This commit is contained in:
2025-03-04 17:27:37 -06:00
parent 9a7330b755
commit 78753903ee

View File

@@ -368,217 +368,259 @@ The Company hereby designates the following series as exclusive internal shared
a. **Performance Standards**: Internal service providers must meet or exceed the service level agreements (SLAs) established by the Technology Oversight Committee, which shall:
i. Be documented in writing and incorporated by reference into this Agreement;
i. Be documented in writing and incorporated by reference into this Agreement
ii. Include specific, measurable performance metrics for each service category;
ii. Include specific, measurable performance metrics for each service category
iii. Establish response time requirements for various service priorities;
iii. Establish response time requirements for various service priorities
iv. Define availability requirements for critical systems;
iv. Define availability requirements for critical systems
v. Include remediation timelines for service disruptions;
v. Include remediation timelines for service disruptions
vi. Specify reporting requirements and cadence; and
vi. Specify reporting requirements and cadence
vii. Be reviewed and updated at least annually.
vii. Be reviewed and updated at least annually
viii. Include security standards and compliance requirements
b. **Competitive Pricing**: Internal service providers must offer services at pricing comparable to market rates for equivalent services, as verified by:
i. Annual independent third-party audit;
i. Annual independent third-party audit
ii. Benchmark comparison against at least three comparable external providers;
ii. Benchmark comparison against at least three comparable external providers
iii. Transparent cost-accounting as described in Section 4.6.5; and
iii. Transparent cost-accounting as described in Section 4.6.5
iv. Quarterly pricing reviews by the Audit and Finance Committee.
iv. Quarterly pricing reviews by the Audit and Finance Committee
2. **Enforcement Mechanism**: The Company Committee shall be responsible for enforcing the mandatory use requirement and shall:
a. Conduct quarterly compliance reviews;
a. Conduct quarterly compliance reviews
b. Promptly investigate any reported violations;
b. Promptly investigate any reported violations
c. Issue formal findings within 30 days of any compliance investigation; and
c. Issue formal findings within 30 days of any compliance investigation
d. Recommend appropriate remedial actions to the Board.
d. Recommend appropriate remedial actions to the Board
3. **Service Provider Dispute Resolution**: Disputes between service providers and series regarding service delivery shall be resolved through:
a. Initial attempt at resolution between operational leaders of the service provider and series
b. If unresolved within 15 days, escalation to the Technology Oversight Committee
c. Formal mediation process as outlined in Schedule H if not resolved within 30 days
d. Final binding decision by the Company Committee if mediation is unsuccessful
#### 3.1.3 - Service Provider Failure Remedies
1. **Failure Determination**: An internal service provider shall be deemed to have failed if it:
a. Fails to meet established performance standards for two consecutive quarters as documented by the Technology Oversight Committee;
a. Fails to meet established performance standards for two consecutive quarters as documented by the Technology Oversight Committee
b. Experiences a catastrophic service disruption lasting more than:
i. 48 hours for non-critical services;
i. 48 hours for non-critical services
ii. 24 hours for important services; or
ii. 24 hours for important services
iii. 4 hours for mission-critical services as designated in the applicable SLA;
iii. 4 hours for mission-critical services as designated in the applicable SLA
c. Commits a material breach of its SLA obligations that remains uncured for 30 days after written notice; or
c. Commits a material breach of its SLA obligations that remains uncured for 30 days after written notice
d. Receives substantiated service quality complaints from more than 50% of its series customers within any six-month period.
d. Receives substantiated service quality complaints from more than 50% of its series customers within any six-month period
e. Experiences a material security or data breach that compromises sensitive information or critical infrastructure
2. **Remedies for Service Provider Failure**: Upon determination of a service provider failure, the following remedies shall be available:
a. **Initial Remediation Period**: The service provider shall be granted a 60-day remediation period to:
i. Correct performance deficiencies;
i. Correct performance deficiencies
ii. Restore service levels to required standards;
ii. Restore service levels to required standards
iii. Submit a detailed improvement plan to the Technology Oversight Committee; and
iii. Submit a detailed improvement plan to the Technology Oversight Committee
iv. Implement enhanced monitoring and reporting.
