pre-trade-compliance

Compare original and translation side by side

🇺🇸

Original

English
🇨🇳

Translation

Chinese

Pre-Trade Compliance

交易前合规

Purpose

用途

Guide the design and implementation of automated pre-trade compliance systems that validate orders against regulatory rules, firm policies, and client-specific restrictions before execution. Covers compliance rule engines, restricted and watch lists, concentration limits, position limits, hard and soft block configurations, regulatory constraints, and compliance override workflows. Enables building systems that prevent compliance violations while minimizing false blocks that impede legitimate trading.
指导自动化交易前合规系统的设计与实现,这类系统会在订单执行前对照监管规则、公司政策和客户特定限制对订单进行验证。覆盖合规规则引擎、受限与观察名单、集中度限制、持仓限制、软硬拦截配置、监管约束以及合规豁免工作流,支持构建既能防范合规违规,又能最大程度减少阻碍合法交易的误拦截的系统。

Layer

层级

11 — Trading Operations (Order Lifecycle & Execution)
11 — 交易运营(订单生命周期与执行)

Direction

方向

prospective
前瞻性

When to Use

适用场景

  • Designing a pre-trade compliance rule engine for an RIA, broker-dealer, or multi-custodian advisory firm
  • Configuring hard blocks and soft blocks for different categories of compliance violations
  • Building or maintaining restricted and watch lists, including MNPI-driven restrictions and personal trading lists
  • Setting concentration limits at the security, sector, asset class, or issuer level across accounts or households
  • Implementing position limits, notional exposure caps, or short selling controls
  • Enforcing regulatory rules such as wash sale detection, free-riding prevention, or pattern day trader identification
  • Applying client-specific investment restrictions including ESG screens, legal constraints, and frozen account handling
  • Designing compliance override workflows with proper authorization, documentation, and escalation
  • Adding, modifying, or backtesting compliance rules and tuning false positive rates
  • Evaluating the latency impact of compliance checks on order routing and execution speed
  • 为RIA、经纪自营商或多托管顾问公司设计交易前合规规则引擎
  • 为不同类别的合规违规配置硬拦截和软拦截
  • 构建或维护受限名单和观察名单,包括基于MNPI的限制和个人交易名单
  • 在账户或家庭组层面,为证券、行业、资产类别或发行人设置集中度限制
  • 实施持仓限制、名义敞口上限或卖空管控
  • 执行监管规则,如洗售检测、搭便车防范或典型日内交易者识别
  • 应用客户特定投资限制,包括ESG筛选、法律约束和冻结账户处理
  • 设计具备适当授权、文档留存和上报流程的合规豁免工作流
  • 新增、修改或回测合规规则,调整误报率
  • 评估合规检查对订单路由和执行速度的延迟影响

Core Concepts

核心概念

Pre-Trade Compliance Architecture

交易前合规架构

The pre-trade compliance system intercepts orders after generation by the portfolio management system or order entry interface and before routing to custodians or execution venues. The system evaluates each order against a set of rules and either permits the order to proceed, blocks it entirely (hard block), or flags it for review (soft block).
Rule engine design — sequential vs. parallel evaluation:
  • Sequential evaluation: Rules are evaluated in a defined order, and processing stops at the first failure. This approach is efficient when early rules are likely to catch the majority of violations (e.g., checking whether the account is frozen before evaluating concentration limits). Sequential evaluation reduces latency for orders that fail early but provides incomplete diagnostic information — the trader sees only the first violation, not all violations.
  • Parallel evaluation: All rules are evaluated simultaneously, and the system returns the complete set of results. This approach provides comprehensive diagnostic output — the trader sees every rule that the order violates in a single pass. Parallel evaluation is preferred for advisory workflows where orders are reviewed before submission and the compliance team benefits from seeing the full picture. The tradeoff is higher computational cost per order, though for typical advisory order volumes this is negligible.
  • Hybrid approach: Critical rules (account status, restricted list) are evaluated first as a fast-fail gate. If the order passes these, the remaining rules are evaluated in parallel. This balances latency with diagnostic completeness.
Order interception points:
  • Pre-routing: The compliance check occurs before the order is transmitted to the custodian or execution venue. This is the primary interception point and catches violations before any market interaction. The order exists only within the firm's systems at this stage.
  • Pre-execution: For firms with direct market access or algorithmic execution capabilities, a second compliance check may occur after routing but before the order is released for execution. This catches issues that arise from market conditions between routing and execution (e.g., a rapidly changing position that now breaches a limit).
  • Post-aggregation, pre-routing: For block trades, compliance checks should be applied both at the individual account level (does this account violate its concentration limit?) and at the aggregate block level (does the total block size exceed the security's average daily volume threshold?).
Hard blocks vs. soft blocks:
  • Hard blocks prevent the order from proceeding under any circumstances without first resolving the underlying condition. The order cannot be overridden — it must be modified, canceled, or the blocking condition must be removed (e.g., removing a security from the restricted list, unfreezing an account). Hard blocks are reserved for regulatory requirements and firm policies where no exception is permissible: restricted list violations, trading in frozen or suspended accounts, exceeding regulatory position limits, and trading in securities subject to a legal hold.
  • Soft blocks generate a warning that requires acknowledgment and documented justification before the order can proceed. Soft blocks are appropriate for guidelines where professional judgment may justify an exception: internal concentration guidelines (as opposed to regulatory limits), watch list matches, minor deviations from model allocation, and trades that trigger an advisory alert (e.g., approaching but not exceeding a limit). Every soft block override must be logged with the identity of the authorizer, the timestamp, and the stated justification.
Compliance check latency requirements:
Pre-trade compliance checks must complete within a timeframe that does not materially impair execution quality. For equity and ETF orders where market prices are moving, compliance latency directly affects execution price risk. Target latency benchmarks: single-order compliance check should complete in under 100 milliseconds for real-time trading workflows; batch compliance checks for model-driven trades (hundreds or thousands of orders) should complete within seconds, not minutes. Rule engines that require real-time database lookups (e.g., checking a restricted list stored in an external system) must use caching strategies to meet latency targets. Caching strategies include: loading restricted lists and concentration thresholds into memory at system startup with incremental refresh on change events, pre-computing portfolio metrics (sector weights, issuer exposures) and updating them incrementally as positions change rather than recalculating from scratch for each compliance check, and maintaining in-memory snapshots of account-level compliance state that are updated after each trade rather than queried from the database on every check.
Rule priority and ordering:
Rules should be organized by priority to ensure that the most critical checks are evaluated first and that rule interactions are handled correctly. A typical priority ordering is: (1) account status checks (frozen, suspended, closed), (2) restricted list screening, (3) regulatory position limits, (4) regulatory compliance rules (wash sale, free-riding), (5) client-specific restrictions, (6) firm-level concentration limits, (7) model and guideline compliance. When multiple rules fire on the same order, the most restrictive outcome governs — a hard block from any rule overrides soft blocks from other rules.
交易前合规系统会在投资组合管理系统或订单录入界面生成订单之后、订单被路由到托管方或执行场所之前拦截订单。系统会对照一系列规则评估每笔订单,要么允许订单继续执行,要么完全拦截(硬拦截),要么标记订单待审核(软拦截)。
规则引擎设计 — 顺序评估 vs 并行评估:
  • 顺序评估: 规则按既定顺序评估,遇到第一个不通过的规则就停止处理。当靠前的规则能够拦截绝大多数违规时,这种方法效率很高(例如先检查账户是否冻结,再评估集中度限制)。顺序评估能降低早期就失败的订单的处理延迟,但只能提供不完整的诊断信息——交易员只能看到第一个违规项,无法看到所有违规。
  • 并行评估: 所有规则同时评估,系统会返回完整的结果集。这种方法能提供全面的诊断输出——交易员可以一次性看到订单违反的所有规则。对于订单提交前需要审核、合规团队需要了解全局情况的顾问工作流,优先选择并行评估。其缺点是每笔订单的计算成本更高,不过对于典型的顾问订单体量来说,这一点可以忽略不计。
  • 混合方案: 关键规则(账户状态、受限名单)首先作为快速失败关卡进行评估。如果订单通过这些检查,剩余规则再并行评估。这种方案平衡了延迟和诊断完整性。
订单拦截点:
  • 路由前: 合规检查在订单传输到托管方或执行场所之前完成。这是主要拦截点,能在订单进入市场前拦截违规。此时订单仅存在于公司内部系统中。
  • 执行前: 对于拥有直接市场准入或算法执行能力的公司,可能会在路由之后、订单提交执行之前进行第二次合规检查。这能拦截路由到执行期间因市场变化产生的问题(例如快速变化的持仓现在突破了限制)。
  • 聚合后、路由前: 对于大宗交易,需要同时在单个账户层面(该账户是否违反集中度限制?)和总大宗交易层面(总大宗交易规模是否超过该证券的日均成交量阈值?)进行合规检查。
硬拦截 vs 软拦截:
  • 硬拦截 会在底层问题解决前,阻止订单在任何情况下继续执行。订单无法被豁免——必须修改、取消订单,或者解除拦截条件(例如将证券从受限名单中移除、解冻账户)。硬拦截仅用于不允许有任何例外的监管要求和公司政策:受限名单违规、冻结或暂停账户交易、超出监管持仓限制、交易受法律保全的证券。
  • 软拦截 会生成警告,需要确认并留存书面理由后订单才能继续执行。软拦截适用于专业判断可以支持例外的指引:内部集中度指引(区别于监管限制)、观察名单匹配、模型配置的微小偏差、触发顾问警报的交易(例如接近但未超过限制)。每一次软拦截豁免都必须记录授权人身份、时间戳和声明的理由。
合规检查延迟要求:
交易前合规检查必须在不会实质性损害执行质量的时间范围内完成。对于市场价格不断波动的股票和ETF订单,合规延迟会直接影响执行价格风险。目标延迟基准:实时交易工作流的单笔订单合规检查应在100毫秒内完成;模型驱动交易的批量合规检查(数百或数千笔订单)应在数秒而非数分钟内完成。需要实时数据库查询的规则引擎(例如查询存储在外部系统的受限名单)必须使用缓存策略来满足延迟目标。缓存策略包括:系统启动时将受限名单和集中度阈值加载到内存,变更事件触发增量刷新;预先计算投资组合指标(行业权重、发行人敞口),持仓变化时增量更新,而不是每次合规检查都从头计算;维护账户级合规状态的内存快照,每笔交易后更新,而不是每次检查都查询数据库。
规则优先级和排序:
规则应按优先级组织,确保最关键的检查最先执行,规则交互得到正确处理。典型的优先级排序是:(1) 账户状态检查(冻结、暂停、关闭),(2) 受限名单筛查,(3) 监管持仓限制,(4) 监管合规规则(洗售、搭便车),(5) 客户特定限制,(6) 公司层面集中度限制,(7) 模型和指引合规。当同一订单触发多个规则时,以最严格的结果为准——任何规则的硬拦截都会覆盖其他规则的软拦截。

