx xxxxxxxxxx xx adequate job xxxxxxxxxxxx xxx in xxxxx and conditions xx xxxxxxxxxx. Xxx xxxxxxxxxx xxx xxxxxxxxxx, xxxxxxxxxxx xxx third xxxxx users shall xx adequately xxxxxxxx, xxxxxxxxxx xxx xxxxxxxxx xxxx. Xxxxxxxxx, xxxxxxxxxxx xxx xxxxx xxxxx xxxxx xx xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx shall xxxx xx xxxxxxxxx xx their security xxxxx and responsibilities. Xx xxxxxxxx level xx xxxxxxxxx xxxxx xx xxxxxxx xxxxx xxx employees, contractors xxx xxxxx xxxxx xxxxx, xxx education xxx xxxxxxxx in xxxxxxxx procedures xxx xxx xxxxxxx use xx xxxxxxxxxxx processing xxxxxxxxxx xxxxx xx xxxxxxxx xx xxxx xx xxxxxxxx xxxxxxxx xxxxxxxx xxxxx. A formal xxxxxxxxxxxx xxxxxxx for xxxxxxxx xxxxxxxx breaches xxxxx be established xxx xxxxxxxxx. Responsibilities xxxxx xx xx xxxxx xx ensure xxxx an xxxxxxxx’x, xxxxxxxxxx’x xx xxxxx xxxxx user’s xxxx xxxx xx xxxxxxxx xxxxxx xxx organisation xx xxxxxxx, and xxxx the return xx xxx equipment xxx the xxxxxxx xx all xxxxxx xxxxxx xxx xxxxxxxxx. Xxxxxxxxxxx 1.7: Xxxxxxxx xxx xxxxxxxxxxxxx xxxxxxxx Xxxxxxxx xx xxxxxxxxx xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx shall be xxxxxx in xxxxxx xxxxx, protected xx xxxxxxx security perimeters, xxxx appropriate xxxxxxxx xxxxxxxx xxx xxxxx xxxxxxxx. Xxxx shall xx xxxxxxxxxx xxxxxxxxx xxxx xxxxxxxxxxxx access, xxxxxx xxx xxxxxxxxxxxx. Xxxxxx shall xx xxxxxxx xxxx xx xxxxxxxxxxx xxx xxxx xxxxxx xxx scope xx Xxxxxxxxxxx 1.6. Xxxxxxxxxx and xxxxxxxxx xxxxx xx established xx xxxxxxx xxxxxxxx xxxxx xxxxxxxxxx xxxxxxxxxxx xxxxxx when xx xxxxxxx. Xxxxxxxxx xxxxx be xxxxxxxxx xxxx xxxxxxxx xxx xxxxxxxxxxxxx xxxxxxx. Xxxxxxxxxx of equipment (xxxxxxxxx xxxxxxxxx xxxx xxx-xxxx) and xxxxxxx xxx xxxxxxx of xxxxxxxx xx necessary xx xxxxxx xxx xxxx of unauthorised xxxxxx xx xxxxxxxxxxx xxx to guard xxxxxxx loss xx xxxxxx xx xxxxxxxxx xx xxxxxxxxxxx. Xxxxxxx xxxxxxxx xxx xx xxxxxxxx to protect xxxxxxx xxxxxxxx xxxxxxx xxx xx xxxxxxxxx xxxxxxxxxx xxxxxxxxxx xxxx xx xxx electrical xxxxxx xxx xxxxxxx xxxxxxxxxxxxxx. Xxxxxxxxxxx 1.8: Xxxxxxxxxx xxxxxxxxxx Xxxxxxxxxxxxxxxx and xxxxxxxxxx xxxxx be established xxx xxx xxxxxxxxxx xxx xxxxxxxxx xx xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx xxxxxxxx all the xxxxxxxxxx xxxxxxx in xxx Xxxxxxx Transaction Xxxxx xxx-xx-xxx. Xx xxxxxxx xxxxxxxxx xxxxxxxxxx, xxxxxxxxx xxxxxxxxx xxxxxxxxxxxxxx xx XX xxxxxxx, xxxxxxxxxxx xx xxxxxx xxxxx xx implemented, xxxxx xxxxxxxxxxx, to xxxxxx xxx xxxx xx xxxxxxxxx or xxxxxxxxxx xxxxxx misuse. Where xxxxxxxxxxx xx duties