Global Glosssary: Includes FCA Definitions & Handbook references
This glossary provides a quick lookup to definitions and the FCA Handbook. Please update according to changes in policy.
Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL
A |
---|
Advance Fee ScamScammer requests an upfront payment, promising a future service or huge return on investment. | |
Affinity ScamsScammer targets members of an identifiable group (e.g., cultural, religious, or ethnic community) and curries favor with them to rope them into a fraudulent investment opportunity. | |
Approver permission exemptionApprover permission exemption an exemption from the approver permission requirement, provided
under the Financial Promotion Requirement Exemption
Regulations, which enables a firm to approve a financial promotion
in prescribed circumstances without the need for approver
permission. | |
Approver permission requirementApprover permission requirement the general requirement imposed on a firm by section 55NA(1) of
the Act not to approve (or purport to approve) the content of a
financial promotion for the purposes of section 21 of the Act
without approver permission. | |
Asset Recovery ScamScam by a third party requiring a fee to “recover” funds lost in a prior fraudulent transaction. | |
B |
---|
Bait and Switch ScamsA scam to mislead buyers, whereby a seller advertises an appealing but ingenuine offer to sell a financial product or service that the seller does not actually intend to sell. Instead, the seller offers a sub-par, defective, or unwanted product or service. For crypto, this might be most relevant to non-fungible tokens. | |
BlockchainA type of distributed ledger which records transaction information in
‘blocks’, distributed amongst a network of nodes that work together to
reach consensus on updates to the shared ledger, creating an auditable
‘chain’ of transactions. | |
BurningSending cryptoassets to a wallet that has no access key, for the purpose
of taking them permanently out of circulation. | |
C |
---|
Certified high net worth investorCertified high
net worth
investor - a person who meets the requirements set out in article 21 of the Promotion of
Collective Investment Schemes Order, in article 48 of the Financial
Promotion Order or in COBS 4.12B.38R. | |
Certified sophisticated investorCertified sophisticated investor - a person who meets the requirements set out in article 23 of the Promotion of
Collective Investment Schemes Order, in article 50 of the Financial Promotion Order or in COBS 4.12B.39R. | |
COBS 4.11.1R(1)Financial promotion A financial promotion communicated, or approved or in relation to which the firm has confirmed compliance(subject to exemptions). | |
COBS 4.11.1R(2B)Financial promotion: competence and expertise Evidence of how the firm has satisfied the competence and expertise requirement in COBS 4.10.9AR | |
COBS 4.11.2GCompliance of financial promotions | |
COBS 4.11.4RNon-mass
market
investments: certification of
compliance | |
COBS 4.11.5RRestricted mass
market
investments:
consumer
journey | |
COBS 4.12A.11R(5) COBS 4.12B.21R(5)Protection
language | |
COBS 4.12A.22RAny change to the rules
specifying the form and
content of the investor
statements in COBS 4 Annex
2R to COBS 4 Annex 5R
does not affect the continuing
validity of a statement
complying with the relevant
rule in force at the time that it
was completed and signed. | |
COBS 4.12A.44R COBS 4.12B.13RRisk
summaries | |
COBS 4.2.6The reasonable steps defence to an action for damages If, in relation to a particular communication or financial promotion, a firm takes reasonable steps to ensure it complies with the fair, clear and not misleading rule, a contravention of that rule does not give rise to a right of action under section 138D of the Act. | |
Controlled activity(e) arranging (bringing
about) deals in investments (paragraph 4(1)); | |
Cross-chain bridgeA messaging protocol that enables interoperability between blockchains
by holding or storing cryptoassets and creating token representations
of the same value on another blockchain, allowing for cross-chain
transactions. | |
Crypto Blackmail ScamScammer sends emails or physical mails to victims saying they have personal information about the victim or embarrassing or compromising photos or videos. They scammer then threatens to make these things personal information public unless the victim pays them in cryptocurrency. | |
D |
---|
De-pegA period in which a stablecoin loses its value relative to the underlying
asset. During this period, the stablecoin will usually be traded at a discount
on the secondary market. | |
Decentralised Finance (DeFi)DeFi is a segment of the crypto ecosystem, which utilises blockchain
networks and smart contract technology to provide a range of financial
service activities without an intermediary. | |
Delivery vs. Payment (DvP)A securities settlement mechanism that links a securities transfer and a
funds transfer in such a way as to ensure that delivery occurs if and only if