Restricted and Watch Lists

受限与观察名单

Restricted and watch lists are central compliance tools that control trading in securities where the firm or its personnel have conflicts, information advantages, or regulatory obligations.
Firm restricted list (MNPI-driven):
The firm restricted list contains securities in which the firm or its affiliates possess material non-public information (MNPI). For broker-dealers with investment banking affiliates, the restricted list is populated when the firm is engaged in an advisory assignment (M&A, underwriting, restructuring) involving a public company. Trading in restricted list securities is prohibited across all firm accounts — proprietary, advisory, and personal. The restricted list is maintained by the compliance department, typically with input from the legal department and information barriers (Chinese walls) group. Additions and removals are time-sensitive: a security must be added before MNPI is disseminated within the firm and may only be removed after the information becomes public or the engagement terminates.
Personal trading restricted list:
Access persons — employees with access to non-public information about client trades, portfolio holdings, or investment recommendations — are subject to personal trading restrictions. The personal trading restricted list may include securities that the firm is actively trading for clients (to prevent front-running), securities under active research coverage, and IPO and limited offering securities (which require pre-clearance under SEC Rule 204A-1). Personal trading restrictions operate independently of the firm restricted list and may be more or less restrictive depending on the employee's role.
Client-specific restricted securities:
Individual client accounts may have their own restricted securities lists arising from legal constraints (insider status in a company, divorce decree prohibiting sale of certain holdings), contractual obligations (lock-up agreements), or client preferences (client instructs the firm not to purchase securities of a specific company). These restrictions are maintained at the account level and checked during pre-trade compliance for that specific account.
Issuer restriction propagation (parent/subsidiary):
When a security is added to the restricted list, the restriction must propagate to related securities. If the parent company is restricted, all subsidiaries, affiliates, and related entities should also be restricted. This requires maintaining an issuer hierarchy that maps corporate relationships. The propagation should cover: common stock, preferred stock, convertible securities, options, warrants, debt securities, and any other instruments issued by or linked to the restricted issuer. Failure to propagate restrictions across the corporate family is a common compliance gap that regulators specifically test for.
Watch list vs. restricted list (different actions):
The watch list contains securities that are under heightened surveillance but not subject to an outright trading prohibition. Watch list securities may be traded, but trades generate alerts for compliance review. The watch list is used when the firm has reason to monitor trading in a security but the information or situation does not rise to the level requiring a full restriction — for example, when the firm is in early-stage discussions about a potential engagement, when rumors are circulating about a company the firm covers, or when an employee has reported a potential conflict. Watch list matches produce soft blocks; restricted list matches produce hard blocks.
Gray list (additional surveillance tier):
Some firms maintain a gray list in addition to the restricted and watch lists. The gray list is used for securities where the firm may soon receive MNPI but has not yet — for example, when an investment banking pitch is in progress but no engagement letter has been signed. Gray list securities are not restricted from trading, but all trades are flagged for post-trade review by the compliance surveillance team. The gray list provides an early warning mechanism and helps establish that the firm had surveillance procedures in place before MNPI was received, which can be important in defending against insider trading allegations.
List maintenance and updates:
Restricted and watch lists must be updated promptly as circumstances change. Stale lists create two risks: (1) securities that should be restricted are not, exposing the firm to insider trading liability, and (2) securities that should have been removed remain restricted, unnecessarily blocking legitimate trading. Best practices include: real-time or daily list updates, automated feeds from deal management systems (for investment banking-driven restrictions), regular review cycles to confirm that all entries remain valid, and audit trails documenting every addition, removal, and modification with the reason and authorizing person.
受限和观察名单是核心合规工具,用于管控公司或其员工存在利益冲突、信息优势或负有监管义务的证券的交易。
公司受限名单(MNPI驱动):
公司受限名单包含公司或其关联方持有重大非公开信息(MNPI)的证券。对于拥有投资银行关联方的经纪自营商,当公司参与涉及上市公司的顾问业务(并购、承销、重组)时,会将该证券加入受限名单。所有公司账户——自营、顾问和个人账户——都禁止交易受限名单上的证券。受限名单由合规部门维护,通常会有法务部门和信息屏障(中国墙)团队的参与。新增和移除具有时间敏感性:必须在MNPI在公司内部传播前将证券加入名单,只有在信息公开或业务终止后才能移除。
个人交易受限名单:
接触人员——能够获取客户交易、投资组合持仓或投资建议等非公开信息的员工——需遵守个人交易限制。个人交易受限名单可能包括公司正在为客户交易的证券(防止抢先交易)、处于活跃研究覆盖的证券、IPO和有限发售证券(根据SEC Rule 204A-1要求需要预先审批)。个人交易限制独立于公司受限名单,根据员工角色的不同,限制可能更严格或更宽松。
客户特定受限证券:
单个客户账户可能有自己的受限证券名单,来源于法律约束(公司内部人士身份、禁止出售特定持仓的离婚判决)、合同义务(锁仓协议)或客户偏好(客户指示公司不得购买特定公司的证券)。这些限制在账户层面维护,在该特定账户的交易前合规检查中进行校验。
发行人限制传导(母公司/子公司):
当证券被加入受限名单时,限制必须传导到关联证券。如果母公司被限制,所有子公司、关联方和相关实体也应被限制。这需要维护映射企业关系的发行人层级结构。传导应覆盖:普通股、优先股、可转换证券、期权、认股权证、债务证券,以及受限发行人发行或关联的任何其他工具。未能在企业家族内传导限制是监管机构专门检查的常见合规漏洞。
观察名单 vs 受限名单(不同处置措施):
观察名单包含受到高度监控但未被完全禁止交易的证券。观察名单上的证券可以交易,但交易生成警报供合规审核。当公司有理由监控某只证券的交易,但相关信息或情况尚未达到需要完全限制的程度时,使用观察名单——例如公司正处于潜在业务的早期讨论阶段、公司覆盖的公司有谣言流传、或员工报告了潜在冲突。观察名单匹配触发软拦截;受限名单匹配触发硬拦截。
灰名单(额外监控层级):
部分公司除了受限和观察名单外,还维护灰名单。灰名单用于公司可能很快收到MNPI但尚未收到的证券——例如投资银行推介正在进行中,但尚未签署业务协议。灰名单上的证券不限制交易,但所有交易都会被标记,供合规监控团队进行交易后审查。灰名单提供了预警机制,有助于证明公司在收到MNPI之前已经建立了监控程序,这在抗辩内幕交易指控时非常重要。
名单维护与更新:
受限和观察名单必须随情况变化及时更新。过期的名单会带来两个风险:(1) 应该被限制的证券没有被限制,使公司面临内幕交易责任;(2) 应该被移除的证券仍然被限制,不必要地拦截合法交易。最佳实践包括:实时或每日名单更新、交易管理系统的自动推送(针对投资银行驱动的限制)、定期审查周期确认所有条目仍然有效、以及审计跟踪记录每一次新增、移除和修改的原因和授权人。