xxxxxx xx xxxxxxxxxxx xxx xx xxxxxxxxxx xxxxxxxxx xxxxxxx, xxxxxxxxxxxx xxxxxxxx shall xx xxxxxxxxxxx following x&xxxx;xxxxxx xxxx analysis. Xxxxxxxx xxxxx xx xxxxxxxxxxx xx prevent xxx xxxxxx xxx introduction xx xxxxxxxxx xxxx xxx xxxxxxx xx xxx Payment Transaction Xxxxx. Xxxxxxxx xxxxx xx xxxx established (xxxxxxxxx xxxx xxxxxxxxx) xx prevent, xxxxxx xxx xxxxxx malicious xxxx. Xxxxxx code xxxxx be used xxxx xxxx xxxxxxx xxxxxxx (x.x. xxxxxx Xxxxxxxxx XXX xxxxxxxxxx xxx Xxxx Applets). Xxx configuration of xxx browser (x.x. xxx use of xxxxxxxxxx and xxxxxxx) xxxxx xx xxxxxxxx xxxxxxxxxx. Xxxx backup and xxxxxxxx xxxxxxxx xxxxx xx xxxxxxxxxxx by xxx xxxxxxxxxx; those xxxxxxxx xxxxxxxx xxxxx xxxxxxx x&xxxx;xxxx xx xxx xxxxxxxxxxx xxxxxxx xxxxx xx xxxxxx xx xxxxxxx intervals xx xxxxx xxxxxxxx. Xxxxxxx xxxx are critical xxx xxx xxxxxxxx xx xxxxxxxx xxxxx xx xxxxxxxxx xxx xxxxxx relevant xx xxxxxxxxxxx xxxxxxxx shall xx xxxxxxxx. Operator xxxx xxxxx xx xxxx xx xxxxxx xxxx information xxxxxx xxxxxxxx xxx xxxxxxxxxx. Xxxxxxxx xxxx xxxxx xx xxxxxxxxx xxxxxxxx xx a sample xxxxx, xxxxx xx xxx xxxxxxxxxxx xx xxx xxxxxxxxxx. System monitoring xxxxx xx used xx xxxxx xxx xxxxxxxxxxxxx xx controls xxxxx are xxxxxxxxxx xx critical xxx xxx xxxxxxxx of xxxxxxxx and to xxxxxx xxxxxxxxxx xx xx xxxxxx xxxxxx xxxxx. Xxxxxxxxx of xxxxxxxxxxx xxxxxxx xxxxxxxxxxxxx xxxxx xx based xx x&xxxx;xxxxxx exchange policy, xxxxxxx out xx xxxx with xxxxxxxx xxxxxxxxxx xxxxx the xxxxxxxx parties xxx xxxxx xx compliant xxxx any relevant xxxxxxxxxxx. Xxxxx xxxxx xxxxxxxx xxxxxxxxxx xxxxxxxx xx xxx xxxxxxxx xx xxxxxxxxxxx xxxx XXXXXX2 (like xxxxxxxx xxxxxxxx from a Service Xxxxxx xx xxxxxxxx 2 xx xxx xxxxx xxxxxxx xx xxx TARGET2 xxxx-xxxxxxxxxxxxx xxxxxxxxxxx document) xxxx xx xxxx xxxxx x&xxxx;xxxxxx xxxxxxxxx xxxx xxx xxxxx xxxxx. Xxxxxxxxxxx 1.9: Xxxxxx xxxxxxx Xxxxxx xx xxxxxxxxxxx xxxxxx xxxxx xx xxxxxxxxx xx xxx basis xx xxxxxxxx xxxxxxxxxxxx (xxxx-xx-xxxx&xxxx;(1)) xxx xxxxxxxxx xx xxx xxxxxxxxxxx xxxxxxxxx of xxxxxxxxx xxxxxxxx (xxxxxxxxx xxx xxxxxxxxxxx xxxxxxxx policy). Xxxxx xxxxxx xxxxxxx xxxxx xxxxx xx xxxxxxx xxxxx xx xxx principle xx xxxxx xxxxxxxxx&xxxx;(2) to xxxxxxx xxxxxxx xxx xxxxx xx the xxxxxxxxxxxxx business and XX processes. Where xxxxxxxx (x.x. xxx xxxxxx xxxxxxxxxx) logical xxxxxx xxxxxxx xxxxxx xx xxxxxxxxxx with xxxxxxxx xxxxxx control xxxxxx xxxxx xxx xxxxxxxx xxxxxxxxxxxx xxxxxxxx xx xxxxx (x.x. xxxxxxxxxx, personal data xxxxxxxxxxxxx). Xxxxxx and documented xxxxxxxxxx xxxxx xx xx xxxxx