Skip to main content
Version status: Entered into force | Document consolidation status: No known changes
Version date: 23 September 2020 - onwards
Version 2 of 2

Article 22 Security

(1) An application for registration as a securitisation repository shall contain proof of the following:

(a) that its information technology systems are protected from misuse or unauthorised access;

(b) that its information systems as defined in Article 2(a) of Directive 2013/40/EU of the European Parliament and of the Council [Directive 2013/40/EU of the European Parliament and of the Council of 12 August 2013 on attacks against information systems and replacing Council Framework Decision 2005/222/JHA (OJ L 218, 14.8.2013, p. 8).] are protected against attacks;

(c) that unauthorised disclosure of confidential information is prevented;

(d) that the security and integrity of the information received by it under Regulation (EU) 2017/2402 is ensured.

(2) The application shall contain proof that the applicant has arrangements in place to identify and manage the risks referred to in paragraph 1 in a prompt and timely manner.

(3) With respect to breaches in the physical and electronic security measures referred to in paragraphs 1 and 2, the application shall contain proof that the applicant has arrangements in place to do the following in a prompt and timely manner:

(a) to notify ESMA of the incident giving rise to the breach;