Concentration Limits

集中度限制

Concentration limits prevent excessive exposure to a single security, issuer, sector, or asset class. These limits serve both risk management and regulatory compliance purposes.
Security-level concentration:
The most common concentration limit restricts the maximum percentage of a portfolio that may be invested in a single security. Typical thresholds range from 5% to 10% of account value for a single equity position. The compliance system must calculate the post-trade position value (current holding plus the proposed order) as a percentage of the account's total value and compare it against the limit. For buy orders, the check is straightforward: will this purchase cause the position to exceed X% of the portfolio? For sell orders in other securities, the check must consider whether the sale changes the denominator (total portfolio value) such that remaining positions now exceed their concentration limits.
Sector and industry limits:
Sector limits restrict aggregate exposure to a single GICS sector (e.g., no more than 25% in Technology) or industry (e.g., no more than 10% in Semiconductors). Implementing sector limits requires mapping every security in the portfolio to its sector and industry classification, which in turn requires a reliable security master database with current classification data. Sector limit checks must aggregate all positions within the sector, including the proposed trade, and compare the total against the limit.
Asset class limits:
Asset class limits restrict exposure across broad categories: equities, fixed income, alternatives, cash. These limits typically derive from the investment policy statement (IPS) and are expressed as ranges (e.g., equity 40-70%, fixed income 20-50%, alternatives 0-15%, cash 1-5%). The pre-trade compliance check verifies that the proposed trade does not push any asset class allocation outside its permitted range.
Issuer limits:
Issuer limits restrict total exposure to a single issuer across all security types. A client may hold common stock, corporate bonds, and convertible notes from the same issuer — the issuer limit aggregates all of these exposures. This is particularly important for credit risk management: if an issuer defaults, all securities are affected regardless of type.
Regulatory limits (registered funds):
The Investment Company Act of 1940 imposes specific diversification requirements on registered investment companies (mutual funds). A diversified fund must meet the 75-5-10 test: at least 75% of the fund's assets must be diversified such that no more than 5% of total assets is invested in any single issuer and no more than 10% of an issuer's outstanding voting securities is held. The remaining 25% of assets is not subject to these limits. These are hard regulatory limits that produce hard blocks.
Aggregation across accounts and households:
Some concentration limits apply not just to individual accounts but across related accounts — a household, a family group, or all accounts managed by the same strategy. Household-level concentration limits require the compliance system to aggregate holdings across all accounts in the household before evaluating the limit. This prevents a situation where each individual account is within limits but the household's total exposure to a single security or sector is excessive. Aggregation adds complexity because accounts may be held at different custodians, in different account types (taxable, IRA, trust), and with different investment policies.
集中度限制防止对单一证券、发行人、行业或资产类别的过度敞口。这些限制同时服务于风险管理和监管合规目的。
证券层面集中度:
最常见的集中度限制是限制投资组合中投资于单一证券的最高比例。单只股票持仓的典型阈值为账户价值的5%到10%。合规系统必须计算交易后持仓价值(当前持仓加上拟议订单)占账户总价值的比例,并与限制进行比较。对于买单,检查很直接:这笔购买是否会导致持仓超过投资组合的X%?对于其他证券的卖单,检查必须考虑出售是否会改变分母(总投资组合价值),导致剩余持仓现在超过其集中度限制。
行业与产业限制:
行业限制限制对单一GICS行业(例如科技行业占比不超过25%)或产业(例如半导体行业占比不超过10%)的总敞口。实施行业限制需要将投资组合中的每只证券映射到其行业和产业分类,这反过来需要拥有最新分类数据的可靠证券主数据库。行业限制检查必须汇总行业内的所有持仓(包括拟议交易),并将总额与限制进行比较。
资产类别限制:
资产类别限制限制大类的敞口:股票、固定收益、另类资产、现金。这些限制通常来源于投资政策声明(IPS),以区间形式表示(例如股票40-70%、固定收益20-50%、另类资产0-15%、现金1-5%)。交易前合规检查验证拟议交易不会将任何资产类别的配置推到允许区间之外。
发行人限制:
发行人限制限制对单一发行人所有证券类型的总敞口。客户可能持有同一发行人的普通股、公司债券和可转换票据——发行人限制会汇总所有这些敞口。这对于信用风险管理尤为重要:如果发行人违约,所有证券都会受到影响,无论类型如何。
监管限制(注册基金):
《1940年投资公司法》对注册投资公司(共同基金)施加了特定的多元化要求。多元化基金必须满足75-5-10测试:至少75%的基金资产必须多元化,使得对单一发行人的投资不超过总资产的5%,且持有发行人流通有表决权证券的比例不超过10%。剩余25%的资产不受这些限制。这些是硬性监管限制,会触发硬拦截。
跨账户和家庭组聚合:
部分集中度限制不仅适用于单个账户,还适用于关联账户——家庭组、家族群体、或同一策略管理的所有账户。家庭组层面的集中度限制要求合规系统在评估限制前,汇总家庭组内所有账户的持仓。这避免了单个账户都在限制范围内,但家庭组对单一证券或行业的总敞口过高的情况。聚合增加了复杂性,因为账户可能存管在不同的托管方、属于不同的账户类型(应税账户、IRA、信托)、且有不同的投资政策。

Position and Exposure Limits

持仓与敞口限制

Position and exposure limits control the absolute size and risk exposure of positions, complementing the percentage-based concentration limits.
Maximum position size:
Absolute limits on the number of shares or notional value of a position in a single security. These limits may be set at the account level, strategy level, or firm level. Firm-level position limits prevent the firm's aggregate holdings in a single security from becoming large enough to trigger regulatory reporting thresholds (e.g., Schedule 13D/13G filing requirements at 5% of outstanding shares) or to create market impact and liquidity concerns.
Notional exposure limits:
For derivatives and leveraged instruments, notional exposure limits cap the total economic exposure regardless of the cash outlay. A portfolio with $1 million in assets that holds $5 million in notional futures exposure has 5x leverage. Notional exposure limits are essential for strategies that use derivatives, as a small cash investment can create disproportionate market exposure. The compliance system must calculate notional exposure by multiplying the number of contracts by the contract multiplier and the underlying price.
Options position limits (exchange-imposed):
Securities exchanges impose position limits on listed options that cap the number of contracts on the same side of the market (all calls and short puts, or all puts and short calls) that any person or group of persons acting in concert may hold or write. Position limits vary by underlying security based on trading volume and float. The OCC (Options Clearing Corporation) publishes current position limits. Exceeding exchange-imposed position limits results in regulatory action and potential forced liquidation.
Short selling restrictions:
Regulation SHO governs short selling in the United States and imposes several pre-trade requirements:
  • Locate requirement: Before executing a short sale, the broker-dealer must have reasonable grounds to believe that the security can be borrowed and delivered by the settlement date. This locate must be documented before the short sale order is submitted.
  • Hard-to-borrow lists: Securities for which borrows are difficult to obtain are maintained on hard-to-borrow lists. Short sales in these securities may require pre-borrows (actually borrowing the shares before executing the sale) rather than locates.
  • Threshold securities: Securities with significant fails to deliver are placed on the threshold security list. Additional close-out requirements apply to short positions in threshold securities.
  • Alternative uptick rule (Rule 201): When a security's price declines by 10% or more from the prior day's close, short sale price restrictions are triggered for the remainder of the day and the following day. Short sales may only be executed at a price above the current national best bid.
Leverage limits:
For margin accounts, Regulation T sets initial margin requirements (generally 50% for equity securities), and FINRA Rule 4210 sets maintenance margin requirements (generally 25% for long positions, 30% for short positions). The pre-trade compliance system must verify that the proposed trade does not cause the account to exceed its margin capacity or fall below maintenance requirements. For portfolio margin accounts, the calculation is more complex and uses a risk-based methodology.
持仓与敞口限制控制持仓的绝对规模和风险敞口,是基于比例的集中度限制的补充。
最大持仓规模:
对单一证券持仓的股数或名义价值的绝对限制。这些限制可以在账户层面、策略层面或公司层面设置。公司层面的持仓限制防止公司在单一证券的总持仓过高,触发监管报告阈值(例如持有流通股5%时需要提交Schedule 13D/13G),或造成市场影响和流动性问题。
名义敞口限制:
对于衍生品和杠杆工具,名义敞口限制限制总经济敞口,无论现金支出多少。一个拥有100万美元资产的投资组合持有500万美元名义期货敞口,就有5倍杠杆。名义敞口限制对于使用衍生品的策略至关重要,因为小额现金投资可能造成不成比例的市场敞口。合规系统必须通过将合约数量乘以合约乘数和标的价格来计算名义敞口。
期权持仓限制(交易所施加):
证券交易所对上市期权施加持仓限制,限制任何个人或一致行动群体可持有或卖出的同一市场方向合约数量(所有看涨期权和卖空看跌期权,或所有看跌期权和卖空看涨期权)。持仓限制根据标的证券的交易量和流通量有所不同。OCC(期权清算公司)会发布当前持仓限制。超过交易所施加的持仓限制会导致监管处罚和潜在的强制平仓。
卖空限制:
Regulation SHO管辖美国的卖空交易,并施加多项交易前要求:
  • 定位要求: 执行卖空之前,经纪自营商必须有合理理由相信该证券可以在结算日之前借入并交付。必须在卖空订单提交前记录该定位。
  • 难借证券名单: 难以借入的证券会被维护在难借证券名单上。这些证券的卖空可能需要预先借入(执行出售前实际借入股票),而非仅定位。
  • 阈值证券: 存在大量交付失败的证券会被列入阈值证券名单。阈值证券的空头头寸有额外的平仓要求。
  • 替代上涨规则(Rule 201): 当证券价格较前一日收盘价下跌10%或更多时,当日剩余时间和次日会触发卖空价格限制。卖空只能以高于当前全国最优买价的价格执行。
杠杆限制:
对于保证金账户,Regulation T规定了初始保证金要求(股票通常为50%),FINRA Rule 4210规定了维持保证金要求(多头头寸通常为25%,空头头寸为30%)。交易前合规系统必须验证拟议交易不会导致账户超过其保证金容量或低于维持要求。对于投资组合保证金账户,计算更为复杂,使用基于风险的方法。