to xxxxxxx xxx xxxxxxxxxx xx access xxxxxx xx information xxxxxxx xxx xxxxxxxx xxxx xxxx xxxxxx xxx xxxxx xx xxx Xxxxxxx Transaction Chain. Xxx xxxxxxxxxx shall xxxxx xxx xxxxxx xx xxx xxxxxxxxx xx user xxxxxx, xxxx xxx initial xxxxxxxxxxxx xx new xxxxx xx xxx xxxxx deregistration of xxxxx xxxx no xxxxxx xxxxxxx access. Special xxxxxxxxx xxxxx xx xxxxx, xxxxx xxxxxxxxxxx, xx xxx xxxxxxxxxx xx xxxxxx xxxxxx xx xxxx criticality xxxx xxx xxxxx xx those xxxxxx xxxxxx xxxxx xxxx xx x&xxxx;xxxxxx adverse xxxxxx xx xxx xxxxxxxxxx of the xxxxxxxxxxx (x.x. xxxxxx xxxxxx xxxxxxxx system xxxxxxxxxxxxxx, xxxxxxxx of xxxxxx controls, direct xxxxxx to xxxxxxxx xxxx). Xxxxxxxxxxx controls shall xx xxx xx xxxxx to xxxxxxxx, xxxxxxxxxxxx and xxxxxxxxx xxxxx xx xxxxxxxx xxxxxx in xxx xxxxxxxxxxxx’x xxxxxxx, x.x. xxx xxxxx and xxxxxx xxxxxx to xxxxxxx xx the Xxxxxxx Xxxxxxxxxxx Chain. Xxxxxxxx xxxxxxxx shall xxx xx shared xx xxxxx xx xxxxxx xxxxxxxxxxxxxx. Xxx xxxxxxxxx, xxxxx xxxxx be xxxxxxxxxxx xxx xxxxxxxx xx specific xxxxxxxx xx ensure that xxxxxxxxx xxxxxx be xxxxxx guessed, x.x. xxxxxxxxxx rules xxx xxxxxxx-xxxx xxxxxxxx. X&xxxx;xxxx xxxxxxxx recovery xxx/xx xxxxx xxxxxxxx shall xx xxxxxxxxxxx. X&xxxx;xxxxxx shall xx xxxxxxxxx xxx xxxxxxxxxxx on xxx xxx of xxxxxxxxxxxxx xxxxxxxx xx protect xxx xxxxxxxxxxxxxxx, xxxxxxxxxxxx xxx xxxxxxxxx xx xxxxxxxxxxx. A key xxxxxxxxxx xxxxxx xxxxx be xxxxxxxxxxx xx xxxxxxx xxx xxx xx xxxxxxxxxxxxx controls. There xxxxx xx xxxxxx xxx xxxxxxx xxxxxxxxxxxx xxxxxxxxxxx xx xxxxxx xx xx print (x.x. x&xxxx;xxxxx xxxxxx, x&xxxx;xxxxx xxxx policy) xx xxxxxx the xxxx xx xxxxxxxxxxxx access. When xxxxxxx xxxxxxxx, xxx xxxxx xx xxxxxxx xx xx xxxxxxxxxxx xxxxxxxxxxx xxxxx be xxxxxxxxxx and appropriate xxxxxxxxx and xxxxxxxxxxxxxx xxxxxxxx xxxxx be xxxxxxx. Xxxxxxxxxxx 1.10: Xxxxxxxxxxx xxxxxxx xxxxxxxxxxx, xxxxxxxxxxx xxx xxxxxxxxxxx Xxxxxxxx xxxxxxxxxxxx xxxxx xx identified xxx agreed xxxxx xx the development xxx/xx xxxxxxxxxxxxxx xx xxxxxxxxxxx systems. Appropriate xxxxxxxx xxxxx xx built xxxx xxxxxxxxxxxx, xxxxxxxxx xxxx-xxxxxxxxx xxxxxxxxxxxx, xx xxxxxx xxxxxxx processing. Xxxxx xxxxxxxx shall xxxxxxx xxx xxxxxxxxxx xx input xxxx, xxxxxxxx xxxxxxxxxx xxx xxxxxx data. Additional xxxxxxxx xxx xx xxxxxxxx xxx systems xxxx xxxxxxx, xx xxxx an xxxxxx xx, xxxxxxxxx, xxxxxxxx xx xxxxxxxx information. Xxxx controls xxxxx xx xxxxxxxxxx xx xxx basis xx xxxxxxxx xxxxxxxxxxxx xxx xxxx xxxxxxxxxx xxxxxxxxx xx xxx xxxxxxxxxxx xxxxxxxx (x.x. xxxxxxxxxxx xxxxxxxx xxxxxx, xxxxxxxxxxxxx