Pegasus Market Abuse |
product descriptionApplication complying to regulation 2003/6/CE for notification on "suspicious" transactions with regards to Market Abuse (insider trading, intents of manipulation of Market price's levels). Pegasus Market Abuse offers information tools, based on preset parameters, of assistance in transactions evaluation; the identification of the single suspicious transaction, and its correct evaluation in the context of an illicit "strategy" (of manipulation or of insider trading) is however left to the organizational autonomy of the intermediaries
parameters definition for the analysis of suspicious transactionsSuspicious transactions identification is performed with the help of a series of parametric indicators. The control grids provided for are:
The grids of control are stored over time since, upon request from agencies of control, the analysis criteria utilized in a given period have to be documented.
specific data baseAnalysis procedures are supported by a specific data base in which grids of control, hystorical series of financial instruments, portfolios assets, synthesis indicators associated to single financial instruments , number of movements, rotation index, intermediate volumes, frequency of operations, ratio between orders passed and order executed , are stored. Criteria and "depth" used to store these informations can be parametrically defined.
|
  |
first level controlsAnalysis are performed on a daily basis and in accordance to the investment service provided. Particularly, following categories are identified:
Procedures of suspicious transactions' analysis are clearly subdivided into two different areas:
First level controls use a series of analysis functions (video and reporting) which allows the operator to evaluate the "suspicious" transactions automatically pulled by the system. All details relating to "objective" indicators that led the system to report a specific transaction, are also provided. Hystorical informations are kept so that over time, it will be possible to "objectively" document all criteria used in suspicious transactions retrieval. The operator can utilize a set of graphic analysis intruments that allow a quicker evaluation of the situation of "contour" on a certain suspicious transaction. Once evaluated, it will be up to the operator to eventually recommend second level controls on suspicious operations.
second level controlsThe manager in charge of second level controls can make use of the same details available on the first level control, can view the reports of the operator who performed first level controls and can assess the reasons that led the operation to second level controls. The manager, at this point, can enter his own comments regarding each single suspicious operation and decide whether or not to proceed with its notification to the department of competence. suspicious transactions notificationThis procedure will transmit notifications of suspicious transactions to the board of competence simultaneously creating hystorical records of alll detailed informations on reported operations. |