CFTC Pushes Forward with Reg AT, Source Code Provision as Giancarlo Dissents
Commissioner J. Christopher Giancarlo issued a scathing rebuke of the proposal's source code provision.
You might not expect English common law, the US Bill of Rights, and Ben Franklin to be evoked in a discussion about algorithmic trading, but that's where CFTC commissioner J. Christopher Giancarlo's argument against Regulation AT ended up.
In a 2–1 vote—with Giancarlo voting no, and chairman Timothy Massad and commissioner Sharon Bowen voting in favor—the CFTC approved the "Supplemental Notice of Proposed Rulemaking—Regulation Automated Trading." The body will now publish the Supplemental Notice in the Federal Register, which will be followed by a 60-day period for people to submit comment letters. From there, the CFTC staff will read those letters, incorporate any new thoughts/ideas/changes into the rule, and send it to the commissioners as a "Final Rule." It's unknown, at this point, how long the whole process will take before a final vote is taken.
The proposed new rule, designated as regulation 1.84, which would supplement regulation 1.31, more clearly articulates that staff's access to source code is limited to subpoena or special call. Execution of a special call must be authorized by the Commission itself and execution would be limited to the director of the Division of Market Oversight (DMO). The new proposal also stipulates that an AT person—the definition of which the commission also addressed during the meeting—keep records of the log files of those using the code. Absent a subpoena, access to the log files will also be limited to special call. Firms must maintain both source codes and log files for five years.
Constitutional Issue?
The CFTC's procedural burden for acquiring a firm's source code would remain essentially the same as it is today. Where Giancarlo objected, though, was the potential stripping of a firm's Fourth Amendment rights.
"Under this proposal, while it may remain the same procedurally for the CFTC, we take away the procedural rights of the property owner. They have no choice—if this rule is passed—but to hand over their source code and basically shut up. How is that fair?" J. Christopher Giancarlo, CFTC
As it stands today, a firm is protected by the Fourth Amendment against unreasonable searches and seizures of their property without a subpoena. The process itself allows firms to go to a judge and seek to have the request limited in scope, in duration or have other controls put in place around the data being turned over. These new proposals, Giancarlo contended, would remove those rights.
"Under this proposal, while it may remain the same procedurally for the CFTC, we take away the procedural rights of the property owner. They have no choice—if this rule is passed—but to hand over their source code and basically shut up. How is that fair?" Giancarlo asked. "Any public good achieved by the rule is, in my mind, undone by this provision that proprietary source code used in trading algorithms be accessible at anytime, anywhere, to the CFTC and the Justice Department without a subpoena."
The special call provision, which is designed to gain additional information about a firm's traders and/or about a participant's trading and delivery activity, including information on persons who control or have a financial interest in the account, allows the CFTC's enforcement division to circumvent having to acquire a subpoena to look at the source code.
"Utilizing DMO's special call procedures to seize source code provides [a way of avoiding] the subpoena process; there's nothing in the supplemental notice that I can see to limit DMO's sharing of gathered source code with the staff of the division of enforcement," Giancarlo said. "The proposal would allow enforcement to view source code without having—as they do today—to get a subpoena."
Security Concerns
Giancarlo also worried about security issues. The rule cross-references existing confidentiality requirements and does not create any new rules around security.
Giancarlo asked why they wouldn't create new provisions that would stipulate that the CFTC has to immediately give back the code or destroy it—rather than leave it on the CFTC's premises—after use, or only view the code at the firm's offices. He also questioned why they didn't build protections around who has access to the code or ensure that the code is only used on an air-gap computer that's not connected to the internet.
While algorithmic technology has become exponentially more sophisticated, Giancarlo was concerned that this proposal doesn't incorporate new thought in protecting these new technologies. He then proceeded to tick off several instances of hacks and information leakages at the Office of the Comptroller of the Currency (OCC), the Federal Deposit Insurance Corporation (FDIC) and the CFTC itself.
"Absent specific measures, I have to say it's absurd to suggest that source code will be kept secure," he said. "The CFTC itself has an imperfect record as a guardian of confidential proprietary information. If this rule proposal goes forward, it will make itself a target for a broader group of cyber criminals, including those engaged in cyber espionage."
For his closing salvo, he called these proposals a "reckless step onto a slippery slope."
In Favor
Still, the measure passed. Massad said that without Reg AT's source code provision, algorithmic traders would have less oversight than those who trade using email and voice.
Today, if there is suspicious activity in the market, the DMO calls up the trading participant and—without needing a vote by the Commission—gets an idea of what their position in the market is and what their intentions are.
But Massad believes that right now the CFTC is giving off the appearance that since the strategy isn't in emails, phone calls or other "old-world" formats, the CFTC isn't allowed to easily get its hands on that information for surveillance purposes (rather than enforcement, which has always required a subpoena).
"If you trade in our markets under the old-world ways, you're subject to surveillance; if you trade in our markets under the new-world ways of algos, that's a violation of the Constitution," he said. "We're not changing our process; we're updating our rules for the fact that the way trading is conducted has changed."
Only users who have a paid subscription or are part of a corporate subscription are able to print or copy content.
To access these options, along with all other subscription benefits, please contact info@waterstechnology.com or view our subscription options here: http://subscriptions.waterstechnology.com/subscribe
You are currently unable to print this content. Please contact info@waterstechnology.com to find out more.
You are currently unable to copy this content. Please contact info@waterstechnology.com to find out more.
Copyright Infopro Digital Limited. All rights reserved.
As outlined in our terms and conditions, https://www.infopro-digital.com/terms-and-conditions/subscriptions/ (point 2.4), printing is limited to a single copy.
If you would like to purchase additional rights please email info@waterstechnology.com
Copyright Infopro Digital Limited. All rights reserved.
You may share this content using our article tools. As outlined in our terms and conditions, https://www.infopro-digital.com/terms-and-conditions/subscriptions/ (clause 2.4), an Authorised User may only make one copy of the materials for their own personal use. You must also comply with the restrictions in clause 2.5.
If you would like to purchase additional rights please email info@waterstechnology.com
More on Regulation
Off-channel messaging (and regulators) still a massive headache for banks
Waters Wrap: Anthony wonders why US regulators are waging a war using fines, while European regulators have chosen a less draconian path.
Banks fret over vendor contracts as Dora deadline looms
Thousands of vendor contracts will need repapering to comply with EU’s new digital resilience rules
Chevron’s absence leaves questions for elusive AI regulation in US
The US Supreme Court’s decision to overturn the Chevron deference presents unique considerations for potential AI rules.
Aussie asset managers struggle to meet ‘bank-like’ collateral, margin obligations
New margin and collateral requirements imposed by UMR and its regulator, Apra, are forcing buy-side firms to find tools to help.
The costly sanctions risks hiding in your supply chain
In an age of geopolitical instability and rising fines, financial firms need to dig deep into the securities they invest in and the issuing company’s network of suppliers and associates.
Industry associations say ECB cloud guidelines clash with EU’s Dora
Responses from industry participants on the European Central Bank’s guidelines are expected in the coming weeks.
Regulators recommend Figi over Cusip, Isin for reporting in FDTA proposal
Another contentious battle in the world of identifiers pits the Figi against Cusip and the Isin, with regulators including the Fed, the SEC, and the CFTC so far backing the Figi.
US Supreme Court clips SEC’s wings with recent rulings
The Supreme Court made a host of decisions at the start of July that spell trouble for regulators—including the SEC.