xxxxxxx policy). The xxxxxxxxxxx xxxxxxxxxxxx of new xxxxxxx xxxxx xx xxxxxxxxxxx, documented and xxxxxx prior to xxxxx xxxxxxxxxx xxx xxx. As xxxxxxx xxxxxxx xxxxxxxx, xxxxxxxxxxx xxxxxxxx, including segmentation xxx xxxxxx xxxxxxxxxx, xxxxxx xx implemented xxxxx on the xxxxxxxxxxx xx data xxxxx and xxx xxxxx xx xxxx xx the xxxxxxx xxxxx xx xxx xxxxxxxxxxxx. Xxxxx xxxxx xx specific xxxxxxxx xx protect xxxxxxxxx xxxxxxxxxxx xxxxxxx over xxxxxx xxxxxxxx. Xxxxxx xx xxxxxx files xxx xxxxxxx xxxxxx xxxx xxxxx xx controlled xxx XX projects xxx xxxxxxx xxxxxxxxxx xxxxxxxxx in x&xxxx;xxxxxx xxxxxx. Care xxxxx xx xxxxx xx xxxxx xxxxxxxx xx xxxxxxxxx xxxx xx xxxx environments. Xxxxxxx xxx xxxxxxx xxxxxxxxxxxx xxxxx xx xxxxxxxx xxxxxxxxxx. Deployment xx xxxxxxx in production xxxxx xx xxxxxxxx xxxxxxxxxx. A risk xxxxxxxxxx xx xxx xxxxx xxxxxxx to be xxxxxxxx in production xxxxx xx conducted. Regular xxxxxxxx xxxxxxx xxxxxxxxxx xx systems xx xxxxxxxxxx xxxxx xxxx xx conducted xxxxxxxxx xx x&xxxx;xxxxxxxxxx plan xxxxx on the xxxxxxx xx x&xxxx;xxxx xxxxxxxxxx, xxx xxxxxxxx xxxxxxx xxxxx xxxxxxx, xx least, xxxxxxxxxxxxx xxxxxxxxxxx. Xxx of xxx xxxxxxxxxxxx xxxxxxxxxxx xxxxxx xxx security xxxxxxx xxxxxxxxxx shall xx xxxxxxxx xxx xxxxxx xxxxx xx xxxxx xxx xxxxxxxxxx xxx xxxxx xx xxxxxxxx and followed xx xx a timely xxxxxxx. Xxxxxxxxxxx 1.11: Xxxxxxxxxxx xxxxxxxx xx xxxxxxxx&xxxx;(3) xxxxxxxxxxxxx Xx xxxxxx protection xx the xxxxxxxxxxx’x xxxxxxxx xxxxxxxxxxx xxxxxxx xxxx xxx xxxxxxxxxx xx xxxxxxxxx, information xxxxxxxx xxxxxxxxxxxx xxx xxxxxxxxxx the risks xxxxxxxxxx xxxx xxxxxxxx’x xxxxxx xxxxx xx xxxxxxxxxx xxx formally xxxxxx xxxx xxxx xxx xxxxxxxx. Xxxxxxxxxxx 1.12: Xxxxxxxxxx xx xxxxxxxxxxx xxxxxxxx incidents xxx xxxxxxxxxxxx Xx xxxxxx x&xxxx;xxxxxxxxxx xxx effective approach xx xxx management xx information xxxxxxxx xxxxxxxxx, including xxxxxxxxxxxxx xx xxxxxxxx xxxxxx xxx xxxxxxxxxx, roles, xxxxxxxxxxxxxxxx xxx xxxxxxxxxx, xx xxxxxxxx and xxxxxxxxx xxxxx, xxxxx xx xxxxxxxxxxx xxx xxxxxx to xxxxxx x&xxxx;xxxxx, effective and xxxxxxx xxx xxxxxx xxxxxxx xxxx xxxxxxxxxxx xxxxxxxx incidents including xxxxxxxxx related xx x&xxxx;xxxxx-xxxxxxx xxxxx (x.x. x&xxxx;xxxxx pursued xx xx xxxxxxxx attacker xx xx xx xxxxxxx). Personnel xxxxxxxx xx xxxxx procedures xxxxx xx xxxxxxxxxx xxxxxxx. Xxxxxxxxxxx 1.13: Technical xxxxxxxxxx xxxxxx X&xxxx;xxxxxxxxxxx’x xxxxxxxx xxxxxxxxxxx systems (x.x. xxxx office systems, xxxxxxxx xxxxxxxx and xxxxxxxx xxxxxxx xxxxxxxxxxxx) xxxxx xx xxxxxxxxx xxxxxxxx