Article 22 Security
(1) An application for registration as a securitisation repository shall contain proof of the following:
(a) that its information technology systems are protected from misuse or unauthorised access;
(b) that its information systems as defined in Article 2(a) of Directive 2013/40/EU of the European Parliament and of the Council [Directive 2013/40/EU of the European Parliament and of the Council of 12 August 2013 on attacks against information systems and replacing Council Framework Decision 2005/222/JHA (OJ L 218, 14.8.2013, p. 8).] are protected against attacks;
(c) that unauthorised disclosure of confidential information is prevented;
(d) that the security and integrity of the information received by it under Regulation (EU) 2017/2402 is ensured.
(2) The application shall contain proof that the applicant has arrangements in place to identify and manage the risks referred to in paragraph 1 in a prompt and timely manner.
(3) With respect to breaches in the physical and electronic security measures referred to in paragraphs 1 and 2, the application shall contain proof that the applicant has arrangements in place to do the following in a prompt and timely manner:
(a) to notify ESMA of the incident giving rise to the breach;