Search Result
REC 2.2 Method of satisfying the recognition requirements
As Published: 2004
REC 2.2 Method of satisfying the recognition requirements
…
COLL 6.12 Risk management policy and risk measurement
As Published: 2011
COLL 6.12 Risk management policy and risk measurement
…
BIPRU 3.4 Risk weights under the standardised approach to credit risk
As Published: 2006
BIPRU 3.4 Risk weights under the standardised approach to credit risk
…
COLL 5.2 General investment powers and limits for UCITS schemes
As Published: 2005
COLL 5.2 General investment powers and limits for UCITS schemes
…
EG 6.2 Publicity during, or upon the conclusion of regulatory action
As Published: 2015
EG 6.2 Publicity during, or upon the conclusion of regulatory action
…
SYSC 22.2 Getting, giving and updating references: the main rules
As Published: 2016
SYSC 22.2 Getting, giving and updating references: the main rules
…
SYSC 4.2 Persons who effectively direct the business
As Published: 2008
SYSC 4.2 Persons who effectively direct the business
…
SYSC 2.1 Apportionment of Responsibilities
As Published: 2002
SYSC 2.1 Apportionment of Responsibilities
…
SUP 15.11 Notification of COCON breaches and disciplinary action
As Published: 2015
SUP 15.11 Notification of COCON breaches and disciplinary action
…
PERG 9.10 Significance of being an open-ended investment company
As Published: 2005
PERG 9.10 Significance of being an open-ended investment company
…
COLL 6.6A Duties of AFMs in relation to UCITS schemes and EEA UCITS schemes
As Published: 2011
COLL 6.6A Duties of AFMs in relation to UCITS schemes and EEA UCITS schemes
…
SUP 10A.11 Minimising overlap with the PRA approved persons regime [deleted]
As Published: 2015
SUP 10A.11 Minimising overlap with the PRA approved persons regime [deleted]
…
REC 2.5 Systems and controls, algorithmic trading and conflicts
As Published: 2004
REC 2.5 Systems and controls, algorithmic trading and conflicts
…