Technology in Investment - Chapter 6 Flashcards

(106 cards)

1
Q

What is chapter 6?

A

The role of technology in the Settlement and Pot-settlement phases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the identity of the SENDER & RECIEVER usually represented as ?

A

BIC Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the identity of the SECURITY usually represented as ?

A

ISIN, SEDOL, CUSIP or some other identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What three methods are used to transmit settlement instructions

A
  • SWIFT Messages
  • Proprietary standard message
  • Email, fax and telex
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a status code

A

Codes for tracking where a transaction is in the settlement cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What FOUR criteria must be must for the settlement agent to settle the trade

A
  1. the value date has been reached
  2. the seller has the stock to deliver
  3. the buyer has the cash or credit to pay for it, and
  4. the seller’s instructions match the buyer’s instructions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the main role of a instruction reference number in the automation process? (aa-111122223333-1) eg

A

It facilitates automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is quoting the trade reference to the custodian a bad idea?

A

It will, by definition, generate two or more instructions.
Sometimes it may not be possible to settle in a single transaction
The effect of settlement netting
Errors are harder to rectify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is another term for repo

A

Sale and re-purchase agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a repo transaction?

A

Trading cash for government assets (bills or bonds usually)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is stock lending

A

When the borrower borrows stock of the lender to fulfil a short fall due to shorting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What two things are transferred on the start leg of a stock lend?

A

Securities for cash or collateral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What four things are transferred on the end leg of a stock lend?

A

Securities
Cash
Interest on cash or collateral
Lending fee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between the two end legs of a repo transaction and a stock lend

A

No lending fee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the business purpose of a repo transaction

A

To lower interest rates on borrowings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the acceptable instruments for a repo transaction

A

Certain government bonds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the acceptable instruments for a stock loan

A

Individual equities and bonds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a a reason for a firm to borrow securities?

A

If they have short sold more stock then they have. So they must borrow to cover the difference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Reason for lending securities

A

To gain income on charging a fee to the borrower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is another term for the Nominal Owner of a stock?

A

Legal Owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is an SLIs

A

Stock Lending Intermediaries (SLIs) Used to facilitate and fund large trade operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

If a borrower wanted to borrow a large qty of securities from an SLI for a long period of time, what 3 issues will it face?

A

Can not find a fund manager:

  • Willing to lend such a large amount
  • Willing to lend for such a long period
  • Willing to accept a non-cash collateral
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is Deliver by Value (DbV)

A

Overnight funding between a market maker and a SLI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does SLI stand for?