iv. Implement enhanced monitoring and reporting
b. **Enhanced Oversight**: During the remediation period, the service provider shall be subject to:
i. Weekly performance reviews by the Technology Oversight Committee;
i. Weekly performance reviews by the Technology Oversight Committee
ii. Implementation of additional controls and monitoring;
ii. Implementation of additional controls and monitoring
iii. Potential leadership changes as recommended by the Board; and
iii. Potential leadership changes as recommended by the Board
iv. Requirement to provide daily status reports to affected series.
iv. Requirement to provide daily status reports to affected series
c. **Failure to Remediate**: If the service provider fails to remediate within the 60-day period, the Technology Oversight Committee may:
i. Grant a single 30-day extension if substantial progress is evident;
i. Grant a single 30-day extension if substantial progress is evident
ii. Implement a service provider replacement plan;
ii. Implement a service provider replacement plan
iii. Authorize temporary external service providers for affected services; or
iii. Authorize temporary external service providers for affected services
iv. Recommend restructuring of the service provider to the Board.
iv. Recommend restructuring of the service provider to the Board
d. **Extreme Failure**: In cases of extreme failure involving critical systems, the Board may:
i. Immediately authorize use of external service providers;
i. Immediately authorize use of external service providers
ii. Remove and replace service provider leadership;
ii. Remove and replace service provider leadership
iii. Implement emergency continuity plans; and
iii. Implement emergency continuity plans
iv. Take any other actions necessary to protect the TSYS Group.
iv. Take any other actions necessary to protect the TSYS Group
#### 3.1.4 - Innovation Exception Process
1. **Exception Basis**: A series may request an exception to the mandatory use requirement only on the grounds of:
a. Specialized technical requirements that cannot be met by the internal service provider;
a. Specialized technical requirements that cannot be met by the internal service provider
b. Demonstrable competitive advantage requiring specialized external solutions;
b. Demonstrable competitive advantage requiring specialized external solutions
c. Regulatory or compliance requirements that necessitate specialized external providers; or
c. Regulatory or compliance requirements that necessitate specialized external providers
d. Client or customer contractual requirements that mandate specific external solutions.
d. Client or customer contractual requirements that mandate specific external solutions
e. Significant cost savings (exceeding 30%) that can be achieved through an external provider while maintaining equivalent security and quality standards
2. **Exception Request Process**:
a. Requests must be submitted in writing to the Technology Oversight Committee;
a. Requests must be submitted in writing to the Technology Oversight Committee
b. Requests must include:
i. Detailed description of the required service;
i. Detailed description of the required service
ii. Documentation of business necessity;
ii. Documentation of business necessity
iii. Analysis of competitive advantage;
iii. Analysis of competitive advantage
iv. Proposed external provider information including due diligence materials;
iv. Proposed external provider information including due diligence materials
v. Security and compliance assessment;
v. Security and compliance assessment
vi. Data integration and protection plan;
vi. Data integration and protection plan
vii. Implementation timeline; and
vii. Implementation timeline
viii. Cost-benefit analysis comparing the external solution to internal alternatives.
viii. Cost-benefit analysis comparing the external solution to internal alternatives
c. The Technology Oversight Committee must respond within 45 days for standard requests and within 15 days for requests designated as time-sensitive with appropriate justification.
c. The Technology Oversight Committee must respond within 45 days for standard requests and within 15 days for requests designated as time-sensitive with appropriate justification
d. The Technology Oversight Committee must provide written justification for any denial.