xxx xxxxxxxxxx xxxx xxx xxxxxxxxxxxx’x xxxxxxxxxxx xxxxxxxxx xx xxxxxxxx (x.x. xxxxxxxxxxx xxxxxxxx xxxxxx, xxxxxxxxxxxxx xxxxxxx xxxxxx). Xxxxxxxxxxx 1.14: Xxxxxxxxxxxxxx Xxxxx xxxxxxx xxxxxxxx xxxxx xxxxxx xxxx xxx xxx security xxxxxxxx that xxx xxx for xxxxxxxx xxxxxxxx xxx systems (x.x. xxxxxxxxx, xxxxxxx). Xxxxxxxx relating xx xxxxxxxxxxx xxxx include: xxxxxxxxx xx xxx xxxxxxxxxx xxx xxx xxxxxxx operating xxxxxx, xxxxxxx xxxxxxxx, xxxxxx xxxxxxxxxx xx xxxxxxxxx xxxxxxxxxxxx (x.x. production xxx xxxxxxxxxxx). Xxxxxxxxxxx xxxxxxxxxx, logging xxx xxxxxxxxxx xx xxxx xx xxxxxxxx of xxxxxx xxxxxx, in xxxxxxxxxx xxx high xxxxxxxxxx xxxxxxxx, shall xx implemented xxxxx xx x&xxxx;xxxx assessment. Xxxxx virtual xxxxxxxx xxxxxxx xx xxx xxxx hypervisor xxxxx xxxx x&xxxx;xxxxxxx xxxx xxxxxxx. Xxxxxxxxxxx 1.15: Xxxxx xxxxxxxxx Xxx xxxxx xx xxxxxx xxx/xx hybrid xxxxx solutions xx xxx Xxxxxxx Xxxxxxxxxxx Xxxxx xxxx xx xxxxx on x&xxxx;xxxxxx xxxx xxxxxxxxxx, xxxxxx xxxx xxxxxxx xxx xxxxxxxxx xxxxxxxx xxx xxx xxxxxxxxxxx xxxxxxx xxxxxxx xx xxx xxxxx xxxxxxxx. Xx hybrid xxxxx xxxxxxxxx xxx xxxx, xx xx xxxxxxxxxx xxxx xxx xxxxxxxxxxx xxxxx xx xxx xxxxxxx xxxxxx xx xxx highest xxx xx the xxxxxxxxx xxxxxxx. Xxx xx-xxxxxxxx xxxxxxxxxx of xxx xxxxxx xxxxxxxxx xxxx be segregated xxxx the other xx-xxxxxxxx systems. Business xxxxxxxxxx xxxxxxxxxx (xxxxxxxxxx xxxx xx critical xxxxxxxxxxxx) Xxx xxxxxxxxx requirements (2.1 xx 2.6) relate xx xxxxxxxx xxxxxxxxxx xxxxxxxxxx. Xxxx TARGET2 xxxxxxxxxxx xxxxxxxxxx by xxx Eurosystem as xxxxx critical xxx xxx xxxxxx xxxxxxxxxxx xx xxx TARGET2 xxxxxx xxxxx xxxx x&xxxx;xxxxxxxx continuity xxxxxxxx xx place comprising xxx xxxxxxxxx xxxxxxxx.
|
(1) The xxxx-xx-xxxx xxxxxxxxx xxxxxx xx xxx xxxxxxxxxxxxxx xx xxx xxx xx xxxxxxxxxxx that xx individual xxxxx xxxxxx to xx xxxxx xx carry xxx xxx/xxx duties.
(2) The xxxxxxxxx of least xxxxxxxxx refers xx xxxxxxxxx x&xxxx;xxxxxxx’x xxxxxx xxxxxxx xx xx XX system in xxxxx xx xxxxx xxx xxxxxxxxxxxxx xxxxxxxx xxxx.
(3)&xxxx;&xxxx;X&xxxx;xxxxxxxx xx the xxxxxxx xx xxxx xxxxxxxx xxxxxx xx xxxxxxxxxx as xxx xxxxx xxxxx (xxx xxx xxxxxxxxx) xxxxx xx under contract (xxxxxxxxx), xxxx xxx xxxxxxxxxxx, to xxxxxxx x&xxxx;xxxxxxx xxx xxxxx xxx xxxxxxx agreement xxx third xxxxx (xxx its personnel) xx xxxxxxx xxxxxx, xxxxxx remotely or xx-xxxx, to xxxxxxxxxxx xxx/xx information xxxxxxx xxx/xx xxxxxxxxxxx xxxxxxxxxx xxxxxxxxxx of the xxxxxxxxxxx xx xxxxx xx xxxxxxxxxx xx xxx xxxxx xxxxxxx xxxxx the exercise xx the XXXXXX2 xxxx-xxxxxxxxxxxxx.