Regulatory Compliance Rules

监管合规规则

Pre-trade compliance systems must enforce specific regulatory rules that govern trading conduct.
Wash sale detection (30-day window):
IRC Section 1091 disallows a tax loss deduction if the taxpayer purchases a "substantially identical" security within 30 days before or after the sale at a loss (the 61-day window). The pre-trade compliance system should flag potential wash sales by: (1) checking whether the account sold the same or substantially identical security at a loss within the prior 30 days (repurchase triggers wash sale), and (2) checking whether there is a pending or planned purchase of the same security within 30 days after a proposed loss sale. Substantially identical securities include the same stock, options on the same stock, and in some interpretations, ETFs tracking the same index. Wash sale detection across related accounts (spouse, IRA) adds complexity, as the IRS applies wash sale rules across accounts controlled by the same taxpayer.
Free-riding prevention (Regulation T):
In a cash account (non-margin), a customer may not purchase a security and sell it before paying for it in full. If a customer buys a security, the purchase must be paid for by the settlement date (T+1). If the customer sells the security before payment, this constitutes free-riding, and the account is subject to a 90-day freeze (all purchases must be made with settled funds for 90 days). The pre-trade compliance system must track unsettled purchases and prevent sales of unpaid-for securities in cash accounts.
Pattern day trader detection:
FINRA Rule 4210 defines a pattern day trader as a customer who executes four or more day trades (buying and selling the same security on the same day) within five business days, provided the number of day trades is more than 6% of the customer's total trading activity in that period. Pattern day traders must maintain at least $25,000 in equity in their margin account. The pre-trade compliance system should count day trades over the rolling five-day window and alert or block when the threshold is approached.
Mutual fund market timing restrictions:
Frequent trading in mutual fund shares (rapid purchases and redemptions) can harm long-term shareholders through dilution and increased transaction costs. Most mutual fund prospectuses include market timing policies that restrict round-trip transactions within specified periods (often 30 to 90 days). The pre-trade compliance system should track mutual fund purchase and redemption activity and flag transactions that violate the fund's stated market timing policy. SEC Rule 22c-2 requires funds to have agreements with intermediaries to share shareholder transaction data for market timing surveillance.
Insider trading prevention (Section 16, Rule 144):
Section 16 of the Securities Exchange Act requires corporate insiders (officers, directors, and 10% beneficial owners) to report their transactions and disgorge short-swing profits (profits from purchases and sales within a six-month window). Rule 144 restricts the resale of control and restricted securities, imposing holding period requirements and volume limitations. When the firm manages accounts for corporate insiders, the pre-trade compliance system must enforce: (1) pre-clearance requirements before any trade in the insider's company securities, (2) blackout period restrictions (insiders typically cannot trade during the period before earnings announcements), (3) Rule 144 volume limits (sales in any three-month period cannot exceed the greater of 1% of outstanding shares or the average weekly trading volume over the prior four weeks), and (4) Form 4 filing coordination.
ERISA prohibited transaction rules:
For accounts subject to the Employee Retirement Income Security Act (ERISA), certain transactions between the plan and "parties in interest" (fiduciaries, service providers, employers, unions) are prohibited. The pre-trade compliance system must maintain a list of parties in interest for each ERISA plan account and block transactions that would constitute prohibited transactions — for example, purchasing securities issued by the plan sponsor or its affiliates, or engaging in lending or leasing arrangements with parties in interest. Exemptions exist under Prohibited Transaction Exemptions (PTEs) issued by the Department of Labor, and the system should be configurable to recognize applicable exemptions.
交易前合规系统必须执行管辖交易行为的特定监管规则。
洗售检测(30天窗口期):
《国内税收法典》第1091条规定,如果纳税人在亏损出售前30天或后30天内购买“实质相同”的证券(共61天窗口),则不允许扣除税收亏损。交易前合规系统应通过以下方式标记潜在洗售:(1) 检查账户在过去30天内是否以亏损价格出售了相同或实质相同的证券(回购会触发洗售),(2) 检查拟议亏损出售后30天内是否有未决或计划的相同证券购买。实质相同的证券包括同一股票、同一股票的期权,在某些解释下还包括跟踪同一指数的ETF。跨关联账户(配偶、IRA)的洗售检测增加了复杂性,因为美国国税局对同一纳税人控制的所有账户适用洗售规则。
搭便车防范(Regulation T):
在现金账户(非保证金)中,客户不得在全额支付购买款前出售证券。如果客户购买证券,必须在结算日(T+1)前支付购买款。如果客户在支付前出售证券,即构成搭便车,账户将被冻结90天(90天内所有购买必须使用已结算资金)。交易前合规系统必须跟踪未结算购买,防止现金账户出售未支付的证券。
典型日内交易者检测:
FINRA Rule 4210将典型日内交易者定义为在五个交易日内执行四笔或更多日内交易(同日买卖同一证券)的客户,且日内交易数量占该时期客户总交易活动的6%以上。典型日内交易者的保证金账户必须至少维持25,000美元的权益。交易前合规系统应统计滚动五天窗口内的日内交易,在接近阈值时发出警报或拦截。
共同基金市场时机选择限制:
频繁交易共同基金份额(快速申购赎回)会通过摊薄和增加交易成本损害长期股东利益。大多数共同基金招股说明书包含市场时机选择政策,限制特定期限(通常为30至90天)内的往返交易。交易前合规系统应跟踪共同基金申购赎回活动,标记违反基金规定的市场时机选择政策的交易。SEC Rule 22c-2要求基金与中介机构签订协议,共享股东交易数据用于市场时机选择监控。
内幕交易防范(Section 16、Rule 144):
《证券交易法》第16条要求公司内部人士(高管、董事和10%受益所有人)报告其交易,并吐出短期 swing 利润(六个月内买卖产生的利润)。Rule 144限制控制证券和受限证券的转售,施加持有期要求和交易量限制。当公司为公司内部人士管理账户时,交易前合规系统必须执行:(1) 内部人士买卖其公司证券前的预先审批要求,(2) 静默期限制(内部人士通常不能在 earnings 公告前的时期交易),(3) Rule 144交易量限制(任何三个月期间的出售量不得超过流通股的1%或过去四周平均周交易量的较高者),以及(4) Form 4申报协调。
ERISA禁止交易规则:
对于受《雇员退休收入保障法》(ERISA)管辖的账户,计划与“利益相关方”(受托人、服务提供商、雇主、工会)之间的某些交易是被禁止的。交易前合规系统必须为每个ERISA计划账户维护利益相关方名单,拦截构成禁止交易的交易——例如购买计划发起人或其关联方发行的证券,或与利益相关方进行借贷或租赁安排。劳工部发布的禁止交易豁免(PTE)下存在豁免情况,系统应可配置以识别适用的豁免。

Client-Specific Restrictions

客户特定限制

Beyond firm-wide and regulatory rules, individual client accounts may carry specific restrictions that the compliance system must enforce.
Investment policy constraints:
The investment policy statement (IPS) for each account may specify exclusions based on industry (no tobacco, no firearms, no gambling), geography (no emerging markets, no specific countries), security type (no derivatives, no structured products, no private placements), quality (investment-grade bonds only, no below-BBB), or other criteria. These constraints are mapped to security attributes and enforced as hard or soft blocks depending on the strength of the restriction. IPS constraints should be coded into the compliance system at account onboarding and updated when the IPS is revised.
Tax-loss harvesting coordination:
Accounts actively engaged in tax-loss harvesting require compliance coordination to avoid wash sales. When one account sells a security at a loss for tax purposes, the compliance system must prevent repurchase of the same or substantially identical security within the 30-day wash sale window — not only in the same account but across all accounts for the same taxpayer (including spouse's accounts and IRAs). This requires cross-account wash sale monitoring with household-level linkage.
Legally restricted securities:
Court orders, divorce decrees, trust provisions, and other legal documents may restrict trading in specific securities or impose conditions on transactions. Examples include: a divorce decree prohibiting the sale of marital property (including securities) during proceedings, a trust provision requiring trustee approval before selling concentrated positions, a court-ordered freeze on assets pending litigation, or restrictions imposed by a regulatory consent order. These restrictions are typically entered manually by compliance and coded as hard blocks.
ESG/SRI screens:
Environmental, social, and governance (ESG) screens and socially responsible investing (SRI) criteria exclude securities based on non-financial factors. Common screens include: fossil fuel exclusion (companies deriving more than a specified percentage of revenue from coal, oil, or gas extraction), weapons exclusion (manufacturers of controversial weapons, civilian firearms), tobacco and alcohol exclusion, animal testing exclusion, and human rights screens. ESG screens require mapping securities to ESG data providers (MSCI ESG, Sustainalytics, ISS ESG) and maintaining current classification data. Because ESG classifications can change as companies evolve, the screening data must be refreshed regularly.
Account-level trading restrictions:
Certain account-level conditions require trading restrictions: frozen accounts (pending regulatory action, suspicious activity investigation, or customer dispute), accounts with pending paperwork (incomplete account opening documentation, unsigned IPS, missing beneficiary designation), accounts in estate settlement (trading freeze pending legal authority confirmation), and accounts subject to garnishment or levy (where outgoing transactions may be prohibited). These account-level flags produce hard blocks on all or specific types of trading activity.
除了公司层面和监管规则外,单个客户账户可能有特定限制,合规系统必须执行这些限制。
投资政策约束:
每个账户的投资政策声明(IPS)可能规定基于行业(无烟草、无枪支、无赌博)、地域(无新兴市场、无特定国家)、证券类型(无衍生品、无结构化产品、无私募发行)、质量(仅投资级债券、无BBB以下评级)或其他标准的排除项。这些约束映射到证券属性,并根据限制的严格程度作为硬拦截或软拦截执行。IPS约束应在账户开户时编码到合规系统中,并在IPS修订时更新。
税损 harvesting 协调:
主动参与税损 harvesting 的账户需要合规协调以避免洗售。当一个账户为了税收目的亏损出售证券时,合规系统必须防止在30天洗售窗口期内回购相同或实质相同的证券——不仅是同一账户,还包括同一纳税人的所有账户(包括配偶账户和IRA)。这需要通过家庭组关联进行跨账户洗售监控。
法律受限证券:
法院命令、离婚判决、信托条款和其他法律文件可能限制特定证券的交易,或对交易施加条件。例如:离婚判决禁止在诉讼期间出售 marital 财产(包括证券)、信托条款要求出售集中持仓前获得受托人批准、诉讼期间法院下令冻结资产、或监管同意令施加的限制。这些限制通常由合规人员手动录入,并编码为硬拦截。
ESG/SRI筛选:
环境、社会和治理(ESG)筛选以及社会责任投资(SRI)标准基于非财务因素排除证券。常见筛选包括:化石燃料排除(收入超过指定比例来自煤炭、石油或天然气开采的公司)、武器排除(争议武器、民用枪支制造商)、烟草和酒精排除、动物实验排除、人权筛选。ESG筛选需要将证券映射到ESG数据提供商(MSCI ESG、Sustainalytics、ISS ESG)并维护最新的分类数据。由于ESG分类会随着公司发展而变化,筛选数据必须定期刷新。
账户层面交易限制:
某些账户层面的情况需要交易限制:冻结账户(待监管行动、可疑活动调查或客户纠纷)、待处理文书工作的账户(开户文档不完整、未签署IPS、缺少受益人指定)、遗产结算中的账户(待法律授权确认期间的交易冻结)、以及被扣押或征收的账户(可能禁止 outgoing 交易)。这些账户层面的标志会对所有或特定类型的交易活动产生硬拦截。

