AX05 Extended ICT Questionnaire
AX05 Extended ICT Questionnaire
1. General
This form, Annex AX05: Extended ICT Questionnaire (‘Annex’), shall be duly filled in by persons
wishing to obtain authorisation from the MFSA to carry out financial services activities. This Annex
shall be submitted as part of and in conjunction with the relevant Authorisation Application Form, as
indicated therein.
This Annex primarily aims to capture relevant information in relation to the Applicant’s Information
and Communications Technology (‘ICT’) infrastructure and arrangements.
In this respect, the Applicant shall to the best of its knowledge, provide information, which is
truthful, accurate and complete. The Applicant shall notify the MFSA immediately if the information
provided changes in any material respect either prior to or subsequent to authorisation.
The Applicant is required to make reference, and where applicable comply with, the relevant Act,
the Regulations made, or Rules issued thereunder during the completion of the Application. The
Applicant shall also refer to the respective National and/or European Regulatory Frameworks or
other binding regulation as may be applicable.
The Applicant shall not tamper with, or modify in any manner, this Annex or its respective
Application. Should it transpire that the documents were tampered with, or modified in any manner,
the Authority shall consider the submission to be invalid. Any potential improvements should be
communicated to the MFSA for consideration.
The Authority may at its sole discretion request from the Applicant further information/
documentation.
2. Definitions
Unless otherwise specified, terms used in this Annex shall have the same meaning assigned to
them within the respective Application.
3. Instructions
In order for this Annex to be considered complete, the Applicant is required to complete all the
respective sections under this Annex. It is noted that the information provided should reflect the
Applicant’s structure and method of operations at time of authorisation.
4. Privacy Notice
The MFSA ensures that any processing of personal data is conducted in accordance with Regulation
(EU) 2016/679 (General Data Protection Regulation), the Data Protection Act (Chapter 586 of the
Laws of Malta) and any other relevant European Union and national law. For further details, you
may refer to the MFSA Privacy Notice available on the MFSA webpage https://www.mfsa.mt/privacy-
notice/.
Registered Name
How will the Applicant ensure that its resources (human, physical capital / financial,
2.1.2 technology) are adequate to support the ICT operational needs and ICT and security risk
management processes?
Enter text
If ‘No’: Explain what measures will be put in place by the Applicant to ensure adequate
2.1.4
oversight of the internal cybersecurity.
Enter text
2.2.1.1 Does the Applicant have, or intend to establish, an ICT function? Select item
If ’Yes’: Provide an overview of the structure of the Applicant's ICT Function, including its
2.2.1.2 resources and respective reporting lines, in line with the proposed volume and value of
business being proposed.
Enter text
2.3.1 Identification
Identification
2.3.1.5 Document (‘ID’) Select item 2.3.1.6 ID Number Enter text
Type
Country of
2.3.1.7 ID Expiry Date Enter date 2.3.1.8 Select country
Issuance
Does the IT Function Holder hold or intend to hold any other positions
2.3.2.1 Select item
within the Applicant?
Enter text
Enter text
What measures will the Applicant put in place to test the integrity of its core software
2.4.3
application before use and after deployment on a continuous basis?
Enter text
2.5.2
Application Programming Interface
Select item
(APIs)
Artificial Intelligence (AI) Select item
Enter text
Other (specify)
(Add multiple as applicable)
2.5.3 Provide details of how these innovative technologies are being utilised
Enter text
What are the technology arrangements (network, systems, applications, ICT security tools
2.5.4
and cloud services) the Applicant will put in place?
Enter text
1
Where applicable, reference is to be made to the definitions falling within scope of the Innovative
Technology Arrangements and Services Act (Chapter 592 of the Laws of Malta) and any Regulations
issued thereunder.
2.5.5 How will the Applicant's technology arrangements interface with customers?
Enter text
Will the Applicant manage its ICT and Security Risks by applying the
2.6.1.2 Select item
three lines of defence or a similar internal control framework?
2.6.1.3 If ‘No’: Outline alternative arrangement(s) the Applicant will put in place
Enter text
Are there any plans to align the information security framework with
2.6.2.1 Select item
any internationally recognised standard/framework?
What measures will the Applicant put in place to ensure that the function responsible for ICT
2.6.2.3
security is segregated from its ICT operations and processes?
Enter text
What measures and/or mechanism will the Applicant put in place to ensure that physical
2.6.2.4
access to ICT systems is controlled and restricted?
Enter text
What measures and/or mechanism will the Applicant put in place to ensure that logical
2.6.2.5
access to ICT systems is controlled and restricted?
Enter text
What encryption techniques will the Applicant adopt to provide data integrity and
2.6.2.6
confidentiality of information?
Enter text
Enter text
What measures will the Applicant put in place to prevent the occurrence of security breaches
2.6.2.8
on ICT systems and services?
Enter text
What measures will the Applicant put in place to protect ICT systems against malware and/or
2.6.2.9
other security threats?
Enter text
What measures will the Applicant put in place to ensure adequate monitoring and response
2.6.2.10
to security events within the established Incident management framework?
Enter text
Enter text
Will the Applicant put in place specific ICT security training and
2.6.2.13 Select item
awareness campaigns/programmes?
Enter text
ii) How will the Applicant prevent unauthorised access to its platform?
Enter text
iii) What measures will the Applicant put in place to ensure users are aware and guided
against security risks linked to its platform?
Enter text
What processes and procedures would be in place in the event that security controls are not
2.6.2.16
compatible with Third-Party Outsourcing Providers, as applicable?
Enter text
Does the Applicant's BCP include identification of the data and ICT
systems backup and restoration procedures, secondary/backup
2.6.4.2 Select item
location, back-up site, access to ICT infrastructure, and the key
software?
Has the Applicant conducted a potential business impact analysis (BIA)
2.6.4.3 in order to assess its exposure to severe business disruptions and to Select item
assess their potential impact on the Applicant's future performance?
2.7 Attachments
Trading Platform
2.8
This Section is only applicable if the Applicant is implementing a Trading Platform / system.
Will the Applicant use a proprietary online trading platform or will this
2.8.1 Select item
be developed in-house or acquired?
Enter text
Will the Applicant's core systems used for trading be developed in-
2.8.3 Select item
house or outsourced?
If ‘Outsourced’: Explain how the Applicant will ensure it has access rights and audit rights to
2.8.4
the core system.
Enter text
What measures will the Applicant put in place to ensure security of transmitted messages
2.8.5
during trading?
Enter text
What measures will the Applicant put in place to ensure effective monitoring of trading data
2.8.6
during trading?
Enter text
What measures will the Applicant put in place to ensure there is an appropriate testing of its
2.8.7
trading algorithms and facilities?
Enter text
What measures will the Applicant put in place to ensure that all employees are provided with
2.8.8
necessary training on the trading platforms to be offered to the clients?
Enter text
What measures will the Applicant put in place to sufficiently deal with peak order and
2.8.9
messages volumes during trading?
Enter text