XXXXXXX XX
Xxxxxxx XX xxxxxxxxxx XXX/2007/7 xx xxxx takto:
1. |
Článek 1 xx xxxx xxxxx:
|
2. |
V čl. 4 xxxx.&xxxx;2 xx xxxxxxx xx) xxxxxxxxx tímto:
|
3. |
X&xxxx;xx.&xxxx;4 xxxx.&xxxx;2 se xxxxxx nové xxxxxxx xx), xxxxx zní:
|
4. |
X&xxxx;xxxxxx&xxxx;4 xx odstavec 3 xxxxxxxxx xxxxx: „3.&xxxx;&xxxx;&xxxx;XXXXXX2 xxxxxxxx xxxx-xxxx xxxxx settlement xxx xxxxxxxx in xxxx, xxxx settlement xx xxxxxxx xxxx xxxxx xxxxxx XX xxxxxxxx, X2X XXXx xxx XXXX XXXx. XXXXXX2 xx xxxxxxxxxxx xxx xxxxxxxxx xx xxx basis xx xxx XXX through xxxxx xxxxxxx orders xxx xxxxxxxxx xxx xxxxxxxxx and xxxxxxx xxxxx xxxxxxxx xxx xxxxxxxxxx xxxxxxxx xx xxx xxxx xxxxxxxxx xxxxxx. Xx far xx xxx xxxxxxxxx xxxxxxxxx xx xxx X2X XXXx is xxxxxxxxx, XXXXXX2 xx xxxxxxxxxxx xxxxxxxxxxx and xxxxxxxxx on xxx xxxxx xx the X2X Platform. As xxx xx xxx xxxxxxxxx xxxxxxxxx of xxx TIPS XXXx xxx XXXX XX xxxxxxxxx accounts xx xxxxxxxxx, TARGET2 is xxxxxxxxxxx xxxxxxxxxxx and xxxxxxxxx on xxx xxxxx xx xxx XXXX Xxxxxxxx. The XXX xx xxx xxxxxxxx xx xxxxxxxx xxxxx these Xxxxxxxxxx. Xxxx and omissions xx xxx XXX-xxxxxxxxx XXXx xxx xxx 4XXx xxxxx be xxxxxxxxxx acts xxx xxxxxxxxx of the XXX, xxx xxxxx xx xxxxx xxxxxx xxxxxxxxx xx accordance xxxx Article 21 xx xxxx Xxxxx. Xxxxxxxxxxxxx xxxxxxxx to xxxxx Xxxxxxxxxx xxxxx not xxxxxx x&xxxx;xxxxxxxxxxx xxxxxxxxxxxx xxxxxxx X2X XXX xxxxxxx xxx the XXX-xxxxxxxxx XXXx xx xxx 4XXx xxxx xxx xx xxx xxxxxx xxxx in xxxx capacity. Xxxxxxxxxxxx, xxxxxxxx xx xxxxxxxxxxx xxxxx x&xxxx;X2X XXX xxxxxx xxxxxxxx xxxx, xx xxxxx xx, xxx XXX xx X2X Xxxxxxxx xx xxxxxxxx xx the xxxxxxxx provided under xxxxx Xxxxxxxxxx xxx xxxxxx to xx xxxxxxxx xxxx, xx xxxx to, the XXX.“; |
5. |
X&xxxx;xxxxxx&xxxx;8 xx xxxxxxxx 3 nahrazuje tímto: „3. Where xxx XXX has xxxxxxx x&xxxx;xxxxxxx xx x&xxxx;X2X XXX holder xxxxxxxx xx paragraph 1, xxxx T2S XXX holder xx xxxxxx xx xxxx xxxxx the xxxxxxxxxxxxx XXX(x) x&xxxx;xxxxxxx xx xxxxx xxx X2X XXX xxxx xxx xxxxxxx xxxxxxxx xx xxxxxxxxxx transactions xxxxxxxx xx those xxxxxxxxxx xxxxxxxx.“; |
6. |
X&xxxx;xxxxxx&xxxx;28 xx xxxxxxxx 1 xxxxxxxxx tímto: „1. T2S XXX xxxxxxx xxxxx xx xxxxxx xx xx xxxxx xx, xxxxx comply xxxx, xxx xxxxx xx xxxx xx demonstrate xxxx xxxxxxxxxx xx xxx xxxxxxxx xxxxxxxxx xxxxxxxxxxx with all xxxxxxxxxxx on xxxx xxxxxxxx xx xxxxxxxxxxx xx xxxx xxxxxxxxxx. Xxxx xxxxx xx xxxxxx to xx xxxxx xx, xxx xxxxx xxxxxx xxxx xxx xxxxxxxxxxx xx xxxx xxxxxxxx xx xxxxxxxxxxx xx prevention xx money laundering xxx the xxxxxxxxx xx xxxxxxxxx, proliferation-sensitive xxxxxxx xxxxxxxxxx xxx xxx xxxxxxxxxxx xx xxxxxxx xxxxxxx delivery xxxxxxx, xx particular xx xxxxx xx xxxxxxxxxxxx xxxxxxxxxxx measures xxxxxxxxxx any xxxxxxxx xxxxxxx xx xxxxxxxx xx xxxxx T2S XXXx. Xxxxx xx xxxxxxxx xxxx xxx xxxxxxxxxxx xxxxxxxxxxxx with xxx T2S xxxxxxx xxxxxxx xxxxxxxx, X2X XXX xxxxxxx xxxxx xxxxxx xxxx xxxx xxx xxxxxxxx xxxxx xxx xxxx xxxxxxxxx xxxxxx.“; |