Compliance Override Workflow

合规豁免工作流

Soft blocks require a structured override process that balances operational efficiency with compliance rigor.
Soft block review process:
When a soft block fires, the order is held in a pending compliance review status. The system presents the compliance officer or authorized reviewer with: the order details, the rule that triggered the block, the current state of the relevant metric (e.g., "this purchase would bring the Technology sector allocation to 27%, exceeding the 25% guideline"), and any relevant context (e.g., the account's IPS permits tactical overweights of up to 5% with advisor approval). The reviewer evaluates whether the trade is justified despite the guideline breach and either approves (overrides) or rejects the order.
Override authorization levels:
Not all overrides should be authorized at the same level. A tiered authorization structure matches the severity of the override to the seniority of the authorizer:
  • Level 1 (trader/advisor): Minor guideline deviations within a defined tolerance (e.g., concentration exceeds guideline by less than 2 percentage points). The trader or advisor can self-authorize with documentation.
  • Level 2 (compliance officer): Moderate deviations or watch list matches. A compliance officer must review and approve.
  • Level 3 (chief compliance officer or committee): Significant deviations, repeated overrides of the same rule for the same account, or overrides involving heightened regulatory risk. Requires CCO or compliance committee approval.
Override documentation requirements:
Every override must be documented with: (1) the order details, (2) the rule that was triggered, (3) the quantitative details of the violation (how far the metric exceeds the threshold), (4) the identity of the person requesting the override, (5) the identity of the person authorizing the override, (6) the timestamp of the authorization, (7) the stated justification for the override, and (8) any conditions attached to the approval (e.g., "approved provided the overweight is reduced within 30 days"). This documentation must be retained as part of the firm's compliance records and is subject to regulatory examination.
Escalation procedures:
When a reviewer is uncertain about whether to approve an override, or when the override involves a particularly sensitive situation (e.g., a trade that raises potential insider trading concerns), the system should provide a clear escalation path. Escalation may route the override to the CCO, the legal department, or a compliance committee. The escalation path and the resolution must be documented.
Post-override audit:
Compliance should periodically audit override activity to identify patterns and systemic issues. The audit should examine: the total volume and frequency of overrides, overrides by rule type (which rules are most frequently overridden), overrides by account or advisor (are certain advisors consistently triggering and overriding the same rules), whether conditions attached to approved overrides were fulfilled (e.g., was the overweight actually reduced within 30 days as required), and whether any overrides resulted in adverse outcomes (client harm, regulatory issues).
Pattern analysis of overrides:
If the same rule is being overridden frequently, it may indicate that the rule threshold is miscalibrated (too tight, generating excessive false positives), that a particular advisor or strategy systematically operates outside the guideline (requiring either a guideline adjustment or a strategy change), or that the rule is no longer appropriate given current market conditions or regulatory requirements. Override pattern analysis feeds directly into the rule tuning process.
软拦截需要结构化的豁免流程,平衡运营效率和合规严谨性。
软拦截审核流程:
当软拦截触发时,订单会处于待合规审核状态。系统向合规官或授权审核人员提供:订单详情、触发拦截的规则、相关指标的当前状态(例如“本次购买将使科技行业配置达到27%,超过25%的指引”),以及任何相关背景(例如该账户的IPS允许在获得顾问批准的情况下最多战术超配5%)。审核人员评估交易是否在违反指引的情况下仍然合理,然后批准(豁免)或拒绝订单。
豁免授权层级:
并非所有豁免都应在同一层级授权。分层授权结构将豁免的严重性与授权人的资历相匹配:
  • 层级1(交易员/顾问): 定义容忍度内的轻微指引偏差(例如集中度超过指引不到2个百分点)。交易员或顾问可以自行授权,但需要留存文档。
  • 层级2(合规官): 中度偏差或观察名单匹配。必须由合规官审核并批准。
  • 层级3(首席合规官或委员会): 重大偏差、同一账户同一规则的重复豁免、或涉及更高监管风险的豁免。需要CCO或合规委员会批准。
豁免文档要求:
每次豁免都必须记录:(1) 订单详情,(2) 触发的规则,(3) 违规的量化详情(指标超过阈值多少),(4) 请求豁免的人员身份,(5) 授权豁免的人员身份,(6) 授权时间戳,(7) 声明的豁免理由,以及(8) 批准附带的任何条件(例如“批准,前提是超配在30天内降低”)。这些文档必须作为公司合规记录的一部分留存,并接受监管检查。
上报流程:
当审核人员不确定是否批准豁免,或豁免涉及特别敏感的情况(例如可能引发内幕交易担忧的交易)时,系统应提供清晰的上报路径。上报可以将豁免路由到CCO、法务部门或合规委员会。上报路径和解决方案必须记录在案。
豁免后审计:
合规部门应定期审计豁免活动,以识别模式和系统性问题。审计应检查:豁免的总数量和频率、按规则类型划分的豁免(哪些规则最常被豁免)、按账户或顾问划分的豁免(某些顾问是否持续触发并豁免相同的规则)、批准豁免附带的条件是否得到履行(例如超配是否确实在要求的30天内降低),以及任何豁免是否导致不良结果(客户损害、监管问题)。
豁免模式分析:
如果同一规则被频繁豁免,可能表明规则阈值校准错误(过于严格,产生过多误报)、特定顾问或策略系统性地超出指引范围(需要调整指引或改变策略)、或者规则在当前市场条件或监管要求下不再适用。豁免模式分析直接为规则调整流程提供输入。

Rule Configuration and Maintenance

规则配置与维护

The effectiveness of the pre-trade compliance system depends on ongoing rule management — adding new rules, modifying thresholds, retiring obsolete rules, and ensuring that the rule set reflects current regulatory requirements and firm policies.
Adding and modifying rules:
New rules may be required when regulations change, the firm enters a new business line, or compliance identifies a gap in the existing rule set. The rule addition process should include: (1) defining the rule logic (what condition triggers the block, what type of block is produced), (2) setting the threshold or parameter values, (3) determining which accounts or account types the rule applies to, (4) testing the rule against historical order data to assess its impact (how many orders would it have blocked), (5) obtaining approval from the CCO or compliance committee, (6) deploying the rule in a monitoring-only mode before activating blocking (shadow mode), and (7) activating the rule with blocking enabled after the shadow period confirms expected behavior.
Backtesting rules against historical orders:
Before activating a new rule or modifying a threshold, the rule should be backtested against a representative sample of historical orders. Backtesting reveals: the expected block rate (percentage of orders that would be blocked), the false positive rate (orders that would be blocked but are actually legitimate), and the false negative rate (orders that should be blocked but are not caught). This data informs threshold calibration and helps the compliance team anticipate the operational impact of the new rule.
False positive analysis:
A high false positive rate undermines the compliance system's credibility and creates operational friction. If traders and advisors routinely override soft blocks because the blocks are perceived as invalid, they may develop "alert fatigue" and begin overriding blocks without proper evaluation — including blocks that are valid. The compliance team should track the override rate for each rule and investigate rules with override rates above a defined threshold (e.g., rules overridden more than 50% of the time). Remediation may include adjusting the threshold, refining the rule logic, or reclassifying the rule from a soft block to a monitoring alert.
Rule tuning:
Rule tuning is the ongoing process of adjusting thresholds and parameters to optimize the balance between catching genuine violations and minimizing false blocks. Tuning should be data-driven: the compliance team analyzes block rates, override rates, and the outcomes of overridden trades to determine whether thresholds are appropriately calibrated. Tuning decisions should be documented and approved by the CCO.
Rule version control:
The compliance rule set should be subject to version control, similar to software code. Each rule change — addition, modification, threshold adjustment, or retirement — should be recorded with the effective date, the person who made the change, the approval, and the reason. Version control enables the compliance team to reconstruct the rule set that was in effect on any historical date, which is essential for regulatory examinations and investigations that require demonstrating what controls were in place at the time of a particular trade.
Regulatory change management:
When regulations change, the compliance team must assess the impact on the pre-trade compliance rule set and implement necessary modifications. This requires monitoring regulatory developments (SEC releases, FINRA regulatory notices, exchange rule changes), analyzing the impact on existing rules, modifying or adding rules as needed, backtesting the modified rules, and deploying changes before the regulatory effective date. A regulatory change management calendar should track upcoming effective dates and the status of rule modifications.
交易前合规系统的有效性取决于持续的规则管理——新增规则、修改阈值、淘汰过时规则,并确保规则集反映当前的监管要求和公司政策。
新增和修改规则:
当监管变化、公司进入新业务线或合规部门发现现有规则集存在漏洞时,可能需要新增规则。规则新增流程应包括:(1) 定义规则逻辑(什么条件触发拦截,产生什么类型的拦截),(2) 设置阈值或参数值,(3) 确定规则适用的账户或账户类型,(4) 对照历史订单数据测试规则,评估其影响(它会拦截多少订单),(5) 获得CCO或合规委员会的批准,(6) 在激活拦截前以仅监控模式部署规则(影子模式),(7) 在影子期确认预期行为后激活规则的拦截功能。
对照历史订单回测规则:
在激活新规则或修改阈值之前,应对照具有代表性的历史订单样本回测规则。回测可以揭示:预期拦截率(会被拦截的订单百分比)、误报率(会被拦截但实际合法的订单)、以及漏报率(应该被拦截但未被捕获的订单)。这些数据为阈值校准提供信息,并帮助合规团队预测新规则的运营影响。
误报分析:
高误报率会损害合规系统的可信度,并造成运营摩擦。如果交易员和顾问因为拦截被认为无效而常规豁免软拦截,他们可能会产生“警报疲劳”,开始不经过适当评估就豁免拦截——包括有效的拦截。合规团队应跟踪每个规则的豁免率,调查豁免率超过定义阈值的规则(例如超过50%的时间被豁免的规则)。整改措施可能包括调整阈值、优化规则逻辑,或将规则从软拦截重新分类为监控警报。
规则调整:
规则调整是持续调整阈值和参数的过程,以在捕获真实违规和最小化误拦截之间取得最佳平衡。调整应以数据为驱动:合规团队分析拦截率、豁免率和被豁免交易的结果,以确定阈值是否校准适当。调整决策应记录在案并获得CCO批准。
规则版本控制:
合规规则集应接受版本控制,类似于软件代码。每次规则变更——新增、修改、阈值调整或淘汰——都应记录生效日期、变更人、批准信息和原因。版本控制使合规团队能够重建任何历史日期生效的规则集,这对于监管检查和调查至关重要,这些检查和调查需要证明特定交易发生时存在哪些控制措施。
监管变更管理:
当监管发生变化时,合规团队必须评估对交易前合规规则集的影响,并实施必要的修改。这需要监控监管动态(SEC发布、FINRA监管通知、交易所规则变更)、分析对现有规则的影响、根据需要修改或新增规则、回测修改后的规则,并在监管生效日期前部署变更。监管变更管理日历应跟踪即将到来的生效日期和规则修改的状态。

