US mutual fund complexes are supposed to give investors who buy and sell shares the price of the shares on the day they receive their orders. So says the US Investment Company Act of 1940. But insurance giant Nationwide Insurance found a creative way of not doing so. It didn’t have to rely on technology, […]
News to Use: New AML Technology and Bitcoins
AML Tech Upgrade: To avoid doing business with the wrong customers and counterparties, financial firms can now rely on a new generation of software applications that go beyond traditional rules-based screening to far more sophisticated data analysis, says a new research report from Celent. The costs of not complying with anti-money laundering rules can be […]
US T+2: Getting Rid of Paper Stock Certificates
Will the US finally go paperless? When it comes to issuing certificates that evidence share ownership, that is. This is the hope of Depository Trust & Clearing Corp. (DTCC), transfer agents and other industry participants, now that a two-day settlement cycle could be just around the corner for the US. For more than a year they […]
KYC Utilities: How Many is Too Many?
When is four too high a number? When it is the number of virtually interchangeable third-party services specializing in helping financial firms meet their know-your customer and other regulatory requirements, acknowledge fund managers and even the providers themselves. Of course, just how many should be left standing and who that should be is a difficult question […]
News to Use: Whistleblower Update, Lending vs. Voting, and New TA Utility
SEC Chills Pre-taliation: The Securities and Exchange Commission’s enforcement of rules against whistleblower retaliation has just taken another giant step forward with the US regulatory agency’s first announcement it has penalized a firm for restrictive language in an employment agreement. Although the US$130,000 fine was against KBR Inc., not a financial services firm, attorneys specializing […]
Cybersecurity in the C-Suite: A Matter of “Need to Know”
Cybersecurity has been described as everything from a top-down corporate mission to a shopping list for software packages that monitor networks and systems for suspicious activity. Given the breadth and complexity of even identifying the risks, it’s no wonder that all sorts of management are discovering they’re now riding the cybersecurity bus. Nowhere is this accumulation of corporate […]
Liquid Alt Funds: Five Tips to Survive New SEC Scrutiny
A regulatory fine of US$50,000 might seem like a slap on the wrist for a large fund manager, but when an enforcement action from the US Securities and Exchange Commission makes its way into the agency’s press release and headlines from multiple media outlets it becomes a big concern for compliance and operations managers. In a new […]
Broker-Dealers: Good Hygiene Reduces Cybersecurity Attacks
When it comes to mitigating cybersecurity attacks, broker-dealers are quickly taking a chapter out of the textbook on good dental hygiene. Just as regular brushing and flossing can go a long way to preventing tooth decay and gum disease, so can a consistent program of vigilance work against aggressive external and internal hackers, say cybersecurity experts. With the US Securities […]
Broker Dealers Beware: States Get Creative in Unclaimed Account Search
Knock, knock. Who’s there? If a potential censure or fine from the Financial Industry Regulatory Authority or the Securities and Exchange Commission isn’t enough to motivate broker-dealers to ensure their middle and back-office operations are well oiled, perhaps an intensive audit by an unfamiliar firm sent by state regulators will be. The states’ objective: taking over billions of dollars worth […]
Vendor Risk Management: Financial Firms under the Gun
First of a two-part series on third-party risk. For the second article, click here. Activities can be outsourced, liabilities can’t. Financial firms may understand the legal distinction, but when it comes to managing the risk involved with using external technology providers, they are too often falling asleep at the wheel, warn operations and IT experts. The reason: […]