7. |
Xxxxxx&xxxx;30 xx xxxxxxxxx xxxxx: „Xxxxxxx&xxxx;30 Xxxxxxxxxxx xxxxxxxxxxxx with xx NSP 1. T2S DCA xxxxxxx xxxxx xxxxxx:
2.&xxxx;&xxxx;&xxxx;Xxx xxxxx xxxxxxxxxxxx xxxxxxx x&xxxx;X2X XXX xxxxxx xxx xxx NSP xxxxx xx xxxxxxxxxxx xxxxxxxx by xxx xxxxx xxx conditions xx the xxxxxxxx xxxxxxxx xxxxxxxxx with xx NSP xx xxxxxxxx to in xxxxxxxxx 1(a). 3. The xxxxxxxx xx be xxxxxxxx xx the XXX xxxxx not form xxxx of xxx xxxxxxxx xx be xxxxxxxxx xx the XXX xx xxxxxxx xx TARGET2. 4. The ECB xxxxx not be xxxxxx for any xxxx, xxxxxx or xxxxxxxxx of xxx XXX (xxxxxxxxx xxx xxxxxxxxx, xxxxx xxx xxxxxxxxxxxxxx), or for xxx xxxx, errors xx omissions xx xxxxx xxxxxxx selected xx xxxxxxxxxxxx to xxxx xxxxxx xx xxx XXX’x xxxxxxx.“; |
8. |
Xxxxxx xx xxxx xxxxxx&xxxx;34x, xxxxx xxx: „Xxxxxxx&xxxx;34x Xxxxxxxxxxxx provisions Once xxx TARGET xxxxxx xx operational and XXXXXX2 has xxxxxx xxxxxxxxx, X2X XXX xxxxxxx shall xxxxxx X2X DCA xxxxxxx xx xxx XXXXXX xxxxxx.“; |
9. |
Xxxxxx xx xxxxx „X2X network xxxxxxx xxxxxxxx“ (v jednotném xxxx xxxxxxx xxxxx) x&xxxx;xx.&xxxx;6 xxxx.&xxxx;1 písm. x) xxxx x), čl. 9 xxxx.&xxxx;5, čl. 10 xxxx.&xxxx;6, xx.&xxxx;14 xxxx.&xxxx;1 xxxx. x), xx.&xxxx;22 odst. 1, xx.&xxxx;22 xxxx.&xxxx;2, xx.&xxxx;22 xxxx.&xxxx;3, xx.&xxxx;27 xxxx.&xxxx;5, xx.&xxxx;28 xxxx.&xxxx;1, čl. 29 xxxx.&xxxx;1 přílohy II x&xxxx;x&xxxx;xxxxxxxx 1 xxxxxxx X&xxxx;xx xxxxxxxxx xxxxxxx „XXX“; |
10. |
X&xxxx;xxxxxxx X&xxxx;xx x&xxxx;xxxx.&xxxx;8 xxxxxxx. 4 xxxxxxxxx xxxxxxx x) xxxxx:
|
XXXXXXX XXX
Xxxxxxx XXX xxxxxxxxxx ECB/2007/7 se xxxx takto:
1. |
Odkazy xx xxxxx „XXXX network xxxxxxx xxxxxxxx“ (x&xxxx;xxxxxxxxx xxxx xxxxxxx xxxxx) x&xxxx;xxxx xxxxxxx se xxxxxxxxx odkazem „NSP“; |
2. |
Článek 1 xx xxxx xxxxx:
|
3. |
X&xxxx;xx.&xxxx;3 xxxx.&xxxx;1 xx xxxxxxx xxxxx xx „Appendix X: TIPS connectivity xxxxxxxxx xxxxxxxxxxxx“; |
4. |
Xxxxxx&xxxx;4 xx xxxx xxxxx:
|
5. |
X&xxxx;xx.&xxxx;6 odst. 1 xxxx. x) xx bod x) xxxxxxxxx xxxxx:
|
6. |
Xxxxxx&xxxx;9 xx nahrazuje xxxxx: „Xxxxxxx&xxxx;9 Xxxxxxxxxxx xxxxxxxxxxxx xxxx xx NSP 1. Participants xxxxx xxxxxx:
2.&xxxx;&xxxx;&xxxx;Xxx xxxxx xxxxxxxxxxxx xxxxxxx x&xxxx;xxxxxxxxxxx xxx the NSP xxxxx be exclusively xxxxxxxx xx xxx xxxxx xxx conditions xx xxxxx xxxxxxxx xxxxxxxx xx xxxxxxxx xx in paragraph 1(x). 3.&xxxx;&xxxx;&xxxx;Xxx services xx xx xxxxxxxx by xxx NSP xxxxx xxx form part xx xxx services xx xx performed xx the XXX xx xxxxxxx of XXXXXX2. 4.&xxxx;&xxxx;&xxxx;Xxx XXX shall xxx be liable xxx any xxxx, xxxxxx xx xxxxxxxxx xx xxx XXX (xxxxxxxxx its xxxxxxxxx, xxxxx and xxxxxxxxxxxxxx), xx xxx xxx xxxx, errors xx xxxxxxxxx xx third xxxxxxx selected xx xxxxxxxxxxxx to xxxx xxxxxx xx the XXX’x xxxxxxx.“; |
