Content Options:

Content Options

SECTION 2 Non-discriminatory access to trading venues

Article 5 Conditions on the denial of access by a trading venue

  1. (1)

    A trading venue shall assess whether granting access would create any of the risks specified in Articles 6 and 7 and may deny access only if, after making all reasonable efforts to manage its risks, the trading venue concludes that there are significant undue risks that cannot be managed.

  2. (2)

    If a trading venue denies access, it shall identify which risks specified in Articles 6 and 7 would result from granting access and why those risks cannot be managed.

Article 6 Denial of access by a trading venue based on operational risk and complexity

A trading venue may deny an access request on grounds of operational risk and complexity arising from such access only if there is a risk of incompatibility of CCP IT systems and trading venue IT systems, impeding the trading venue to provide for connectivity between those systems.

Article 7 Denial of access by a trading venue based on other factors creating significant undue risks

A trading venue may deny an access request on grounds of significant undue risks in any of the following cases:

  1. (a)

    threat to the economic viability of the trading venue or its ability to meet minimum capital requirements under paragraph 1 of the Schedule to the Financial Services and Markets Act (Recognition Requirements Regulations) 2001;

  2. (b)

    incompatibility of trading venue rules and CCP rules that the trading venue cannot remedy in cooperation with the CCP.

Article 8 Conditions under which access is deemed to threaten the smooth and orderly functioning of markets or adversely affect systemic risk

In addition to liquidity fragmentation, as defined in Article 2(1)(45) of Regulation (EU) No 600/2014, for the purposes of Articles 35(4)(b) and 36(4)(b) of that Regulation, granting access shall be deemed to threaten the smooth and orderly functioning of the markets, or adversely affect systemic risk, where the competent authority can provide reasons for the denial, including evidence that the risk management procedures of one or both of the parties to the access request are insufficient to prevent the granting of access from creating significant undue risks to third parties, and there is no remedial action that would sufficiently mitigate those risks.