the corresponding payment occurs. | |
Distributed Ledger Technology (DLT)A type of technology that enables the sharing and updating of records in a
distributed way. | |
E |
---|
Electronic MoneyElectronic money is stored monetary (including magnetically) value as
represented by a claim on the electronic money issuer which is issued on
receipt of funds for the purpose of making payment transactions and is
accepted as a means of payment by third parties other than the issuer. | |
F |
---|
Fiat currencyA government-issued currency that is not backed by a physical
commodity, such as gold or silver. | |
Financial Promotion Requirement Exemption RegulationsFinancial Promotion
Requirement
Exemption
Regulations the Financial Services and Markets Act 2000 (Exemptions from
Financial Promotion General Requirement) Regulations 2023 (SI
2023/966). | |
Fraudulent Trading PlatformScammer develops a fraudulent website or application and convinces victims to deposit funds to the platform under the guise of providing victims access to a unique investment opportunity. The fraudulent platforms appear legitimate, even going as far as replicating price movements and producing artificial gains. | |
FreezingA functionality that disables the transfer of a stablecoin,
so that they can no longer be used for economic activity. | |
FungibleThe state of being interchangeable with and indistinguishable from
another | |
H |
---|
HackingExploiting a computer system or private network inside a computer with the intent of stealing personal information, such as passwords and bank account information, for financial gain. | |
High Yield Investment Programs (HYIP)Ponzi schemes promise passive income and high returns in short periods through an investment of crypto assets. These schemes often offer payment structures similar to that of multi-level marketing or pyramid schemes to recruit new investors, promising early investors a percentage of the profits of other investors they recruit. These schemes are usually heavily promoted through social media and may use paid social media promoters to market their product. Initially, the investment platform will appear legitimate and produce positive returns consistently. However, the scammer will eventually take off with the invested funds and freeze the platform under the guise of technical issues, before completely shutting down the platform. | |
I |
---|
Identity TheftCrime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain (Aka identity fraud). | |
ImmutableThis means that information or transaction history held on the blockchain
cannot be modified or altered once created. | |
Imposter ScamsScammer impersonates a legitimate business, government agent, or well-known figure to gain access to a user’s systems and personal information for financial gain (e.g. to steal the user’s assets). | |
Investment trustInvestment trust a company which: | |
L |
---|
Liquidity Mining ScamLiquidity mining is an investment strategy used to earn passive income with crypto assets. Investors stake their crypto assets in a liquidity pool to provide traders with the liquidity to conduct transactions. In exchange, investors receive a portion of the trading fees. In the liquidity mining scam, victims move cryptocurrency from their wallets to the liquidity mining platform and see the purported returns on a falsified dashboard[1]. Believing their investments to be a success, victims purchase additional cryptocurrency. Scammers ultimately move all stored cryptocurrency and investments made to a scammer-controlled wallet. | |
Liquidity poolsA smart contract arrangement in DeFi that holds two or more
cryptoassets to enable financial activity to take place, such as trading or
lending | |
Livestream ScamScammer broadcasts a livestream event through an online streaming platform (e.g., YouTube) to market a fraudulent promotion or product. Promotions typically offer questionable terms that are too good to be true and may request payment through crypto assets. | |
Local authority securityLocal authority security any of the following: | |
M |
---|
Merchant acquirerAcquiring of payment transactions is defined in regulation 2 of the
PSRs as “a payment service provided with a payment service provider
contracting with a payee to accept and process payment transactions
which result in a transfer of funds to the payee.” This includes traditional
‘merchant acquiring’ services enabling suppliers of goods, services,
accommodation or facilities to be paid for purchases arising from card
scheme transactions. | |
MintingCreating new digital coins or tokens on a blockchain network. | |
Money Market Funds (MMFs)MMFs are a type of open-ended investment fund used in many
jurisdictions, that gives investors a way to diversify credit risk and a place
to hold rather than grow their assets. | |
Multi-party computation (MPC)Multi-party computation is a cryptographic method used to increase the
