Compliance

Thank you. A representative will be with you shortly.
or call us+44 (0)20 3384 2158

Inside Intermedia’s Worry-Free Experience™

Regulatory compliance

Intermedia security and privacy controls address a wide range of financial services regulations. The tables below describe how Intermedia services can help you address these regulations.

Intermedia Successfully Completes Urgent Email Migration for ABC Stores

Famous in the Hawaiian Islands and other locations across the Pacific, ABC Stores brings shopping convenience with a touch of the islands. With friendly store people, great service and a large selection of items, ABC makes it easy to get the essential items you need, including groceries, gifts, souv

Read the full case study

FINRA Regulations
Relevant section/topic Compliance Requirements How We Can Help
Books and records (Rule 3110) Correspondence must be maintained in compliance with applicable FINRA rules and Securities Exchange Act of 1934 Rules 17a-3 & 17a-4.
Also specifies supervisory procedures for the review of correspondence between individual representatives and the public.
  • Secure, low-cost & long-term storage.
  • The storage platform supports and indexes relevant data types and formats.
  • Role-based permissions for accessing archive.
SEC Regulations
Relevant section/topic Compliance Requirements How We Can Help
Rule 17a-4 & NASD 3010 Most members of a national securities exchange, as well as brokers and dealers, must keep current a variety of books and records that relate to their business.
  • 24/7 offline data access and search with role-based permissions for accessing archive.
Rule 17a-4 & NASD 3010 Securities dealers must implement specific, enforceable retention procedures, which include the following:
  • Messages must be stored in duplicate.
  • Data must be verified automatically for quality and accuracy.
  • Messages must be date/time-stamped and serialized.
  • A searchable index of all data must be maintained.
  • Messages and indexes must be easily retrievable.
  • Stored data is backed up and stored on fully redundant platform with 99.999% uptime SLA.
  • Full-text indexing and search capability.
  • All stored files and corresponding file activity are time-stamped, and auditable via Audit Log and Admin File Management.
  • Configurable retention policies.
Investment Advisers Act of 1940 Hedge fund managers with assets in excess of $100M have to register with the SEC under the Investment Advisers Act of 1940, which includes provisions for securing electronic communication, including email and instant messages (same requirements as SEC 17a-4).
  • Archive and index of all relevant file types.
  • Secure, permission-based sharing.
  • Data is encrypted in transit and at rest.
  • Versioning and full audit trail of all sharing and file management activity.
Rule 31a-2 of the Investment Company Act of 1940 and Rule 204-2 of the Investment Advisers Act of 1940 Funds and advisers can maintain all of their records in an electronic format as long as procedures are put in place to protect records from “loss, alteration, or destruction”; that access to these records is limited to certain parties; and that “any reproduction of a nonelectronic original record on electronic storage media is complete, true, and legible.”
  • Resilient storage platform with 99.999% uptime SLA.
  • Role-based permissions for accessing archive.
  • File access is logged and auditable.
Rule 31a-2 of the Investment Company Act of 1940 and Rule 204-2 of the Investment Advisers Act of 1940 Funds and advisers can maintain all of their records in an electronic format as long as procedures are put in place to protect records from “loss, alteration, or destruction”; that access to these records is limited to certain parties; and that “any reproduction of a nonelectronic original record on electronic storage media is complete, true, and legible.”
  • Resilient storage platform with 99.999% uptime SLA.
  • Role-based permissions for accessing archive.
  • File access is logged and auditable.
Rule 17a-4 Records, including email messages, must be preserved at least 6 years, the first 2 in “an easily accessible place”.
  • Configurable retention and data loss prevention policies enable file retention for 6 years or longer.
  • All files are easily accessible 24/7/365.
NASD Regulations
Relevant section/topic Compliance Requirements How We Can Help
Rule 2860 (b)(17) Members shall maintain and keep current a separate central log, index or other file for all options-related complaints, through which these complaints can easily be identified and retrieved. Background and financial information of customers shall be maintained at specific locations, including the principal supervisory office (or elsewhere, as long as the documents are “readily accessible and promptly retrievable”)
  • Full-text indexing & search.
  • Archived data access from any web browser, desktop, and mobile device.
GRAMM-LEACH-BLILEY ACT Regulations
Relevant section/topic Compliance Requirements How We Can Help
The Financial Privacy Rule Financial institutions must provide each consumer with a privacy notice, explaining where the info is shared, how it is used and how it is protected, at the time the consumer relationship is established and annually thereafter.
  • World-class datacenter infrastructure with annual SOC 2 audits.
  • AES-256 bit encryption.
The Safeguards Rule Financial institutions must design, implement, and maintain an information security plan to protect customer information; it also applies to credit reporting agencies, appraisers and mortgage brokers receiving info from financial institutions.
  • Data encryption in transit and at rest (AES- 256 bit).
  • Complies with PCI-DSS standards.
  • Data encrypted at all times (in transit & at rest).
  • 100% file capture and backup.
Miscellaneous Statutes
Relevant section/topic Compliance Requirements How We Can Help
Consumer Finance Protection Bureau Compliance with GLBA required for RESPA-TILA forms to protect NPI (Non-public Personal Information) by Real Estate Settlement Services- ALTA Best Practices Pillar #3..
  • Supports GLBA with NPI-based email encryption and data encrypted at all times (in transit & at rest).
Federal Deposit Insurance Corporation Provides guidance on security and management of Instant Messaging. Social Media communications need to be supervised, reviewed, and retained.
  • Archive and index over 500 different file types in a central repository.
USA Patriot Act Requires records retention for suspicious communications associated with money transfer and laundering.
  • Files are backed up, indexed, and searchable.
  • Full audit trail of all sharing and file management activity.
SB 1386 (only in California) Requires any agency, person, or business conducting business in California to disclose unauthorized access to unencrypted personal information.
  • Encrypts data at all times (in transit & at rest).
  • Encrypted data is not subject to disclosure requirements in the event of a breach.
  • Data loss prevention features such as external sharing policies & remote device wipe.
SARBANES-OXLEY Regulations
Relevant section/topic Compliance Requirements How We Can Help
Protection of Security Technology Make security-related technology resistant to tampering, and do not disclose security documentation unnecessarily.
  • Data encryption in transit and at rest (AES- 256 bit).
  • Secure key storage and distribution.
  • Role-based permissions for accessing archive
Cryptographic Key Management Determine that policies and procedures are in place to ensure the protection of cryptographic keys against modification and unauthorized disclosure.
  • Data encryption in transit and at rest (AES- 256 bit).
  • Annual SOC 2 audits.
  • Independent, company-wide audit of all 5 SOC 2 Trust Service Principles (security, availability, processing integrity, confidentiality and privacy).
Exchange of Sensitive Data Exchange sensitive transaction data only over a trusted path or medium with controls to provide authenticity of content, proof of submission, proof of receipt, and non-repudiation of origin.
  • Standards-based technologies such as Public Key Infrastructure (PKI), S/MIME and X.509 certificates are used to establish confidentiality, message integrity and user authentication.
Security Requirements for Data Management Define and implement policies and procedures to identify and apply security requirements applicable to the receipt, processing, storage and output of data to meet business objectives, organizational security policy, and regulatory requirements.
  • Annual SOC 2 audits.
  • Independent, company-wide audit of all 5 SOC 2 Trust Service Principles (security, availability, processing integrity, confidentiality and privacy).
This summary does not purport to list, nor should it be interpreted as stating that Intermedia addresses, all legal requirements related to data storage and retention. Compliance with FINRA, SEC and other applicable laws is complex and multi-faceted and is ultimately the responsibility of each entity that is subject to those laws.

Let’s get started