A

Stock Lending Intermediaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What are automated borrowing services?
CSDs, ICSDs and custodians. Party A & B are unaware of each other and will be charged fees
26
What does CSDs stand for?
Central Security Depositories
27
What does Segregation of Client assets mean?
Client assets must be held in a separate account to that of the firms assets, even if they are the same asset.
28
What is a nominee account.
A separate account where clients assets are segregated at a CSD or custodian.
29
What 2 terms must be met for a custodian to use a clients account assets in their own accounts?
The client has given prior consent The client pre agrees terms of how the assets are to be used.
30
What is an Omnibus account
A combined account that custodians use to hold combined client assets. The opposite of a Nominee account..
31
What, in addition to the previous two terms, are required for a custodian to use client assets in a omnibus account?
Each client has given permission The firm has systems and controls in place that ensure only the assets for the specific client are being used
32
What are the five technological requirements for a firm who operate in the Stock Loans and Repos market?
Manage Collateral Re-valuation of securities Send/receive messages Send relevant instructions to settlement agents Identify securities for stock lending/repos Ensure the custody accounts are record correctly
33
What is a general ledger system
A record keeping system for firms financial data
34
What are the three transactions which interest accrual is earned on
Purchase/Sale of bonds Stock borrowing, lending & repos Money market loans and deposits
35
What is accrued interest
Accrued interest is defined as the interest that has accumulated on a transaction since the last interest payment date or start date, up but not including the value date.
36
If Bank ABC borrows £1,000,000 on March 7th for 30 days at 5% interest, calculated on actual/actual basis, the maturity is 6th of April. What of the following is the correct equation? Repayment amount = 1,000,000 + (1,000,000 x 30/365 x 5%) = £1,004,109.59 Repayment amount = 1,000,000 + (1,000,000 x 30/360 x 5%) = £1,005,107.23 Repayment amount = 1,000,000 + (1,000,000 x 31/365 x 5%) = £1,004,901.56 Repayment amount = 1,000,000 + (1,000,000 x 30/300 x 5%) = £1,004,109.59
Repayment amount = 1,000,000 + (1,000,000 x 30/365 x 5%) = £1,004,109.59 (A)
37
Is there interest payable or receivable on the start date of the transaction?
No
38
Is there interest payable or receivable on the end date of the transaction?
Yes
39
How many days interest are accrued on Friday of a normal week?
Three days. Friday, Saturday & Sunday
40
What is Straight Through Processing (STP) commonly referred to as?
Automation
41
What does SWIFT stand for
Society for Worldwide Interbank Financial Telecommunication (SWIFT
42
What two things must be present for SWIFT to be connected?
A secure IP-Based network SWIFTNet Link.
43
What is SWIFTNet link?
Link software that provides security and ensures interoperability between users, and the store and forward principle.
44
What two protocols make up the SWIFTNet
Transmission Control Protocol (Transmission per Second) Internet Protocol (IP)
45
What is the % of the Committed Data Rate is required to operate SWIFTNet
70%
46
What is SWIFTAlliance ?
SWIFTNet link that is embedded into a companies own system.
47
What is an API?
Application Programming Interfaces, allows for systems to talk to one another
48
What is SWIFT Gateways
3rd party products that compete with SWIFTAlliance
49
What is SWIFTNET PKI
Security system for SWIFT
50
What method of security does SWIFTNET PKI use?
Authenticator keys
51
What five key things does Key-Exchange provide?
Authenticity Integrity Non-Repudiation Confidentiality Access Control
52
What is the Store & Forward principle
Messages are sent to an intermediate station where they are then forwarded to the final destination or another intermediate station
53
What are some reasons for the use of the Store & Forward Principle?
Time zone differences Different working days/bank holidays Natural disasters Not enough bandwidth
54
Interaction of SWIFT in a firms systems - At the sending firm
Trades are captured and enriched with SSI details and references data. Then forwarded to SWIFT Gateway If error occurs it is sent to a repair queue or it will be sent for authorization. It is then encrypted and sent to SWIFT
55
Interaction of SWIFT in a firms systems - At SWIFT
Message received at European hub, is time stamped. Given ACK or NACK status Moves message onto local hub Message is held until member comes online, if not already online
56
What does NACK mean in SWIFT messaging
Not Acknowledged
57
What does ACK mean in SWIFT messaging
Acknowledged
58
Interaction of SWIFT in a firms systems - At receiving firm
Received and decrypted Message is directed to the right department Un-directed messages get sent manually by a human
59
SWIFT Message standards, which governing body controls the standards?
International Organisation for Standardisation (ISO)
59
What code has the format MT100
FIN Messages (or known as MT messages)
60
Who regulates SWIFT messaging standards?
International Organization for standardization
61
What ISO standard governs all series, except for the MT500 series?
ISO 7775
62
What is Extensible Mark-up Language?
XML = common information formats to share and format the data on the internet, intranets, and elsewhere
63
What ISO number did XML language bring forward?
ISO 15022, 2nd edition
64
What ISO number do all SWIFT messages use since 2004
ISO 20022
65
What changed in 2002 in regards to the closed user groups of the SWIFT network?
It is now possible for the firms to comminute using SWIFT, in two ways. SCORE and MA-CUG
66
What is a closed user group?
A securities or investment firm that has been admitted to the SWIFT network
67
What is SCORE?