d. The Technology Oversight Committee must provide written justification for any denial
e. Appeals of denied exception requests may be made to the Company Committee within 15 days of denial
3. **Exception Implementation**:
a. If approved, the exception shall:
i. Be documented in the electronic records system;
i. Be documented in the electronic records system
ii. Include specific scope and duration limitations;
ii. Include specific scope and duration limitations
iii. Require quarterly reviews and renewal evaluation;
iii. Require quarterly reviews and renewal evaluation
iv. Include a transition plan for eventual migration to internal services if feasible; and
iv. Include a transition plan for eventual migration to internal services if feasible
v. Include compliance monitoring to ensure continued adherence to security and integration requirements.
v. Include compliance monitoring to ensure continued adherence to security and integration requirements
b. The Technology Oversight Committee shall maintain a registry of all approved exceptions and provide quarterly reports to the Board.
b. The Technology Oversight Committee shall maintain a registry of all approved exceptions and provide quarterly reports to the Board
#### 3.1.5 - Service Division Operations
1. **Operational Requirements**: Each service division shall:
a. Operate as a cost center pursuant to Section 4.6.5;
a. Operate as a cost center pursuant to Section 4.6.5
b. Maintain transparent cost accounting with quarterly reporting to all series;
b. Maintain transparent cost accounting with quarterly reporting to all series
c. Be subject to Board oversight through appropriate committees;
c. Be subject to Board oversight through appropriate committees
d. Select and manage external vendors as needed following procurement guidelines established by the Board;
d. Select and manage external vendors as needed following procurement guidelines established by the Board
e. Develop and maintain appropriate service standards and SLAs;
e. Develop and maintain appropriate service standards and SLAs
f. Conduct annual customer satisfaction surveys among series;
f. Conduct annual customer satisfaction surveys among series
g. Implement continuous improvement processes with measurable objectives;
g. Implement continuous improvement processes with measurable objectives
h. Maintain appropriate cybersecurity and compliance certifications;
h. Maintain appropriate cybersecurity and compliance certifications
i. Establish disaster recovery and business continuity plans;
i. Establish disaster recovery and business continuity plans
j. Conduct quarterly technology and service reviews; and
j. Conduct quarterly technology and service reviews
k. Provide monthly service performance metrics to all series.
k. Provide monthly service performance metrics to all series
l. Undergo annual security audits by qualified third-party firms
m. Maintain compliance with all relevant industry standards and regulations
n. Provide regular training to personnel on security and operational best practices
2. **Board Oversight Responsibilities**: The Board of Directors, through its committees, shall establish and oversee:
a. Performance metrics and reporting requirements;
a. Performance metrics and reporting requirements
b. Service level frameworks;
b. Service level frameworks
c. Cost allocation methodologies;
c. Cost allocation methodologies
d. Technology and service strategies;
d. Technology and service strategies
e. Vendor selection criteria;
e. Vendor selection criteria
f. Quality control measures;
f. Quality control measures
g. Dispute resolution procedures for service conflicts;
g. Dispute resolution procedures for service conflicts
h. Compliance standards and monitoring;
h. Compliance standards and monitoring
i. Cybersecurity requirements and testing; and
i. Cybersecurity requirements and testing
j. Other operational parameters as needed.
j. Other operational parameters as needed
3. **Service Roadmap Requirements**: Each service provider shall:
a. Maintain a three-year service development roadmap;
a. Maintain a three-year service development roadmap
b. Conduct quarterly roadmap reviews with all series;
b. Conduct quarterly roadmap reviews with all series
c. Incorporate series feedback into roadmap updates;
c. Incorporate series feedback into roadmap updates
d. Align roadmap priorities with overall TSYS Group strategic objectives;
d. Align roadmap priorities with overall TSYS Group strategic objectives
e. Include specific technology innovation initiatives;
e. Include specific technology innovation initiatives
f. Establish clear timelines for major service enhancements; and
f. Establish clear timelines for major service enhancements
g. Document resource allocation for strategic initiatives.
