Skip to main content

Market Access Rule

Regulatory Obligations

SEA Rule 15c3-5 (Market Access Rule) requires firms with market access or that provide market access to their customers or any other person to appropriately control the risks associated with market access so as not to jeopardize their own financial condition, that of other market participants, the integrity of trading on the securities markets and the stability of the financial system. The Market Access Rule applies generally to securities traded on an exchange or alternative trading system, including equities, equity options, ETFs, debt securities, security-based swaps and security futures products.

Findings and Effective Practices

Findings

  • Insufficient Controls: 
    • Not establishing pre-trade order limits, preset capital thresholds and duplicative and erroneous order controls for accessing ATSs, including those that transact fixed income transactions. 
    • Setting pre-trade order limits at unreasonable thresholds based on a firm’s business model.
    • Not demonstrating and failing to maintain documentation demonstrating the reasonability of assigned capital, credit and erroneous order pre-trade financial controls.
    • Not establishing adequate policies and procedures to govern intra-day changes to firms’ credit and capital thresholds, including requiring or obtaining approval prior to adjusting credit or capital thresholds, or documenting justifications for any adjustments and ensuring thresholds for temporary adjustments to revert back to their pre-adjusted values.
    • Overly relying on multiple, stand-alone risk management control systems, and failing to consider market access controls in the aggregate (e.g., failing to assess excessive messaging across different ports and venues for a given customer). 
  • Failure to Consider Additional Data: Failing to consider a firm’s business model when setting pre-trade order limits or other regulatory requirements (e.g., Limit Up-Limit Down (LULD) thresholds, exchanges’ Limit Order Price Protection thresholds), as well as historical and available liquidity and the time required for liquidity replenishment when determining erroneous price and size control thresholds.
  • Impermissible Exclusions: Excluding certain orders from a firm’s pre-trade erroneous controls based on order types (e.g., excluding limit on close orders from a firm’s price controls).
  • Inadequate Financial Risk Management Controls: For firms with market access, or those that provide it, having unreasonable capital thresholds for trading desks and unreasonable aggregate daily limits or credit limits for institutional customers and counterparties.
  • Reliance on Third-Party Vendors: Relying on third-party vendors’ tools, including those of an ATS or exchange, to apply their financial controls without performing adequate due diligence, not understanding how third-party vendors’ controls operate, or both; and not maintaining direct and exclusive control over controls by allowing the ATS to unilaterally set financial thresholds for firms’ fixed income orders without the involvement of the firm, instead of establishing their own thresholds. 
  • Inadequate Post Trade Surveillance: Failure to conduct post trade reviews for potential manipulation. 
  • Failure to Document Annual Review of Effectiveness: Failure to document the firm’s review, conducted at least annually, of the effectiveness of its risk management controls and supervisory procedures (e.g., no inventory of the specific systems, controls, thresholds or functionality that were reviewed), including the reasonableness of the firm’s market access controls applicable to each business/product line in which the firm provides market access.

Effective Practices

  • Pre-Trade Fixed Income Financial Controls: Implementing systemic pre-trade “hard” blocks to prevent fixed income orders from reaching an ATS that would cause the breach of a threshold.
  • Intra-Day Ad Hoc Adjustments: Implementing processes for requesting, approving, reviewing and documenting ad hoc credit threshold increases and returning limits to their original values as needed.
  • Soft Blocks:
    • Implementing detailed and reasonable WSPs that list the steps that firm personnel should take when determining how to handle orders that trigger soft controls; and requiring staff to document their findings and rationale for releasing an order following a review. 
    • Conducting a separate supervisory review to ensure that release rationales are appropriate; and requiring the incorporation of review results when assessing the effectiveness of the firm’s controls. 
  • Tailored Controls to Prevent Erroneous or Duplicative Orders:
    • Tailoring controls to prevent erroneous or duplicative orders to particular products, situations (e.g., corporate actions), or order types; and preventing the routing of market orders based on impact (e.g., Average Daily Volume Control) that are set at reasonable levels (particularly in thinly traded securities); and calibrating to reflect, among other things, the characteristics of the relevant securities, the business of the firm and market conditions. 
    • Ensuring that controls apply to all order flow and all trading sessions
  • Market Impact: Developing reasonable complementary controls (e.g., a market impact check, a liquidity check, an average daily volume control) based upon the firm’s business model and historical order flow; and using a benchmark when pricing child orders for a larger parent market order (e.g., the National Best Bid and Offer (NBBO) or last sale at the time of the initial child order route) to monitor the cumulative market impact of subsequent child orders over a short period of time.
  • Reference Data: Using a reasonable process for choosing reference data in developing various controls, so if one piece of data is not obtained another could be substituted (e.g., the NBBO versus the last sale or the previous day’s closing price).
  • Post-Trade Controls and Surveillance: When providing direct market access via multiple systems, including sponsored access arrangements, employing reasonable controls to confirm that the systems’ records were aggregated and integrated in a timely manner, and conducting holistic post-trade and supervisory reviews for, among other things, potentially manipulative trading patterns.
  • Testing of Risk Management Controls: Regularly testing market access controls, such as: 
    • performing a review, at least annually, of the business activity of the firm in connection with market access; 
    • maintaining data and documents that evidence the rationale for continued use of implemented controls and parameters;
    • focusing on the parameters for controls and analyzing whether they are reasonable and would prevent the entry of erroneous orders under different scenarios (e.g., the entry of a large order in a thinly-traded or high-priced security) and product types; 
    • determining whether hard blocks are working (e.g., triggered when a parameter is triggered); 
    • determining whether soft blocks are an effective control (e.g., by outlining specific steps for, and appropriately documenting, those reviews); 
    • documenting reviews and retaining information used in decisions to adjust, maintain or create new controls (e.g., change in business lines may result in short period-of-time controls in addition to order-by-order controls);
    • reviewing any automated controls to timely revert ad hoc credit limit adjustments; and 
    • for firms that provide clients sponsored access, verifying ability to retain direct and exclusive control over the pre-trade financial and regulatory requirements.
  • Training: Conducting training for individual traders regarding the steps and requirements for requesting ad hoc credit limit adjustments.

Additional Resources