Managing insider lists is critical to compliance with the Market Abuse Regulation (MAR). This post will provide an understanding of insider list management and best practices and why your organisation should begin shifting from a manual to an automatic insider list management system.
1. Introduction to MAR and Insider List Management
The Market Abuse Regulation (MAR) is a European Union regulation aimed at preventing market abuse, such as insider trading and market manipulation. One of the key requirements of MAR is the management of insider lists, which are records of individuals who have access to inside information related to a company’s financial instruments.
Insider list management is crucial for ensuring compliance with MAR, as it helps companies track and control the flow of inside information, preventing unauthorised access and potential market abuse. Failure to maintain accurate and up-to-date insider lists can result in significant penalties and reputational damage for companies.
2. Key Components of an Effective Insider List Management Process
An effective insider list management process under MAR should include the following components:
- Identification of insiders: Companies should have a clear process for identifying individuals with access to inside information, including employees, consultants, and external advisors.
- Creation and maintenance of insider lists: Companies should create and maintain insider lists that include all relevant information about insiders, such as their names, contact details, and the date they gained access to inside information.
- Access control: Companies should implement access controls to ensure that only authorised individuals can access inside information and insider lists.
- Training and awareness: Companies should provide regular training and raise awareness among employees and other insiders about their obligations under MAR and the importance of maintaining the confidentiality of inside information.
- Monitoring and review: Companies should regularly monitor and review their insider list management processes to ensure compliance with MAR and identify any areas for improvement.
3. Best Practices for Insider List Management ≠ Excel
Many companies must follow MAR and use Excel (or equivalent) to manage insider lists. While manual processes like Excel might seem convenient and cost-effective, they are not optimal and far from best practices when managing insider lists in compliance with MAR.
Managing insider information’s complexities and potential consequences necessitate a more robust, secure, and reliable solution. Manual methods like spreadsheets can be prone to human error and lack the necessary controls to effectively manage access to sensitive information.
Some best practices for insider list management include:
- Establish a retention procedure: Establish a retention procedure for insider lists, ensuring that they are retained for at least five years, as MAR requires. Storing spreadsheets securely for such a long period poses challenges, including the risk of data loss and managing access over time.
- Establish clear policies and procedures: Develop and implement clear policies and procedures for insider list management, including guidelines for identifying insiders, creating and maintaining insider lists, and controlling access to inside information.
- Assign responsibility: Assign responsibility for insider list management to a specific individual or team within the company, such as the compliance officer or legal department. Responsibility assignment can be challenging with Excel, as tracking who made changes and when is difficult.
- Use a centralised system: Use a centralised system for managing insider lists that offers a single, unified interface where all information can be viewed, edited, and updated to ensure consistency and ease of access. This is a significant improvement over locally stored files.
- Conduct regular audits: Conduct audits of insider lists to ensure accuracy and compliance with MAR. Manual audits with Excel can be cumbersome and inefficient, making the process lengthy and prone to oversight.
- Maintain separate lists: Maintain separate insider lists for different types of inside information, such as financial results, mergers and acquisitions, or other significant events. Managing multiple separate lists can be complex with Excel, leading to risks of mixing or losing data.
- Automatic UTC Converting (Available in Logwise service): When reporting to your NCA (National Competent Authority), you must submit all timestamps in UTC. UTC simplifies NCA’s work by providing a common time reference. With Excel, manual time zone adjustments can be cumbersome and error-prone.
4. Leveraging Technology for Insider List Management
Technology can be crucial in streamlining and automating the insider list management process. Companies can leverage technology solutions, such as Logwise, to automate the creation and maintenance of insider lists and ensure compliance with MAR.
By adopting technology solutions, companies can save time and resources, reduce the risk of human error, and ensure a more efficient and compliant insider list management process.
5. Conclusion
Insider list management is critical to compliance with the Market Abuse Regulation (MAR). By following best practices and leveraging technology, companies can effectively manage insider lists and ensure compliance with MAR. Implementing a robust insider list management process helps companies avoid significant penalties and reputational damage and contributes to the overall integrity and transparency of financial markets.
FSMA vs Nyrstar: what the ruling means for delayed disclosure and insider lists
European market-abuse enforcement does not happen in isolation. Although MAR applies directly in every EU member state, day-to-day expectations are shaped by how regulators interpret and apply it in real cases. Court […]
FSMA vs Nyrstar: what the ruling means for delayed disclosure and insider lists
European market-abuse enforcement does not happen in isolation. Although MAR applies directly in every EU member state, day-to-day expectations are shaped by how regulators interpret and apply it in real cases. Court […]
The Essential Guide to Writing and Enforcing a Code of Conduct
Every successful organisation needs a strong code of conduct to set the tone for ethical behaviour and guide employees in their daily decisions. A well-crafted code of conduct isn’t just a document […]
Code of Conduct vs. Code of Ethics: What’s the Difference and Why It Matters
When organisations embark on creating policies for ethical conduct, two terms often emerge: code of conduct and code of ethics. These phrases are sometimes used interchangeably, which can cause confusion. In this […]
Conflict of Interest Explained: Types, Policies, and Real Examples
Learn how to identify and manage conflicts of interest using effective policies and compliance tools to prevent risk and ensure accountability.