7. |
Xxxxxx&xxxx;10 xx xxxxxxx; |
8. |
Xxxxxx xx xxxx xxxxxx&xxxx;11x, který xxx: „Xxxxxxx&xxxx;11x XXX xxxxxxxxxx 1.&xxxx;&xxxx;&xxxx;Xxx xxxxxxx MPL xxxxxxxxxx xxxxxxxx xxx xxxxx – XXXX xxxxxxx table for xxx xxxxxxxx xx xxx XXX xxxxxxx. 2.&xxxx;&xxxx;&xxxx;Xxxx xxxxx xxx be xxxxxx xx xxxx xxx XXXX. An XXXX xxx xx xxxxxx to xxx xx multiple xxxxxxx. 3.&xxxx;&xxxx;&xxxx;Xxxxxxx&xxxx;29 xxxxx apply xx xxx xxxx xxxxxxxxx xx the MPL xxxxxxxxxx.“; |
9. |
X&xxxx;xxxxxx&xxxx;12 xx xxxxxxx xxxxxxxx 9; |
10. |
Xxxxxx&xxxx;16 xx xxxxxxxxx xxxxx: „Xxxxxxx&xxxx;16 Xxxxx xx xxxxxxx xxxxxx xx XXXX DCA The following xxx xxxxxxxxxx xx xxxxxxx orders xxx xxx xxxxxxxx xx xxx XXXX service:
|
11. |
X&xxxx;xxxxxx&xxxx;18 se xxxxxxxx 6 nahrazuje xxxxx: „6.&xxxx;&xxxx;&xxxx;Xxxxx a TIPS XXX xx XX xxxxxxxxx xxxxxxxx xxxxx, a TIPS XXX xx XXXX XX xxxxxxxxx xxxxxxx xxxxxxxxx xxxxxxxx xxxxx xx x&xxxx;XXXX XX xxxxxxxxx xxxxxxx xx XXXX XXX xxxxxxxxx xxxxxxxx xxxxx xxx xxxx accepted xx xxxxxxxx to in Xxxxxxx&xxxx;17, xxx XXXXXX2-XXX xxxxx xxxxx xxxxxxx xxxxxxxxxx funds are xxxxxxxxx on xxx xxxxx'x xxxxxxx. Xx xxxxxxxxxx funds are xxx xxxxxxxxx xxx xxxxxxxxx xxxxxxxx xxxxx xxxxx xx xxxxxxxx. Xx sufficient funds xxx xxxxxxxxx xxx xxxxxxxxx transfer xxxxx xxxxx be xxxxxxx xxxxxxxxxxx.“; |
12. |
X&xxxx;xx.&xxxx;20 xxxx.&xxxx;1 xx xxxxxxx x) nahrazuje xxxxx:
|
13. |
X&xxxx;xxxxxx&xxxx;30 se xxxxxxxx 1 xxxxxxxxx xxxxx: „1.&xxxx;&xxxx;&xxxx;XXXX XXX xxxxxxx shall xx xxxxxx to xx xxxxx of, xxxxx comply with xxx xxxxx be xxxx xx demonstrate xxxx compliance xx xxx xxxxxxxx xxxxxxxxx xxxxxxxxxxx xxxx xxx xxxxxxxxxxx on xxxx xxxxxxxx to legislation xx xxxx xxxxxxxxxx. Xxxx xxxxx xx xxxxxx xx xx xxxxx xx, xxx xxxxx xxxxxx xxxx xxx xxxxxxxxxxx on xxxx xxxxxxxx xx xxxxxxxxxxx xx prevention xx xxxxx laundering xxx xxx xxxxxxxxx xx xxxxxxxxx, xxxxxxxxxxxxx-xxxxxxxxx xxxxxxx xxxxxxxxxx xxx xxx xxxxxxxxxxx xx xxxxxxx weapons delivery xxxxxxx, xx xxxxxxxxxx xx xxxxx xx xxxxxxxxxxxx appropriate xxxxxxxx xxxxxxxxxx any xxxxxxxx xxxxxxx xx xxxxxxxx xx their TIPS XXXx. XXXX XXX xxxxxxx xxxxxx that xxxx xxx xxxxxxxx xxxxx xxxxx chosen XXX'x xxxx xxxxxxxxx xxxxxx prior xx xxxxxxxx xxxx x&xxxx;xxxxxxxxxxx xxxxxxxxxxxx xxxx xxxx XXX.“; |
14. |
Xxxxxx se xxxx xxxxxx&xxxx;35x, xxxxx xxx: „Xxxxxxx&xxxx;35x Xxxxxxxxxxxx xxxxxxxxx Xxxx the XXXXXX xxxxxx is xxxxxxxxxxx xxx the XXXXXX2 xxx xxxxxx xxxxxxxxx, XXXX XXX holders xxxxx xxxxxx TIPS XXX holders in xxx XXXXXX xxxxxx.“; |
15. |
X&xxxx;xxxxxxx X&xxxx;xx xxxxxxx x&xxxx;xxxxxxxx 2 xxxxxxxxx tímto:
|
16. |
X&xxxx;xxxxxxx I se x&xxxx;xxxx.&xxxx;6 xxxxxxx. 1 xxxxxxxxx xxxxxxx x) xxxxx:
|
17. |
V dodatku XX se xxxxxxx xxxxxxxx 2; |
18. |
Dodatek X&xxxx;xx xxxxxxx. |