Worked Examples

实际案例

Example 1: Designing a Pre-Trade Compliance Rule Engine for a Multi-Custodian RIA

案例1:为多托管RIA设计交易前合规规则引擎

Scenario: A registered investment adviser manages $3 billion across 4,500 accounts custodied at Schwab, Fidelity, and Pershing. The firm uses model-based portfolio management with 12 model portfolios ranging from conservative income to aggressive growth. The compliance team needs to design a pre-trade compliance rule engine that can handle batch compliance checks for model-driven trades (up to 10,000 orders per model change) as well as real-time checks for individual advisor-initiated trades.
Design Considerations:
The rule engine architecture uses a hybrid evaluation approach. A fast-fail gate evaluates the three most critical rules first in sequence: (1) account status — is the account frozen, suspended, or closed? (2) restricted list — is the security on the firm restricted list? (3) account trading authority — does the firm have discretionary authority or has the client authorized this specific trade? If any of these fail, the order is immediately hard-blocked without evaluating further rules, saving computational resources. Orders that pass the fast-fail gate proceed to parallel evaluation of all remaining rules.
The rule set is organized into seven categories with defined block types:
Category 1 — Account status rules (hard block): Account must be in active status. Account must not be flagged for pending paperwork, regulatory hold, estate settlement, or AML investigation. These rules check account-level flags in the client master database.
Category 2 — Restricted and watch list rules: Firm restricted list match produces a hard block. Watch list match produces a Level 2 soft block (requires compliance officer approval). Personal trading restricted list match produces a hard block for employee accounts. Client-specific restricted security match produces a hard block for that account.
Category 3 — Concentration limits: Single security exceeding 10% of account value produces a Level 1 soft block (advisor can self-authorize with documentation). Single security exceeding 15% produces a Level 2 soft block. Single sector exceeding 30% produces a Level 1 soft block. Single issuer (aggregated across all security types) exceeding 10% produces a Level 2 soft block. These thresholds apply to the post-trade position — the compliance check must calculate what the portfolio will look like after the proposed trade is executed.
Category 4 — Regulatory limits: Wash sale detection (30-day window, cross-account within household) produces a Level 1 soft block with detailed diagnostic information showing the prior loss sale and the wash sale tax consequence. Free-riding detection in cash accounts produces a hard block. Pattern day trader detection (approaching four day trades in five business days) produces a Level 2 soft block.
Category 5 — Client-specific restrictions: IPS asset class range violation produces a Level 1 soft block. ESG screen violation produces a hard block (if the client has a formal ESG mandate) or Level 1 soft block (if the ESG screen is advisory). Tax-loss harvesting wash sale coordination produces a hard block (the tax benefit is the explicit purpose, so overriding defeats the objective).
Category 6 — Position and exposure limits: Firm-level aggregate position exceeding 3% of a security's outstanding shares produces a Level 3 soft block (CCO approval required, due to 13D/13G reporting implications). Account-level notional exposure exceeding 150% of account value produces a Level 2 soft block.
Category 7 — Model and guideline compliance: Trade deviating from the model allocation by more than 5 percentage points produces a Level 1 soft block. Trade in a security not included in any approved model produces a Level 1 soft block (to catch unauthorized ad hoc trades).
For batch processing of model-driven trades, the engine processes orders in three phases. Phase 1: aggregate all orders by security and calculate the total firm-level position post-trade to check firm-level limits once rather than per-order. Phase 2: evaluate account-level rules for each order in parallel across multiple processing threads. Phase 3: compile results and present the compliance summary showing the total order count, the number passing all checks, the number with soft blocks (by level), and the number with hard blocks.
Analysis:
The design prioritizes diagnostic completeness over raw speed for the batch workflow — when processing 10,000 orders from a model change, the compliance team needs to see all violations across all accounts to make informed decisions about overrides and exclusions. For the real-time single-order workflow, the fast-fail gate ensures that obviously non-compliant orders are blocked immediately while the full rule set is evaluated in under 200 milliseconds. The tiered override structure ensures that routine guideline deviations can be handled efficiently by advisors while significant deviations require compliance officer or CCO involvement. All override activity flows into a monthly compliance report that tracks override volume, frequency by rule, and patterns by advisor.
场景: 一家注册投资顾问管理着30亿美元资产,涉及4500个账户,存管在嘉信、富达和Pershing。公司使用基于模型的投资组合管理,有12个模型投资组合,从保守收入型到激进增长型不等。合规团队需要设计一个交易前合规规则引擎,既能处理模型驱动交易的批量合规检查(每次模型变更最多10000笔订单),也能处理顾问发起的单笔交易的实时检查。
设计考虑:
规则引擎架构采用混合评估方法。快速失败关卡首先顺序评估三个最关键的规则:(1) 账户状态——账户是否被冻结、暂停或关闭?(2) 受限名单——证券是否在公司受限名单上?(3) 账户交易权限——公司是否有自由裁量权,或客户是否授权了这笔特定交易?如果其中任何一项不通过,订单立即被硬拦截,无需评估后续规则,节省计算资源。通过快速失败关卡的订单进入剩余所有规则的并行评估。
规则集分为七个类别,具有定义的拦截类型:
类别1 — 账户状态规则(硬拦截):账户必须处于活跃状态。账户不得被标记为待处理文书工作、监管冻结、遗产结算或AML调查。这些规则检查客户主数据库中的账户级标志。
类别2 — 受限与观察名单规则:公司受限名单匹配触发硬拦截。观察名单匹配触发层级2软拦截(需要合规官批准)。个人交易受限名单匹配对员工账户触发硬拦截。客户特定受限证券匹配对该账户触发硬拦截。
类别3 — 集中度限制:单只证券超过账户价值的10%触发层级1软拦截(顾问可以自行授权,需留存文档)。单只证券超过15%触发层级2软拦截。单个行业超过30%触发层级1软拦截。单一发行人(所有证券类型汇总)超过10%触发层级2软拦截。这些阈值适用于交易后持仓——合规检查必须计算拟议交易执行后投资组合的状态。
类别4 — 监管限制:洗售检测(30天窗口期,家庭组内跨账户)触发层级1软拦截,提供详细诊断信息,显示先前的亏损出售和洗售的税收后果。现金账户的搭便车检测触发硬拦截。典型日内交易者检测(五个交易日内接近四笔日内交易)触发层级2软拦截。
类别5 — 客户特定限制:IPS资产类区间违反触发层级1软拦截。ESG筛选违反触发硬拦截(如果客户有正式ESG授权)或层级1软拦截(如果ESG筛选是建议性的)。税损harvesting洗售协调触发硬拦截(税收优惠是明确目标,因此豁免会违背目的)。
类别6 — 持仓与敞口限制:公司层面总持仓超过证券流通股的3%触发层级3软拦截(由于13D/13G报告影响,需要CCO批准)。账户层面名义敞口超过账户价值的150%触发层级2软拦截。
类别7 — 模型与指引合规:交易偏离模型配置超过5个百分点触发层级1软拦截。交易的证券未包含在任何批准的模型中触发层级1软拦截(以捕获未授权的临时交易)。
对于模型驱动交易的批量处理,引擎分三个阶段处理订单。阶段1:按证券汇总所有订单,计算交易后的公司层面总持仓,一次性检查公司层面限制,而非逐单检查。阶段2:跨多个处理线程并行评估每笔订单的账户层面规则。阶段3:汇总结果,展示合规摘要,包括总订单数、通过所有检查的数量、软拦截数量(按层级)和硬拦截数量。
分析:
该设计在批量工作流中优先考虑诊断完整性而非原始速度——处理模型变更产生的10000笔订单时,合规团队需要看到所有账户的所有违规情况,以便就豁免和排除做出明智决策。对于实时单笔订单工作流,快速失败关卡确保明显不合规的订单立即被拦截,同时完整规则集的评估在200毫秒内完成。分层豁免结构确保常规指引偏差可以由顾问高效处理,而重大偏差需要合规官或CCO参与。所有豁免活动都会纳入月度合规报告,跟踪豁免数量、按规则划分的频率以及按顾问划分的模式。

Example 2: Implementing Restricted List Management for a Broker-Dealer with Investment Banking Affiliates

