Search Result

21 - 40 of 700 items.
Results filter

Search Term(s)

Filter by Modules

Filter by Documents

Filter by Keywords

Effective Period

Similar To

To access the FCA Handbook Archive choose a date between 1 January 2001 and 31 December 2004 (From field only).

COLL 5.2 General investment powers and limits for UCITS schemes

As Published: 2005

COLL 5.2 General investment powers and limits for UCITS schemes

ICOB 8.4 Unsolicited services

As Published: 2004

ICOB 8.4 Unsolicited services

COND 2.3 Threshold condition 3: Close links

As Published: 2004

COND 2.3 Threshold condition 3: Close links

SYSC 6.3 Financial crime

As Published: 2007

SYSC 6.3 Financial crime

PRIN 1.1 Application and purpose

As Published: 2001

PRIN 1.1 Application and purpose

BIPRU 7.9 Use of a CAD 1 model

As Published: 2007

BIPRU 7.9 Use of a CAD 1 model

COND 2.4 Threshold condition 4: Adequate resources

As Published: 2004

COND 2.4 Threshold condition 4: Adequate resources

BIPRU 7.10 Use of a Value at Risk Model

As Published: 2007

BIPRU 7.10 Use of a Value at Risk Model

SYSC 12.1 Application

As Published: 2006

SYSC 12.1 Application

SYSC 4.1 General requirements

As Published: 2002

SYSC 4.1 General requirements

COLL 4.2 Pre-sale notifications

As Published: 2006

COLL 4.2 Pre-sale notifications

SUP 12.6 Continuing obligations of firms with appointed representatives

As Published: 2001

SUP 12.6 Continuing obligations of firms with appointed representatives

SYSC 7.1 Risk control

As Published: 2006

SYSC 7.1 Risk control

REC 5.2 Application process

As Published: 2001

REC 5.2 Application process

COLL 6.5 Appointment and replacement of the authorised fund manager and the depositary

As Published: 2006

COLL 6.5 Appointment and replacement of the authorised fund manager and the depositary

LR 8.7 Supervision of sponsors

As Published: 2005

LR 8.7 Supervision of sponsors

BIPRU 3.2 The central principles of the standardised approach to credit risk

As Published: 2006

BIPRU 3.2 The central principles of the standardised approach to credit risk

SYSC 6.1 Compliance

As Published: 2006

SYSC 6.1 Compliance

SUP 6.3 Applications for variation of permission

As Published: 2001

SUP 6.3 Applications for variation of permission

COND 2.5 Threshold condition 5: Suitability

As Published: 2004

COND 2.5 Threshold condition 5: Suitability