The leading knowledge platform for the financial technology industry
The leading knowledge platform for the financial technology industry

A-Team Insight Blogs

SEC Announces Agenda and Panellists for Roundtable on Money Market Funds and Systemic Risk

The Securities and Exchange Commission today announced the panellists and final agenda for the Money Market Funds and Systemic Risk Roundtable to be held 10 May.

The roundtable will address the potential for money market funds to pose a systemic risk to broader financial markets – what makes money market funds vulnerable to runs and how should the role of money market funds be viewed through the prism of systemic risk analysis. Possible options for further regulatory reform and their implications, including floating NAV, bank regulation, and options that reflect a hybrid of these regulatory approaches: a private liquidity bank; mandatory reserve or capital requirements; and liquidity fees.

The agenda and list of panellists can be found on the SEC website.

The roundtable discussion will begin at 2 p.m. and be available by webcast on the SEC website. The webcast also will be archived for later viewing. Public seating to view the webcast will be available in the auditorium at the SEC’s headquarters at 100 F Street NE in Washington, DC.

Members of the public who wish to provide their views on the matters to be considered at the roundtable discussion may submit comments to the comment file for the President’s Working Group Report on Money Market Fund Reform, as noted below. Comments to the Commission may be submitted by any of the following methods:

Use the SEC’s Internet comment form or send an e-mail to rule-comments@sec.gov and include File Number 4-619 on the subject line; or

Use the Federal eRulemaking portal (www.regulations.gov). Follow the instructions for submitting comments.

Send paper comments in triplicate to Elizabeth Murphy, Secretary, Securities and Exchange Commission, 100 F Street NE, Washington, D.C. 20549-1090.

All submissions should refer to File Number 4-619. To help process and review your submissions more efficiently, please use only one method. The Commission will post all public comments on the SEC website. Please note that all comments received will be posted without change. The Commission does not edit personal identifying information from submissions. Submit only information desired to be made available publicly.

Related content

WEBINAR

Recorded Webinar: Adverse media screening – how to cut exposure to criminal activity, from money laundering to human trafficking

Screening for adverse media coverage of counterparties presents an incredible opportunity for financial institutions to limit risk exposures and identify bad actors early. It is required by regulations such as the EU’s sixth Anti-Money Laundering Directive (AML 6), and is one of the most effective ways to steer clear of potential connections with sanctioned activity...

BLOG

SteelEye Targets Buy Side with Three-Tiered Surveillance Suite

SteelEye has launched a three-tier suite of communications compliance capabilities aimed at addressing the regulatory obligations of any size of financial institution. SteelEye is hoping this flexibility of approach makes its record-keeping and surveillance platform more appealing to smaller buy-side players that often lack the budget or resource capability to implement extensive platform solutions. SteelEye’s...

EVENT

RegTech Summit Virtual

The RegTech Summit Virtual is a global online event that brings together an exceptional guest speaker line up of RegTech practitioners, regulators, start-ups and solution providers to collaborate and discuss innovative and effective approaches for building a better regulatory environment.

GUIDE

Entity Data Management Handbook – Seventh Edition

Sourcing entity data and ensuring efficient and effective entity data management is a challenge for many financial institutions as volumes of data rise, more regulations require entity data in reporting, and the fight again financial crime is escalated by bad actors using increasingly sophisticated techniques to attack processes and systems. That said, based on best...