案例2:为拥有投资银行关联方的经纪自营商实施受限名单管理

Scenario: A full-service broker-dealer has an investment banking division that engages in M&A advisory, equity underwriting, and debt capital markets. The firm also operates a wealth management division serving 15,000 retail and high-net-worth clients, and a proprietary trading desk. The compliance department must implement a restricted list management system that prevents insider trading violations while minimizing unnecessary trading restrictions.
Design Considerations:
The restricted list system has three distinct lists with different scopes and actions:
The firm restricted list is driven by investment banking engagements. When the investment banking division begins work on a transaction involving a public company, the compliance department adds the issuer to the restricted list. The addition includes: the issuer name, all related ticker symbols, CUSIP numbers for all outstanding securities (common stock, preferred stock, convertible bonds, corporate bonds), the date of addition, the reason (type of engagement), and the expected duration. The restriction applies to all firm accounts: proprietary trading, wealth management client accounts, and employee personal accounts. The restriction produces a hard block on all buy and sell orders.
Issuer propagation is critical. When the firm is advising on an acquisition of Company A by Company B, both issuers and all their subsidiaries must be restricted. The compliance system maintains a corporate hierarchy database sourced from a third-party data provider (such as Bloomberg or Refinitiv) that maps parent-subsidiary relationships. When Company A is added to the restricted list, the system automatically identifies and restricts all subsidiaries and affiliates. The compliance team reviews the propagated list to confirm completeness and add any entities not captured by the automated hierarchy (such as recently formed joint ventures or entities with non-obvious corporate relationships).
The watch list contains securities where the firm has reason for heightened surveillance but has not determined that a full restriction is warranted. This includes: companies where the investment banking division is in preliminary discussions (before a formal engagement letter is signed), companies where a research analyst has recently changed a rating or is preparing to publish a significant research report, and companies where the compliance department has received a tip or complaint about potential insider trading. Watch list matches produce soft blocks that route to the compliance surveillance team for review before the trade is permitted to proceed.
The personal trading restricted list adds further restrictions for firm employees. In addition to the firm restricted list (which already applies to personal accounts), employees in the investment banking division are prohibited from trading in any securities of companies within their coverage sector for the duration of their assignment. Research analysts are prohibited from trading in securities they cover. All access persons must pre-clear personal trades through the compliance system, and the pre-clearance check validates against all three lists.
List maintenance follows a defined workflow. Additions to the firm restricted list require: a request from the investment banking division's deal team or the compliance department, approval by the compliance officer or designated deputy, and immediate distribution to all trading desks and the OMS. Removals require: confirmation that the engagement has concluded or the MNPI has become public (e.g., the transaction was announced or the engagement was terminated), approval by the compliance officer, and a documented record of the removal date and reason. The compliance department conducts a weekly review of the restricted list to confirm that all entries remain valid, with quarterly comprehensive audits that reconcile the restricted list against the active engagement list from investment banking.
Analysis:
The system must balance insider trading prevention with operational efficiency. Over-restriction — keeping securities on the restricted list longer than necessary or restricting overly broad corporate families — prevents legitimate client trading and creates client dissatisfaction. Under-restriction — failing to add securities promptly or missing related entities — creates regulatory risk. The compliance team tracks metrics including: average time from engagement commencement to restricted list addition (target: same business day), average time from engagement termination to list removal (target: within two business days of public announcement), the number of false-hit blocks per month (orders blocked that are subsequently determined to be legitimate), and the number of watch list escalations that result in full restriction. These metrics are reported to the Chief Compliance Officer monthly and inform process improvements.
场景: 一家全服务经纪自营商拥有投资银行部门,从事并购顾问、股票承销和债务资本市场业务。公司还运营财富管理部门,服务15000名零售和高净值客户,以及自营交易台。合规部门必须实施受限名单管理系统,防范内幕交易违规,同时最大限度减少不必要的交易限制。
设计考虑:
受限名单系统有三个不同的名单,具有不同的范围和处置措施:
公司受限名单由投资银行业务驱动。当投资银行部门开始处理涉及上市公司的交易时,合规部门将发行人加入受限名单。新增内容包括:发行人名称、所有相关代码、所有未偿付证券的CUSIP号码(普通股、优先股、可转换债券、公司债券)、新增日期、原因(业务类型)和预期持续时间。该限制适用于所有公司账户:自营交易、财富管理客户账户和员工个人账户。该限制对所有买卖订单触发硬拦截。
发行人传导至关重要。当公司为A公司被B公司收购的交易提供顾问服务时,两家发行人及其所有子公司都必须被限制。合规系统维护来自第三方数据提供商(如彭博或Refinitiv)的企业层级数据库,映射母子公司关系。当A公司被加入受限名单时,系统会自动识别并限制所有子公司和关联方。合规团队会审核传导后的名单,确认完整性,并添加自动层级未捕获的任何实体(例如最近成立的合资企业或企业关系不明显的实体)。
观察名单包含公司有理由进行高度监控,但尚未确定需要完全限制的证券。包括:投资银行部门正在进行初步讨论的公司(在正式业务协议签署前)、研究分析师最近调整评级或准备发布重要研究报告的公司、以及合规部门收到内幕交易举报或投诉的公司。观察名单匹配触发软拦截,在交易获准执行前路由到合规监控团队审核。
个人交易受限名单为公司员工增加了进一步限制。除了已经适用于个人账户的公司受限名单外,投资银行部门的员工在任务期间不得交易其覆盖行业内的任何证券。研究分析师不得交易其覆盖的证券。所有接触人员必须通过合规系统预先审批个人交易,预先审批检查会验证所有三个名单。
名单维护遵循既定工作流。新增到公司受限名单需要:投资银行部门交易团队或合规部门的请求、合规官或指定副手的批准、以及立即分发到所有交易台和OMS。移除需要:确认业务已经结束或MNPI已经公开(例如交易已经宣布或业务已经终止)、合规官的批准、以及移除日期和原因的书面记录。合规部门每周对受限名单进行审核,确认所有条目仍然有效,每季度进行全面审计,将受限名单与投资银行的活跃业务列表进行核对。
分析:
系统必须平衡内幕交易防范与运营效率。过度限制——将证券留在受限名单上的时间超过必要,或限制过于宽泛的企业家族——会阻止合法的客户交易,造成客户不满。限制不足——未能及时添加证券或遗漏关联实体——会带来监管风险。合规团队跟踪的指标包括:从业务开始到添加到受限名单的平均时间(目标:同一工作日)、从业务终止到从名单移除的平均时间(目标:公开宣布后两个工作日内)、每月误拦截数量(随后被确定为合法的被拦截订单)、以及导致完全限制的观察名单上报数量。这些指标每月向首席合规官报告,为流程改进提供信息。

Example 3: Configuring Concentration and Diversification Limits Across a Household of Accounts

案例3:为家庭组账户配置集中度和多元化限制

Scenario: A high-net-worth household has five accounts at the firm: a joint taxable account ($2M), the husband's IRA ($800K), the wife's IRA ($600K), a revocable trust ($1.5M), and a custodial account for a minor child ($100K). Total household assets: $5M. The family's patriarch is a retired executive of a large technology company and holds 40% of the joint taxable account ($800K) in concentrated stock of his former employer. The compliance team must configure concentration limits that address both individual account diversification and household-level exposure, while accommodating the legacy concentrated position.
Design Considerations:
The concentration limit configuration operates at two levels: account-level and household-level.
Account-level limits are set per account based on the account's investment policy. The joint taxable account has a special carve-out for the legacy concentrated position: the standard single-security limit of 10% is suspended for the employer stock, but a separate declining limit is established — the position must not exceed 45% of the account currently (providing a 5-percentage-point buffer above the current 40% holding) and must decline to 30% within two years as the family executes a systematic diversification plan. Any purchase of additional employer stock is hard-blocked. All other securities in the joint account are subject to the standard 10% single-security limit and a 30% single-sector limit. The IRAs and trust are subject to standard limits: 10% single security, 30% single sector, and asset class ranges per the IPS (equity 50-70%, fixed income 25-45%, alternatives 0-10%, cash 1-5%). The custodial account, given its smaller size, has a relaxed single-security limit of 15% (because a $100K account holding a minimum position size of $5K would reach 5% concentration with a single position, making a strict 10% limit impractical without limiting the number of holdings to fewer than 20).
Household-level limits aggregate holdings across all five accounts. The household single-security limit is set at 10% of total household assets ($500K). The employer stock position ($800K, or 16% of household assets) currently exceeds this limit. Because this is a legacy position under an active diversification plan, the household limit for this specific security is set at 18% currently with a declining schedule matching the account-level diversification plan. The household single-sector limit is 30%. Given that the employer stock is a technology company and the household already has 16% of assets in this single technology stock, the effective available allocation to other technology securities across all accounts is limited to approximately 14% of household assets (30% sector limit minus 16% in the concentrated position).
The compliance system must perform cross-account aggregation in real-time. When a trade is proposed in any of the five accounts, the system must: (1) look up the household linkage for that account, (2) retrieve current positions in all linked accounts, (3) calculate the post-trade household-level exposure for the relevant security, sector, and asset class, and (4) compare against household-level limits. This cross-account check must also run for wash sale monitoring — if the husband's IRA sells a security at a loss, the system must prevent the joint account, wife's IRA, trust, or custodial account from purchasing the same or substantially identical security within the 30-day wash sale window.
Analysis:
The configuration accommodates the reality that high-net-worth households often have legacy concentrated positions that cannot be immediately eliminated. The declining limit schedule creates a compliance-enforced glide path for diversification — the system will automatically begin hard-blocking if the position exceeds the scheduled limit, providing a structural mechanism to ensure the diversification plan stays on track. The household-level aggregation prevents the family from inadvertently building additional concentration by purchasing the same securities across multiple accounts. The cross-account wash sale monitoring protects the tax benefits of tax-loss harvesting across the household. The compliance team reviews the household-level limits quarterly and adjusts the declining schedule for the concentrated position based on market conditions, tax considerations, and the family's progress toward their diversification target.
场景: 一个高净值家庭在公司有五个账户:联合应税账户(200万美元)、丈夫的IRA(80万美元)、妻子的IRA(60万美元)、可撤销信托(150万美元)、未成年子女的托管账户(10万美元)。家庭总资产:500万美元。家族的族长是一家大型科技公司的退休高管,联合应税账户中40%(80万美元)是其前雇主的集中持仓股票。合规团队必须配置集中度限制,既要解决单个账户的多元化问题,也要解决家庭组层面的敞口问题,同时容纳遗留的集中持仓。
设计考虑:
集中度限制配置在两个层面运行:账户层面和家庭组层面。
账户层面限制根据账户的投资政策为每个账户设置。联合应税账户对遗留集中持仓有特殊豁免:10%的标准单只证券限制对雇主股票暂停适用,但设立了单独的递减限制——目前持仓不得超过账户的45%(为当前40%的持仓提供5个百分点的缓冲),并且随着家庭执行系统性多元化计划,必须在两年内降至30%。任何额外购买雇主股票的行为都会被硬拦截。联合账户中的所有其他证券适用标准的10%单只证券限制和30%单个行业限制。IRA和信托适用标准限制:10%单只证券、30%单个行业、以及IPS规定的资产类区间(股票50-70%、固定收益25-45%、另类资产0-10%、现金1-5%)。托管账户由于规模较小,单只证券限制放宽至15%(因为10万美元的账户持有5千美元的最低头寸就会达到5%的集中度,严格的10%限制会将持仓数量限制在20只以下,不切实际)。
家庭组层面限制汇总所有五个账户的持仓。家庭组单只证券限制设定为家庭总资产的10%(50万美元)。雇主股票持仓(80万美元,占家庭资产的16%)目前超过了这一限制。由于这是处于主动多元化计划下的遗留持仓,该特定证券的家庭组限制目前设定为18%,并按照与账户层面多元化计划匹配的递减时间表执行。家庭组单个行业限制为30%。鉴于雇主股票是科技公司,家庭已经有16%的资产在这只单一科技股票中,所有账户中其他科技证券的有效可用配置约为家庭资产的14%(30%的行业限制减去集中持仓的16%)。
合规系统必须实时进行跨账户聚合。当五个账户中的任何一个提出交易建议时,系统必须:(1) 查找该账户的家庭组关联,(2) 检索所有关联账户的当前持仓,(3) 计算相关证券、行业和资产类别的交易后家庭组层面敞口,(4) 与家庭组层面限制进行比较。这种跨账户检查也必须用于洗售监控——如果丈夫的IRA亏损出售某只证券,系统必须防止联合账户、妻子的IRA、信托或托管账户在30天洗售窗口期内购买相同或实质相同的证券。
分析:
该配置适应了高净值家庭通常有无法立即消除的遗留集中持仓的现实。递减限制时间表为多元化创建了合规强制的下滑路径——如果持仓超过计划限制,系统会自动开始硬拦截,提供结构性机制确保多元化计划按计划推进。家庭组层面的聚合防止家庭通过在多个账户购买相同证券,无意中增加额外的集中度。跨账户洗售监控保护了整个家庭组税损harvesting的税收优惠。合规团队每季度审查家庭组层面的限制,并根据市场条件、税收考虑和家庭实现多元化目标的进展,调整集中持仓的递减时间表。