security of asset storage and transactions on the blockchain. It works by
securely distributing the private data required to validate transactions in
such a way that the data held by one user is kept secret to the other users
taking part in the protocol. | |
N |
---|
Net settlementA system which aggregates and offsets multiple payments between
banks. | |
NodeA computational device operated by blockchain network participants to
store a copy of all transactional data, check the validity of new blocks and
broadcast information to other nodes in the network. | |
Non-mass market investmentNon-mass market investment either of the following: | |
Non-readily realisable securityNon-readily realisable security a security which is not any of the following: | |
Notifiable concernNotifiable concern has the meaning in SUP 16.30.7R. | |
O |
---|
Off-rampThe process of exchanging cryptoassets for fiat currency | |
On-rampThe process of exchanging fiat currency (such as US dollars) for
cryptoassets. | |
P |
---|
Payment chainA system which allows the transfer of value between different parties
through a payment scheme. Commonly initiated by the merchant to
issuing and acquiring bank. | |
Payment instrumentAny personalised device or personalised set of procedures agreed
between a customer and the payment service provider (such as a bank)
used by the customer to initiate payments. This includes debit and credit
cards as well as payments made online and through mobile applications. | |
Payment interfaceThe interface as referred to in Article 30 of the Regulatory Technical
Standards on Strong Customer Authentication. Interface enables secure
communication with account information service providers, payment
initiation service providers and payment service providers issuing cardbased payment instruments. | |
Payment OrderA ‘payment order’ is, in summary, an instruction to a PSP to fall within the
definition of ‘payment instrument’. It is a set of procedures that enables
the consumer to instruct a payment initiator to transfer funds to a
merchant | |
Payment service providerA natural or legal person permitted under the Payment Services
Regulations 2017 (PSRs) to provide payment services in the UK, including
those authorised or registered under the PSRs, credit institutions, agents,
governmental departments, and local authorities. | |
Payment servicesPayment services are listed in Schedule 1 Part 1 to the PSRs 2017. This
includes but is not limited to services such as the execution of payment
transactions, including transfers of funds on a payment account with
the user’s payment service provider or with another payment service
provider; issuing payment instruments or acquiring payment transactions;
money remittance; payment initiation services and account information
services. | |
Payment Services Regulations 2017 (PSR)The PSRs 2017 govern the authorisation and associated requirements
for authorised or registered payment institutions (PIs). They also set the
conduct of business rules for providing payment services. | |
Payment systemA payment system allows settlement of payment transactions through
the transfer of value. There are eight designated payment systems in the
UK: BACS, CHAPS, Credit and Cheque, Faster Payment Scheme, Link,
Mastercard, Visa Sterling, Finality Payment system which used DLT to
transfer funds. | |
Payment transactionThe process of initiating the placing, transferring, or withdrawing funds.
Examples include payments with credit cards, transferring funds from a
bank account to pay bills or using a mobile application to send funds. | |
PegA stablecoin’s targeted reference value (eg 1:1 with the US dollar) | |
Permitted approverPermitted approver in relation to a financial promotion, a firm that is entitled to approve
that financial promotion under the terms of its approver permission. | |
Pig Butchering ScamsA scammer may use a variety of methods to establish a relationship (either social, romantic, or business focus), and then gain the victim’s confidence and gradually introduce the victim to a fraudulent investment opportunity. In most cases, Scammers will approach victims through social media or dating apps, ask to take the conversation offline (e.g., WhatsApp, WeChat), and then communicate regularly with the victim to establish the relationship. Once Scammer has the victim’s trust, Scammer will then propose an investment opportunity related to crypto assets. The scammer will offer to train the victim to set up an account on an exchange to purchase crypto assets, and then provide a website or wallet address for the victim to transfer funds in order to participate in the investment opportunity. The fraudulent platform investment opportunity is often designed to appear legitimate and often produces artificial gains to keep the victim engaged in the platform and possibly deposit more funds. However, the victim is never able to withdraw their funds from the site and may be asked to transfer even more funds before anything can be withdrawn through a variety of excuses (e.g., service fees, IRS taxes, etc.). | |
