Security: Difference between revisions

From ACT Wiki
Jump to navigationJump to search
imported>Administrator
(CSV import)
 
imported>Doug Williamson
m (Spacing 20/8/13)
Line 1: Line 1:
1. Assets pledged by a borrower, as additional protection for the lender's interest.  For example a residential mortgage loan, for which the security is the residential property mortgaged to the lender.
1.  


2. A tradable legal claim upon the assets of the issuer of the securityExamples of traded securities include shares and bonds.
Assets pledged by a borrower, as additional protection for the lender's interest.   


3. Safety, including both physical safety and - for example - the confidentiality of information.
For example a residential mortgage loan, for which the security is the residential property mortgaged to the lender.
 
 
2.
 
A tradable legal claim upon the assets of the issuer of the security. 
 
Examples of traded securities include shares and bonds.
 
 
3.  
 
Safety, including both physical safety and - for example - the confidentiality of information.
 
 
4.
 
Systems and procedures to improve safety. 
 
Including for example both physical access controls and electronic controls such as encryption and passwords.


4. Systems and procedures to improve safety.  Including for example both physical access controls and electronic controls such as encryption and passwords.


== See also ==
== See also ==
Line 56: Line 74:
* [[Underwriting]]
* [[Underwriting]]
* [[Unsecured debt]]
* [[Unsecured debt]]

Revision as of 11:46, 20 August 2013

1.

Assets pledged by a borrower, as additional protection for the lender's interest.

For example a residential mortgage loan, for which the security is the residential property mortgaged to the lender.


2.

A tradable legal claim upon the assets of the issuer of the security.

Examples of traded securities include shares and bonds.


3.

Safety, including both physical safety and - for example - the confidentiality of information.


4.

Systems and procedures to improve safety.

Including for example both physical access controls and electronic controls such as encryption and passwords.


See also