Common Pitfalls

常见陷阱

  • Implementing only account-level concentration limits without household-level aggregation, allowing excessive household exposure to build across related accounts
  • Failing to propagate restricted list entries across the corporate family (parent, subsidiaries, affiliates), leaving gaps that regulators specifically test for
  • Setting all compliance violations to hard blocks, creating operational gridlock; the distinction between hard and soft blocks is essential for balancing compliance with trading efficiency
  • Not tracking or analyzing override patterns, missing systemic issues such as miscalibrated thresholds or advisors who routinely circumvent guidelines
  • Deploying new rules directly into production without backtesting or shadow-mode testing, causing unexpected blocks that disrupt trading operations
  • Maintaining stale restricted or watch lists — securities that should have been removed remain, blocking legitimate trades, while securities that should be added are missed
  • Ignoring compliance check latency, allowing slow rule evaluation to degrade execution quality for time-sensitive orders
  • Applying the same concentration limits to all account sizes without considering that small accounts require different thresholds due to position sizing constraints
  • Not coordinating wash sale detection across accounts within a household, undermining tax-loss harvesting programs
  • Failing to version-control compliance rules, making it impossible to reconstruct the rule set in effect at the time of a historical trade during regulatory examinations
  • Treating pre-trade compliance as a one-time implementation rather than an ongoing process requiring regular backtesting, tuning, and regulatory change management
  • Allowing compliance rule overrides without structured documentation, creating examination risk when regulators request override justification records
  • Checking concentration limits only on buy orders without considering that sell orders in other positions can change the denominator (total portfolio value) and push remaining positions above their percentage thresholds
  • Relying on a single ESG data provider without periodic validation, leading to stale or inconsistent screening results as company classifications change over time
  • Not distinguishing between regulatory position limits (which must be hard blocks) and internal risk guidelines (which may be soft blocks), applying inappropriate block types that either create unnecessary rigidity or insufficient control
  • 仅实施账户层面的集中度限制,没有家庭组层面的聚合,导致关联账户之间积累过高的家庭组敞口
  • 未能在企业家族(母公司、子公司、关联方)中传导受限名单条目,留下监管机构专门检查的漏洞
  • 将所有合规违规都设置为硬拦截,造成运营僵局;硬拦截和软拦截的区别对于平衡合规与交易效率至关重要
  • 不跟踪或分析豁免模式,错过系统性问题,如阈值校准错误或顾问常规规避指引
  • 不经过回测或影子模式测试就直接将新规则部署到生产环境,导致意外拦截,扰乱交易运营
  • 维护过期的受限或观察名单——应该移除的证券仍然存在,拦截合法交易,而应该添加的证券被遗漏
  • 忽略合规检查延迟,导致缓慢的规则评估降低时间敏感订单的执行质量
  • 对所有账户规模应用相同的集中度限制,没有考虑到小账户由于头寸规模约束需要不同的阈值
  • 不跨家庭组内的账户协调洗售检测,破坏税损harvesting计划
  • 未对合规规则进行版本控制,导致监管检查期间无法重建历史交易发生时生效的规则集
  • 将交易前合规视为一次性实施,而非需要定期回测、调整和监管变更管理的持续流程
  • 允许没有结构化文档的合规规则豁免,当监管机构要求豁免理由记录时带来检查风险
  • 仅在买单时检查集中度限制,没有考虑其他头寸的卖单会改变分母(总投资组合价值),导致剩余持仓超过其百分比阈值
  • 依赖单一ESG数据提供商,没有定期验证,导致随着公司分类随时间变化,筛选结果过期或不一致
  • 不区分监管持仓限制(必须是硬拦截)和内部风险指引(可以是软拦截),应用不适当的拦截类型,要么造成不必要的刚性,要么控制不足

Cross-References

交叉参考

  • order-lifecycle (Layer 11): Pre-trade compliance is a critical stage in the order lifecycle, intercepting orders between generation and routing; the order lifecycle skill provides the broader context for where compliance checks fit in the trade flow
  • post-trade-compliance (Layer 11): Post-trade compliance monitoring detects violations that were not caught pre-trade, including violations arising from market movements after execution; together, pre-trade and post-trade compliance form a complete compliance surveillance framework
  • order-management-advisor (Layer 10): The OMS executes the compliance check workflow, manages hard and soft block statuses, and records override documentation as part of the trade audit trail
  • investment-suitability (Layer 9): Suitability and best interest analysis overlaps with pre-trade compliance at the point of evaluating whether a trade is appropriate for the client's risk profile, investment objectives, and financial situation
  • conflicts-of-interest (Layer 9): Restricted list management and personal trading restrictions are direct conflict-of-interest controls; the conflicts-of-interest skill covers the broader framework for identifying and mitigating conflicts
  • investment-policy (Layer 5): IPS constraints — asset class ranges, quality minimums, exclusion lists — are encoded as pre-trade compliance rules; changes to the IPS require corresponding updates to the compliance rule configuration
  • portfolio-management-systems (Layer 10): The PMS generates trade proposals that feed into the pre-trade compliance engine; compliance check results flow back to the PMS to inform portfolio managers of blocked or flagged trades
  • books-and-records (Layer 9): Override documentation, compliance check results, and rule change records are part of the firm's books and records subject to SEC and FINRA retention requirements
  • settlement-clearing (Layer 11): Settlement timing affects free-riding detection and cash availability checks; the T+1 settlement cycle determines the window within which pre-trade compliance must validate that funds or securities will be available
  • order-lifecycle(层级11):交易前合规是订单生命周期中的关键阶段,在订单生成和路由之间进行拦截;订单生命周期skill为合规检查在交易流中的位置提供了更广泛的背景
  • post-trade-compliance(层级11):交易后合规监控检测交易前未捕获的违规,包括执行后市场变动导致的违规;交易前和交易后合规共同构成完整的合规监控框架
  • order-management-advisor(层级10):OMS执行合规检查工作流,管理硬拦截和软拦截状态,并将豁免文档记录为交易审计轨迹的一部分
  • investment-suitability(层级9):适当性和最佳利益分析与交易前合规在评估交易是否符合客户风险 profile、投资目标和财务状况方面存在重叠
  • conflicts-of-interest(层级9):受限名单管理和个人交易限制是直接的利益冲突控制措施;利益冲突skill涵盖识别和缓解冲突的更广泛框架
  • investment-policy(层级5):IPS约束——资产类区间、质量最低要求、排除名单——被编码为交易前合规规则;IPS变更需要相应更新合规规则配置
  • portfolio-management-systems(层级10):PMS生成交易建议,输入到交易前合规引擎;合规检查结果反馈给PMS,通知投资组合经理被拦截或标记的交易
  • books-and-records(层级9):豁免文档、合规检查结果和规则变更记录是公司账簿和记录的一部分,受SEC和FINRA留存要求约束
  • settlement-clearing(层级11):结算时间影响搭便车检测和资金可用性检查;T+1结算周期决定了交易前合规必须验证资金或证券可用的窗口