Search Result

141 - 160 of 1048 items.
Results filter

Search Term(s)

Filter by Modules

Filter by Documents

Filter by Keywords

Effective Period

Similar To

To access the FCA Handbook Archive choose a date between 1 January 2001 and 31 December 2004 (From field only).

REC 5.1 Introduction and legal background

As Published: 2011

REC 5.1 Introduction and legal background

COLL 7.4 Winding up an AUT and terminating a sub-fund of an AUT

As Published: 2011

COLL 7.4 Winding up an AUT and terminating a sub-fund of an AUT

SUP 10A.3 Provisions related to the Act

As Published: 2013

SUP 10A.3 Provisions related to the Act

BIPRU 8.1 Application

As Published: 2006

BIPRU 8.1 Application

SUP 14.2 Changes to branch details

As Published: 2001

SUP 14.2 Changes to branch details

COND 1.3 General

As Published: 2013

COND 1.3 General

PERG 2.6 Specified investments: a broad outline

As Published: 2005

PERG 2.6 Specified investments: a broad outline

SYSC 10.1 Application

As Published: 2006

SYSC 10.1 Application

BIPRU 12.2 Adequacy of liquidity resources

As Published: 2009

BIPRU 12.2 Adequacy of liquidity resources

LR 13.8 Other circulars

As Published: 2007

LR 13.8 Other circulars

PERG 2.10 Persons carrying on regulated activities who do not need authorisation

As Published: 2006

PERG 2.10 Persons carrying on regulated activities who do not need authorisation

SYSC 19A.1 General application and purpose

As Published: 2010

SYSC 19A.1 General application and purpose

SUP 11.2 Purpose

As Published: 2004

SUP 11.2 Purpose

SUP 10A.14 Changes to an FCA-approved person's details

As Published: 2013

SUP 10A.14 Changes to an FCA-approved person's details

SUP 5.1 Application and purpose

As Published: 2001

SUP 5.1 Application and purpose

SYSC 19C.1 General application and purpose

As Published: 2014

SYSC 19C.1 General application and purpose

PR 1.2 Requirement for a prospectus and exemptions

As Published: 2009

PR 1.2 Requirement for a prospectus and exemptions

REC 3.16 Information technology systems

As Published: 2013

REC 3.16 Information technology systems

REC 2.10 Financial crime and market abuse

As Published: 2004

REC 2.10 Financial crime and market abuse

COND 2.7 Business model

As Published: 2013

COND 2.7 Business model