g. Document resource allocation for strategic initiatives
h. Include contingency planning for emerging technologies and market shifts
i. Identify potential security and regulatory challenges
4. **User Experience and Feedback System**: Each service provider shall:
a. Implement a structured feedback system accessible to all series
b. Conduct quarterly user experience reviews
c. Maintain a transparent issue tracking system
d. Report on issue resolution metrics monthly
e. Incorporate user feedback into service improvements
f. Establish a user advisory group with representation from different series
### Section 3.2 - Electronic Records Requirement
@@ -588,256 +630,359 @@ All records of the Company and its series shall be maintained exclusively in ele
1. **Corporate Records**:
a. Articles of organization and amendments;
* Articles of organization and amendments
b. Operating agreements (Company and series);
* Operating agreements (Company and series)
c. Board and committee meeting minutes and resolutions;
* Board and committee meeting minutes and resolutions
d. Series establishment documentation;
* Series establishment documentation
e. Regulatory filings and correspondence;
* Regulatory filings and correspondence
f. Annual reports and compliance documents;
* Annual reports and compliance documents
g. Consents and certifications; and
* Consents and certifications
h. Governance policies and procedures.
* Governance policies and procedures
2. **Financial Documentation**:
a. Financial statements and reports;
* Financial statements and reports
b. Tax returns and supporting documents;
* Tax returns and supporting documents
c. Bank statements and reconciliations;
* Bank statements and reconciliations
d. Audit reports and working papers;
* Audit reports and working papers
e. Budget and forecasting documents;
* Budget and forecasting documents
f. Expense documentation and approvals;
* Expense documentation and approvals
g. Investment records and valuations; and
* Investment records and valuations
h. Capital transactions and funding documentation.
* Capital transactions and funding documentation
3. **Member Information**:
a. Series membership records;
* Series membership records
b. Ownership transfer documentation;
* Ownership transfer documentation
c. Member contact information;
* Member contact information
d. Voting records and proxies;
* Voting records and proxies
e. Distribution documentation;
* Distribution documentation
f. Membership interest certificates;
* Membership interest certificates
g. Accredited investor verification materials; and
* Accredited investor verification materials
h. Member communications and notices.
* Member communications and notices
4. **Contracts and Agreements**:
a. Service provider agreements;
* Service provider agreements
b. Vendor contracts;
* Vendor contracts
c. Client agreements;
* Client agreements
d. Employment and contractor agreements;
* Employment and contractor agreements
e. Non-disclosure and confidentiality agreements;
* Non-disclosure and confidentiality agreements
f. License and permit documentation;
* License and permit documentation
g. Insurance policies and claims; and
* Insurance policies and claims
h. Settlement agreements and releases.
* Settlement agreements and releases
5. **Operational Records**:
a. Business plans and strategic documents;
* Business plans and strategic documents
b. Marketing materials and communications;
* Marketing materials and communications
c. Intellectual property documentation;
* Intellectual property documentation
d. Regulatory compliance records;
* Regulatory compliance records
e. Standard operating procedures;
* Standard operating procedures
f. Risk assessments and mitigation plans;
* Risk assessments and mitigation plans
g. Service level agreements and performance reports; and
* Service level agreements and performance reports
h. Incident reports and resolution documentation.
* Incident reports and resolution documentation
6. **Legal and Compliance Records**:
* Litigation documents and correspondence
* Regulatory inquiries and responses
* Compliance certifications and attestations
* Legal opinions and memoranda
* Compliance monitoring reports
* Investigation documentation
* Whistleblower reports and resolutions
* Regulatory examination materials
#### 3.2.2 - Electronic Record System Requirements
1. **System Architecture Requirements**:
a. Cloud-based primary storage with geographic redundancy across at least three separate regions;
* Cloud-based primary storage with geographic redundancy across at least three separate regions
b. Real-time backup and disaster recovery systems with recovery time objective of less than four hours and recovery point objective of less than 15 minutes;
* Real-time backup and disaster recovery systems with recovery time objective of less than four hours and recovery point objective of less than 15 minutes
c. Multi-factor authentication access controls for all users;
* Multi-factor authentication access controls for all users
d. Minimum AES-256 encryption at rest and TLS 1.3 encryption in transit;
* Minimum AES-256 encryption at rest and TLS 1.3 encryption in transit
e. Comprehensive API integration capabilities for authorized systems;
* Comprehensive API integration capabilities for authorized systems
f. Automated compliance monitoring and reporting;
* Automated compliance monitoring and reporting
g. System availability of at least 99.9% measured monthly; and
* System availability of at least 99.9% measured monthly
h. Automated system health monitoring with real-time alerts for anomalies.
