As part of its Transparency Services improvement initiative, beginning Monday, May 19, 2025, FINRA will re-platform TRACE Securitized Products to a new Linux-based operating system. FINRA requires client testing participation for this project.Trade Reporting:TRACE clients who utilize FIX for SP trade entry and other transactions should test all FIX Tags to ensure they are properly being processed
There will be a traffic interruption in fileX SFTP service in QAINT environment for duration below. Users can re-establish connection and resume file transfers after the maintenance window.
QA-INT: Every Tuesday from 6 p.m to Wednesday 7 p.m until Oct 19, 2022
Contact FINRA Support Center (800) 321-6273, or by email, if you have any questions.
There will be a traffic interruption in fileX SFTP service for date and time below. Users can re-establish connection and resume file transfers after the maintenance window.
QA-INT on 7/13/2022 from 11 A.M to 5 P.M.
Contact FINRA Support Center (800) 321-6273, or by email, if you have any questions.
These report cards assist NYSE-reporting firms in monitoring compliance with NYSE Rule 123(e) and (f), which requires NYSE-reporting firms—immediately after receiving an order on the floor—to submit the order information to the FESC database before the orders are represented on the floor.
GUIDANCE
Outsourcing
SUGGESTED ROUTING
KEY TOPICS
Legal and Compliance
Operations
Senior Management
Due Diligence
Outsourcing
Supervisory Responsibilities
Third-Party Service Providers
Executive Summary
NASD is aware that members are increasingly contracting with third-party service providers to perform certain activities and functions related to
FINRA File Transfer service, (filetransfer.finra.org), experienced technical issues affecting some users intermittently between 7/8/2019 10 PM and 7/9/2019 7 AM. Some connections were going through fine but others were challenged with a new server Host key. If you have any questions, please contact FINRA Helpdesk.
Summary
FINRA is alerting firms to a recently identified vulnerability in Apache Log4J software, which is an open-source, Java-based logging utility widely used by enterprise applications and cloud services. The “Log4Shell” vulnerability presents risk for member firms because they may be using this software in internal applications, or the software may be embedded in third-party software