Chapter VII - RIGHTS AND OBLIGATIONS OF DEPOSITORIES, PARTICIPANTS, ISSUERS, MANNER OF SURRENDER OF CERTIFICATE OF SECURITY AND CREATION OF PLEDGE OR HYPOTHECATION (From Regulation 40 to Regulation 82AA)
Regulation 82A - Information and Data Sharing Policy
Securities and Exchange Board of India (Depositories and Participants) Regulations, 2018 Chapter VII RIGHTS AND OBLIGATIONS OF DEPOSITORIES, PARTICIPANTS, ISSUERS, MANNER OF SURRENDER OF CERTIFICATE OF SECURITY AND CREATION OF PLEDGE OR HYPOTHECATION
📋
Contents
Cases Cited
Referred In
Notifications
Circulars
Forms
Manuals
Acts
Rules & Regulations
Case Laws New
Ref Provisions New
Plus +
Source NTF
Summary
Similar
Note
Bookmark
Share
✓ Copied successfully !
Print
Print Options
For full text, please login
Login to TaxTMI
Verification Pending
The Email Id has not been verified. Click on the link we have sent on
Data sharing policy: depositories must adopt frameworks specifying shared data types, monitoring, audits and accountability. Regulation 82A mandates that every depository and any company where a depository has invested adopt an Information and Data Sharing Policy covering means and manner of data sharing, types of data that may be shared, an escalation matrix, a digital database recording shared information and recipients with reasons, technological monitoring including periodic audits, and an accountability mechanism fixing individual responsibilities for breaches.
Cases where this provision is explicitly mentioned in the judgment/order text; may not be exhaustive. To view the complete list of cases mentioning this section, Click here.
Provisions expressly mentioned in the judgment/order text.
Data sharing policy: depositories must adopt frameworks specifying shared data types, monitoring, audits and accountability.
Regulation 82A mandates that every depository and any company where a depository has invested adopt an Information and Data Sharing Policy covering means and manner of data sharing, types of data that may be shared, an escalation matrix, a digital database recording shared information and recipients with reasons, technological monitoring including periodic audits, and an accountability mechanism fixing individual responsibilities for breaches.
Full Summary is available for active users!
Note: It is a system-generated summary and is for quick reference only.