* Automated system health monitoring with real-time alerts for anomalies
* Data segregation mechanisms to ensure series isolation at the data level
* Zero-trust security architecture with least privilege access controls
2. **Audit Trail Requirements**:
a. Immutable version control with blockchain verification;
* Immutable version control with blockchain verification
b. Comprehensive change logging with user identification;
* Comprehensive change logging with user identification
c. Cryptographically secured time and date stamping;
* Cryptographically secured time and date stamping
d. Complete document access history retention;
* Complete document access history retention
e. Detailed modification tracking with before/after comparisons;
* Detailed modification tracking with before/after comparisons
f. User activity logs retained for a minimum of seven years;
* User activity logs retained for a minimum of seven years
g. Tamper-evident logging mechanisms; and
* Tamper-evident logging mechanisms
h. Regular audit trail verification procedures.
* Regular audit trail verification procedures
* Separation of audit trail storage from primary document storage
* Real-time anomaly detection for suspicious activity
3. **Access Control Requirements**:
a. Role-based access management with principle of least privilege;
* Role-based access management with principle of least privilege
b. Granular permission settings at the document and field level;
* Granular permission settings at the document and field level
c. Secure user authentication with biometric options;
* Secure user authentication with biometric options
d. Automatic session monitoring and timeout after 15 minutes of inactivity;
* Automatic session monitoring and timeout after 15 minutes of inactivity
e. Comprehensive remote access protocols with enhanced security;
* Comprehensive remote access protocols with enhanced security
f. Quarterly access rights review and certification;
* Quarterly access rights review and certification
g. Privileged access management with enhanced monitoring; and
* Privileged access management with enhanced monitoring
h. Separation of duties for critical functions.
* Separation of duties for critical functions
* Emergency access protocols with required post-access reviews
* Continuous monitoring of access patterns to detect anomalies
4. **Retention and Archiving Requirements**:
a. Automated retention scheduling based on document type;
* Automated retention scheduling based on document type
b. Secure archiving protocols with integrity verification;
* Secure archiving protocols with integrity verification
c. Legal hold implementation capabilities;
* Legal hold implementation capabilities
d. Defensible destruction procedures with verification;
* Defensible destruction procedures with verification
e. Archive access controls with separate authentication;
* Archive access controls with separate authentication
f. Retention periods compliant with all applicable regulations;
* Retention periods compliant with all applicable regulations
g. Annual retention policy reviews; and
* Annual retention policy reviews
h. Secure backup archives maintained in geographically separate locations.
* Secure backup archives maintained in geographically separate locations
* Immutable storage for critical records to prevent tampering
* Regular retrieval testing to ensure archive accessibility
5. **Data Privacy Requirements**:
* Compliance with all applicable data privacy laws and regulations
* Data minimization and purpose limitation controls
* Data subject access request management capabilities
* Consent tracking and management
* Privacy impact assessment documentation
* Cross-border data transfer compliance mechanisms
* Data classification and handling procedures
* Privacy by design implementation in system architecture
#### 3.2.3 - Compliance and Security Standards
1. **Required Compliance Standards**: The electronic records system shall comply with:
a. SOC 2 Type II standards;
* SOC 2 Type II standards
b. ISO 27001 Information Security standards;
* ISO 27001 Information Security standards
c. NIST Cybersecurity Framework;
* NIST Cybersecurity Framework
d. GDPR and other applicable privacy regulations;
* GDPR and other applicable privacy regulations
e. HIPAA requirements for any protected health information;
* HIPAA requirements for any protected health information
f. Applicable industry-specific regulations; and
* Applicable industry-specific regulations
g. All federal, state, and local records retention requirements.
