March 2, 2016
Trading Compliance is a vital part of an investment management firm's overall Compliance Program. Investment firms must employ compliance programs pursuant to Regulators' requirements, and they need an effective compliance engine to maintain and enforce portfolio-specific mandates. In recent years, we have seen headlines regarding breaches of legal and ethical standards, including rogue and insider trading, inept compliance oversight, technology failures, and lax record keeping. You certainly do not want to see for your firm's name in those headlines. This survey assesses the Trading Compliance capabilities that firms have implemented to prevent, identify, monitor, manage, resolve, and report potential and actual violations. Robust Trade Compliance can go a long way toward protecting your firm's assets, reputation, and integrity.
The survey covers:
Compliance Organization - The role of Chief Compliance Officer and the function of compliance rules oversight
Technology and Security - Compliance system usage, trading surveillance, and cyber security
Compliance Management - The rules approval process, violations management, and compliance policies
Trading Desk Compliance - Best execution policies, brokerage oversight, and trading desk procedures
Monitoring - Compliance checks, violations tracking, and record keeping
CutterResearch content is the proprietary property of Cutter Associates and our members who have entered into confidentiality agreements. It contains information that is proprietary and confidential to Cutter as well as to the vendors discussed within the reports (the "Vendors"). Disclosure of the information contained in the reports could cause irreparable harm to Cutter and/or the Vendors.
By selecting "I Agree" below, you agree to safeguard this information with the same care as your firm affords its own confidential information. You will not provide access to this information to anyone who is not an employee of your firm and will not distribute this information outside your firm. Furthermore, you will not provide access to this information to any employee of any subsidiary, unit, department or division of your firm that is engaged in any aspect of the software business involving third parties, including, without limitation, selling or otherwise providing software to third parties, assisting third parties in the selection or implementation of software, or providing investment related software information to third parties (collectively, the "Prohibited Recipients").