About a-team Marketing Services
The knowledge platform for the financial technology industry
The knowledge platform for the financial technology industry

A-Team Insight Blogs

IHS Markit and Deloitte Partner, Addressing MiFID II Compliance and Re-papering

Subscribe to our newsletter

Building on its launch of the Outreach360 regulatory compliance communication platform last month, information and analytics solutions provider IHS Markit has partnered with Deloitte to make the consultancy’s regulatory advisory expertise available as a managed service on the platform, according to officials of the companies.

The partnership of IHS Markit and Deloitte is offering MiFID II data standardisation, client outreach and counterparty terms of business re-papering services. “The industry is deciding what technology to use and how to resource client outreach staff,” says Darren Thomas, managing director and head of Counterparty Manager at IHS Markit. “Buy-side firms will use the [Outreach360] platform to reach out to their brokers and dealers.”

IHS Markit is working with Deloitte to define MiFID II requirements for their clients and show how compliance measures should be implemented. With Outreach360 as a collaborative platform, Deloitte’s resources, advice and consulting will help users establish and launch regulatory compliance efforts, according to Thomas, so they may “track workflow in progress for compliance before January 3 [MiFID II effective date].”

The combination of Deloitte’s services and IHS Markit’s platform will also support “re-papering,” the updating of business terms of accounts to address new regulations affecting pre- and post-trade transparency, market structure, order routing and classification of clients, according to Thomas. “Re-papering means 30,000 to 60,000 clients have to be reached in the next five to six months,” he says.

Outreach360 is attached to IHS Markit’s Counterparty Manager platform, which has a community of more than 10,000 buy-side firms and corporates, and over 200 banks. “If they’re not members of Counterparty Manager already or members of that financial community, you can still outreach through the platform using an email address and custom branding,” says Thomas. “[The platform] brings people back to a common place and a common way to fill out the requirements, get the terms of business and answer the questions the bank requires of them to continue trading.”

Subscribe to our newsletter

Related content

WEBINAR

Upcoming Webinar: Reviewing the Latency Landscape and the Next Generation of Ultra-Low Latency Infrastructure

Date: 17 September 2026 Time: 10:00am ET / 3:00pm London / 4:00pm CET Duration: 50 minutes Ultra-low latency is no longer the preserve of a handful of proprietary trading firms. As new asset classes electronify, data volumes surge, and regulatory expectations around execution quality and resilience tighten, the performance demands on trading infrastructure are broadening...

BLOG

TRG Screen and S4 Partner to Deliver Integrated Market-Data Procurement and Operations

TRG Screen, provider of market data and subscription cost management technology, has formed a strategic partnership with S4 Market Data that brings together TRG’s operational managed-services platform with S4’s specialist procurement and negotiation expertise. The collaboration is designed to give financial institutions a single, integrated operating model across both the administrative and commercial layers of...

EVENT

RegTech Summit New York

Now in its 9th year, the RegTech Summit in New York will bring together the RegTech ecosystem to explore how the North American capital markets financial industry can leverage technology to drive innovation, cut costs and support regulatory change.

GUIDE

Entity Data Management Handbook – Seventh Edition

Sourcing entity data and ensuring efficient and effective entity data management is a challenge for many financial institutions as volumes of data rise, more regulations require entity data in reporting, and the fight again financial crime is escalated by bad actors using increasingly sophisticated techniques to attack processes and systems. That said, based on best...