 |
Minimize the risk of receiving but not identifying material non-public information |
|
|
 |
Monitor ‘wall crossing’ or giving selective access to material non-public information |
|
|
 |
Use pre-trade controls to reduce the risk of market manipulation and insider trading |
|
|
 |
Conduct post trade surveillance with appropriate systems to identify suspicious orders and trades or regulatory rule violations |
|
|
 |
Detect suspicious transactions influencing a benchmark, the price of funds or any derivatives |
|