CHAPTER INON-DISCRIMINATORY ACCESS TO CCPs AND TRADING VENUES
SECTION 2 Non-discriminatory access to trading venues
Article 5Conditions on the denial of access by a trading venue
1.
A trading venue shall assess whether granting access would create any of the risks specified in Articles 6 and 7 and may deny access only if, after making all reasonable efforts to manage its risks, the trading venue concludes that there are significant undue risks that cannot be managed.
2.
If a trading venue denies access, it shall identify which risks specified in Articles 6 and 7 would result from granting access and why those risks cannot be managed.
Article 6Denial of access by a trading venue based on operational risk and complexity
A trading venue may deny an access request on grounds of operational risk and complexity arising from such access only if there is a risk of incompatibility of CCP IT systems and trading venue IT systems, impeding the trading venue to provide for connectivity between those systems.
Article 7Denial of access by a trading venue based on other factors creating significant undue risks
A trading venue may deny an access request on grounds of significant undue risks in any of the following cases:
- (a)threat to the economic viability of the trading venue or its ability to meet minimum capital requirements under Article 47(1)(f) of Directive 2014/65/EU of the European Parliament and of the Council4;
- (b)
incompatibility of trading venue rules and CCP rules that the trading venue cannot remedy in cooperation with the CCP.
Article 8Conditions under which access is deemed to threaten the smooth and orderly functioning of markets or adversely affect systemic risk
In addition to liquidity fragmentation, as defined in Article 2(1)(45) of Regulation (EU) No 600/2014, for the purposes of Articles 35(4)(b) and 36(4)(b) of that Regulation, granting access shall be deemed to threaten the smooth and orderly functioning of the markets, or adversely affect systemic risk, where the competent authority can provide reasons for the denial, including evidence that the risk management procedures of one or both of the parties to the access request are insufficient to prevent the granting of access from creating significant undue risks to third parties, and there is no remedial action that would sufficiently mitigate those risks.