Global Glosssary: Includes FCA Definitions & Handbook references
This glossary provides a quick lookup to definitions and the FCA Handbook. Please update according to changes in policy.
Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL
N |
---|
Notifiable concernNotifiable concern has the meaning in SUP 16.30.7R. | |
O |
---|
Off-rampThe process of exchanging cryptoassets for fiat currency | |
On-rampThe process of exchanging fiat currency (such as US dollars) for
cryptoassets. | |
P |
---|
Payment chainA system which allows the transfer of value between different parties
through a payment scheme. Commonly initiated by the merchant to
issuing and acquiring bank. | |
Payment instrumentAny personalised device or personalised set of procedures agreed
between a customer and the payment service provider (such as a bank)
used by the customer to initiate payments. This includes debit and credit
cards as well as payments made online and through mobile applications. | |
Payment interfaceThe interface as referred to in Article 30 of the Regulatory Technical
Standards on Strong Customer Authentication. Interface enables secure
communication with account information service providers, payment
initiation service providers and payment service providers issuing cardbased payment instruments. | |
Payment OrderA ‘payment order’ is, in summary, an instruction to a PSP to fall within the
definition of ‘payment instrument’. It is a set of procedures that enables
the consumer to instruct a payment initiator to transfer funds to a
merchant | |
Payment service providerA natural or legal person permitted under the Payment Services
Regulations 2017 (PSRs) to provide payment services in the UK, including
those authorised or registered under the PSRs, credit institutions, agents,
governmental departments, and local authorities. | |
Payment servicesPayment services are listed in Schedule 1 Part 1 to the PSRs 2017. This
includes but is not limited to services such as the execution of payment
transactions, including transfers of funds on a payment account with
the user’s payment service provider or with another payment service
provider; issuing payment instruments or acquiring payment transactions;
money remittance; payment initiation services and account information
services. | |
Payment Services Regulations 2017 (PSR)The PSRs 2017 govern the authorisation and associated requirements
for authorised or registered payment institutions (PIs). They also set the
conduct of business rules for providing payment services. | |
Payment systemA payment system allows settlement of payment transactions through
the transfer of value. There are eight designated payment systems in the
UK: BACS, CHAPS, Credit and Cheque, Faster Payment Scheme, Link,
Mastercard, Visa Sterling, Finality Payment system which used DLT to
transfer funds. | |
Payment transactionThe process of initiating the placing, transferring, or withdrawing funds.
Examples include payments with credit cards, transferring funds from a
bank account to pay bills or using a mobile application to send funds. | |
PegA stablecoin’s targeted reference value (eg 1:1 with the US dollar) | |
Permitted approverPermitted approver in relation to a financial promotion, a firm that is entitled to approve
that financial promotion under the terms of its approver permission. | |
Pig Butchering ScamsA scammer may use a variety of methods to establish a relationship (either social, romantic, or business focus), and then gain the victim’s confidence and gradually introduce the victim to a fraudulent investment opportunity. In most cases, Scammers will approach victims through social media or dating apps, ask to take the conversation offline (e.g., WhatsApp, WeChat), and then communicate regularly with the victim to establish the relationship. Once Scammer has the victim’s trust, Scammer will then propose an investment opportunity related to crypto assets. The scammer will offer to train the victim to set up an account on an exchange to purchase crypto assets, and then provide a website or wallet address for the victim to transfer funds in order to participate in the investment opportunity. The fraudulent platform investment opportunity is often designed to appear legitimate and often produces artificial gains to keep the victim engaged in the platform and possibly deposit more funds. However, the victim is never able to withdraw their funds from the site and may be asked to transfer even more funds before anything can be withdrawn through a variety of excuses (e.g., service fees, IRS taxes, etc.). | |
PRIN 2A.5.3R
| |
Principle 12A firm must act to deliver good outcomes for retail customers. | |
Principle 7Communications with clients A firm must pay due regard to the information needs of its clients, and communicate information to them in a way which is clear, fair and not misleading. | |
Private KeyAn alphanumeric string that is univocally associated to a blockchain
address and enables the possessor of the key to sign (i.e., authorise, send,
validate) transactions. | |
Proof of ReservesProof of Reserves (or PoR) is an independent audit process which
cryptoasset firms can use to verify that the client assets they are holding
in custody correspond 1:1 with the assets they hold in reserve. | |
Public KeyAn alphanumeric string that is univocally associated to a blockchain
address and which has two main functions: to enable the generation of
(read-only) addresses for the reception of messages and/or transactions,
and to enable the decoding and verification of a signed message and
therefore allows recipients of the message to verify and accept it. | |
Q |
---|
QCAQualifying cryptoasset (as defined in paragraph 26F (Qualifying cryptoasset) of Schedule 1 to the Financial Promotion Order): | |
Qualifying cryptoassetQualifying cryptoasset (as defined in paragraph 26F (Qualifying cryptoasset) of Schedule 1 to the
Financial Promotion Order): | |
R |
---|
RansomwareA scammer gains access to a victim’s computer systems or private network, encrypts sensitive information or data, and demands a ransom from the victim to restore access to the encrypted information or data upon payment. The scammer will then provide detailed instructions on how to pay the fee to get the decryption key and may accept payment in crypto assets. | |