* All federal, state, and local records retention requirements
* PCI-DSS compliance for payment card data if applicable
* CCPA and similar state privacy laws
* Records management standards (ISO 15489)
2. **Security Protocols**:
a. Quarterly vulnerability assessments;
* Quarterly vulnerability assessments
b. Annual penetration testing by independent third parties;
* Annual penetration testing by independent third parties
c. Continuous security monitoring;
* Continuous security monitoring
d. Incident response plan with testing;
* Incident response plan with testing
e. Employee security awareness training;
* Employee security awareness training
f. Data loss prevention controls;
* Data loss prevention controls
g. Endpoint security management; and
* Endpoint security management
h. Zero-trust network architecture implementation.
* Zero-trust network architecture implementation
* Advanced threat protection measures
* Regular phishing and social engineering testing
* Secure development practices for system enhancements
* Supply chain security assessment for third-party components
3. **System Administration**:
a. Centralized administration by Known Element Enterprises;
* Centralized administration by Known Element Enterprises
b. Documentation of all system configurations;
* Documentation of all system configurations
c. Change management processes for system modifications;
* Change management processes for system modifications
d. Segregation of duties for administrative functions;
* Segregation of duties for administrative functions
e. Backup administrator credentials securely stored with the Company Committee;
* Backup administrator credentials securely stored with the Company Committee
f. Automated system health monitoring; and
* Automated system health monitoring
g. Capacity planning and performance optimization protocols.
* Capacity planning and performance optimization protocols
* Regular administrator access reviews and rotations
* Privileged access monitoring and logging
* Regular security training for system administrators
#### 3.2.4 - Implementation and Verification
1. **System Implementation Timeline**:
a. Full implementation of all electronic record requirements within 90 days of the Effective Date;
* Full implementation of all electronic record requirements within 90 days of the Effective Date
b. Phased migration approach with priority for critical documents;
* Phased migration approach with priority for critical documents
c. Verification and testing of all system components before full deployment; and
* Verification and testing of all system components before full deployment
d. Post-implementation review within 30 days of completion.
* Post-implementation review within 30 days of completion
* Remediation plan for any identified deficiencies with 15-day completion requirement
2. **Compliance Verification**:
a. Quarterly system compliance audits;
* Quarterly system compliance audits
b. Annual third-party security assessments;
* Annual third-party security assessments
c. Bi-annual disaster recovery testing;
* Bi-annual disaster recovery testing
d. Monthly backup verification procedures; and
* Monthly backup verification procedures
e. Continuous monitoring of compliance with regulatory requirements.
* Continuous monitoring of compliance with regulatory requirements
* Regular penetration testing by qualified security professionals
* Independent verification of encryption implementation
* Periodic testing of access controls and segregation
3. **Documentation Requirements**:
a. Comprehensive system documentation maintained and updated;
* Comprehensive system documentation maintained and updated
b. User manuals and training materials for all series members;
* User manuals and training materials for all series members
c. Recovery procedures clearly documented and tested; and
* Recovery procedures clearly documented and tested
d. Compliance certifications maintained and renewed as required.
* Compliance certifications maintained and renewed as required
* Security incident response procedures
* Business continuity plans
* System architecture diagrams
* Data flow maps
4. **Operational Resilience**:
* Regular business impact analysis to identify critical functions
* Multiple redundancy layers for critical systems
* Periodic failover testing to secondary systems
* Distributed denial of service (DDoS) attack mitigation measures
* Alternative access methods for emergency situations
* Incident response simulations at least twice annually
* Cross-training of key personnel for system recovery procedures
* Vendor dependency assessment and alternative provider identification
### Section 3.3 - Mandatory Capital Raising Requirements
#### 3.3.1 - Exclusive Capital Channel