One of two ways for a closed user group to communicate with banks via the SWIFT network. In order to use this method the firm must be listed on a regulated stock exchange which is a member of the Financial Action Task Force (FATF)
68
What are the member-Administered Closed User Groups (MA-CUG)
Companies not eligible for SCORE can join a MA-CUG
69
What is the difference between SCORE & MA-CUG
SCORE Participants SWIFT messages can be network validated by SWIFT. MA-CUG can not and will not be validated
70
What is a Financial Information Exchange (FIX) Protocol
Basically each broker with a FIX connection is a two way connection taking place between both their application systems. These applications are reffered to as 'FIX engines'
70
What is SWIFT Net FileAct
Used to send files between parties. It supersedes the existing FIN service.
71
What is SWIFT Net Interact
Used for direct application-to-application transactional messaging
72
Why was the Financial Information Exchange (FIX) Protocol created?
Because brokers wanted to streamline their trading processes
73
What type of messaging standard is a Financial Information Exchange (FIX) protocol
Open message standard
74
What is a FIX engine
The applications at either end of the FIX Protocol. They can operate either as stand-alone or fully integrated solutions
75
What is an Electronic Crossing Network
Where buy and sell orders for stocks are matched and executed without going through a public exchange
76
What are the two levels that the FIX protocol is defined it?
Session & Application
77
What is the session level of the FIX protocol concerned with
The session level is concerned with the delivery of data
78
What is the application level of the FIX protocol concerned with
The application level defines business-related data content
79
What product does the Financial product Markup Language (FpML) cover?
FpML covers the OTC Derivatives industry
80
What does the Extensible Business Reporting Language (XBRL) cover?
balance sheets and profit and loss accounts,
81
In the context of CISI what 4 data points are included in the reconciliation procedure of financial data?
1. Cash amounts connected with all types of transactions 2. Cash balances connected with all types of transactions 3. Stock and derivative accounts connected with all types of transactions 4. Stock and derivative postions with all types of transactions
81
What is a reconciliation procedure?
The systematic process of comparing, verifying, and harmonizing data sets from multiple sources or systems to ensure consistency, accuracy, and completeness.
82
What is external reconciliation ?
Settlement agents reconciling the data on the firms behalf as they hold the external accounts. Like nostro accounts for example
83
What is internal reconciliation ?
Internal reconciliation is the act of reconciling data held in one of the firm’s business application
84
Why is external reconciliation important?
It is a regulatory requirement to reconcile them
85
What are the three key points for a firm who are internally reconciling their data
a. As often as is necessary b. As soon as reasonably practicable after the date to which the reconciliation relates c. To ensure the accuracy of the firm’s records and accounts.
86
What is the 'Total Count Method' for reconciling data?
It requires a;; safe custody assets to be counted and reconciled on the SAME DAY
87
Good business practice - Avoidance of losses. What are the three ways external reconciliation and the FCA ensure losses are kept to a minimum during the settlement and post settlement phases ?
1. Fraudulent Employee activity 2. Processing errors made in the firm 3. Processing errors made outside the firm, eg. Settlement agents
88
What are two possible errors that would arise from processing errors when avoiding losses
Dividend payments Corporate actions (Buying and Selling)
89
How often does external reconciliation get done by a large firms?
Large firms on a daily basis
90
How is external reconciliation usually achieved?
SWIFT Messages. Values are checked against one another to ensure the underlying data is correct and accurate
91
What is a journal voucher?
An authorized individual to sign off on external reconciliation matters when the two data's do not match.
92
What does 'Settling in tolerance mean'
During external reconciliation there may be a small difference between the cash amounts. This will have to be written off by a journal voucher
93
How is internal reconciliation usually achieved?
Through the same applications that external reconciliation uses
94
Why is internal reconcilai
as the trade in the example flows through the trade cycle, records may need to be created and updated in multiple business systems.
95
How can pre-agreed portfolio rules be created?
1. In conjunction with the client as part of their client mandate document 2. Driven by regulation
95
What is post trade compliance?
Ensures that a portfolio does not veer from the pre agreed rules listed in the portfolios investment mandate
96
What is a passive breach
where a breach occurs that is caused by market conditions outside the control of the manager or investor.
97
If a pre-defined portfolio rule is broken, who should it be reported to?
Fund manager
98
If a pre defined portfolio rule is breached, what are the two types of breach it can be?
Active & Passive
99
What are the IT complications of Post Trade compliance, there are 3
Ability to create & maintain the rules Good clean data A scheduler for the fund manager to determine when post trade compliance rules are run.
99
What is an active breach
1.Active breaches – where a fund manager trades (hopefully accidentally) into the wrong investment
100
How often are post trade compliance rules run?
Once a day. Either EoD or before trading starts in the morning
101
Once rules are run, what is the Post trade compliance process required to do (3)
Highlight breaches Ensure breaches are forwarded to the correct parties Ensure the system is kept on an access only basis and changes are clearly logged (Auditing requirement).