PRIN 2A.5.3R
| |
Principle 12A firm must act to deliver good outcomes for retail customers. | |
Principle 7Communications with clients A firm must pay due regard to the information needs of its clients, and communicate information to them in a way which is clear, fair and not misleading. | |
Private KeyAn alphanumeric string that is univocally associated to a blockchain
address and enables the possessor of the key to sign (i.e., authorise, send,
validate) transactions. | |
Proof of ReservesProof of Reserves (or PoR) is an independent audit process which
cryptoasset firms can use to verify that the client assets they are holding
in custody correspond 1:1 with the assets they hold in reserve. | |
Public KeyAn alphanumeric string that is univocally associated to a blockchain
address and which has two main functions: to enable the generation of
(read-only) addresses for the reception of messages and/or transactions,
and to enable the decoding and verification of a signed message and
therefore allows recipients of the message to verify and accept it. | |
Q |
---|
QCAQualifying cryptoasset (as defined in paragraph 26F (Qualifying cryptoasset) of Schedule 1 to the Financial Promotion Order): | |
Qualifying cryptoassetQualifying cryptoasset (as defined in paragraph 26F (Qualifying cryptoasset) of Schedule 1 to the
Financial Promotion Order): | |
R |
---|
RansomwareA scammer gains access to a victim’s computer systems or private network, encrypts sensitive information or data, and demands a ransom from the victim to restore access to the encrypted information or data upon payment. The scammer will then provide detailed instructions on how to pay the fee to get the decryption key and may accept payment in crypto assets. | |
Readily realisable security... | |
RedeemingThe process whereby the stablecoin issuer returns, at the request of the
stablecoin holder, the monetary value held by the issuer when it issued
the stablecoin. | |
Registered personRegistered person (as defined in article 73ZA of the Financial Promotion Order) a person who
is: | |
Restricted mass market investmentRestricted mass market investment any of the following: | |
Retail investment productwhether or not any of (a) to (h) are held within an ISA or a CTF. | |
Romance or Social Media ScamScammer adopts a fake online profile to gain a victim’s affection and trust and then uses the illusion of a romantic or close relationship to manipulate and/or steal from the victim. | |
Rug Pull ScamDerived from the expression “pulling the rug out”. Variation of investment scheme where a developer attracts investors to a new cryptocurrency project (e.g., a new token or initial coin offering) through online crowdfunding, pumps up the value of the investment, and then pulls out before the project is built, leaving investors with a worthless currency. | |
S |
---|
Self-certified sophisticated investorSelf-certified sophisticated investor a person who meets the requirements set out in article 23A of the Promotion
of Collective Investment Schemes Order, in article 50A of the Financial Promotion Order or in COBS 4.12B.40R. | |
Settlement accountAn account containing money and/or assets that is held with a central
bank, central securities depository, central counterparty or any
other institution acting as a settlement agent, which is used to settle
transactions between participants or members of a commercial
settlement system. | |
Single companyA single company that is not part of the same group as the single-company
holding vehicle investing in it and which: | |
Single company holding vehicleSingle company holding vehicle a single body corporate which: | |
Smart contractsProgrammes stored on a blockchain that offer blockchains functionality
to run self-executing code to automatically enforce pre-specified terms
when certain conditions are met. | |
Speculative illiquid securitySpeculative illiquid security has the meaning in COBS 4.12B.50R | |
SUP 6A55X(1)(f) - when the FCA is
proposing to
grant an
application for
approver
permission but
subject to terms
which were not
sought in the
application | |
T |
---|
Tech Support ScamTech support scammers want victims to believe they have a serious problem with their computer, like a virus. They want victims to pay for tech support services the victims don’t need, to fix a problem that doesn’t exist. They often ask victims to pay by wiring money, putting money on a gift card, prepaid card or cash reload card, or using a money transfer app because they know those types of payments can be hard to reverse. | |
Trading pairTwo assets that can be traded for each other on an exchange. This can
either be crypto to crypto, or crypto to fiat. | |
W |
---|
WalletA device or service that stores users public and private keys allowing them
to interact with various blockchains and allows them to send and receive
cryptoassets. | |