...
I. Use Case Description | |
Use Case Name | Counterparty exposure in a derivatives trading network |
Use Case Identifier | DER-01 |
Source | BE/DER Content Team |
Point of Contact | |
SEC-Creation / Revision Date | 6/11/2019 |
Associated Documents | Requirements documentation, traceability matrix if applicable |
II. Use Case Summary | |||
Goal | Describe briefly the goal the use case is intended to satisfy | Requirements | State any requirement(s)specific to this use case, including any capabilities from a business architecture or process model that the use case supports, any metrics or other reporting requirements, etc., including any reference identifier for the requirement(s), as applicableCounterparty exposure is one aspect of managing risk related to derivatives reporting, as one of many requirements related to regulatory reporting on risk. It involves knowing who your counterparties are and rolling up the risk across legal entities under various scenarios - based on parameters required for stress testing. Clearly organizations need to understand their counterparty exposure regardless of the reporting requirement. Companies have many subsidiaries and complex relationships, and understanding total exposure across legal entities can be difficult at best. The goal is to show how to use FIBO to demonstrate total exposure to a given counterparty. |
Requirements | Exposure as a majority stakeholder, as a minority stakeholder, ... this involves percent ownership, what the risk in a given subsidiary might be, what happens if the subsidiary goes under but the parent does not, backing / recourse behind such situations ... | ||
Scope | Identify any known boundaries and the intended scope of the use case | ||
Priority | Identify the priority of the use case (with respect to other use cases for the project) | Stakeholders | Identify all known stakeholders for the use caseOf the three use cases we have to date, this is the top priority and required in order to implement the others. |
Stakeholders | Executives within financial control / risk, anyone within the risk organization responsible for identifying counterparty risk, chief risk officer and other C-level executives, board of directors, regulators ... | ||
Description | Summarize the use case, capturing the essential objectives (no longer than a page), including a quick overview, restated goals, and principal actor(s).
User stories, if applicable, and any narrative mapped from those user stories to usage scenarios should be included in the Usage Scenarios section, below. | ||
Actors / Interfaces | List actors: people, systems, knowledge bases, repositories, and other data resources, services, sensors, or other “things” outside the system that either act on the system (primary actors) or are acted on by the system (secondary actors). Primary actors are those that invoke the use case and benefit from the result. Identify the primary actor and briefly describe role.
Any actor that is external to or outside the control of the use case owner should be further described under Resources, below. | ||
Pre-conditions | Identify any assumptions about the state of the system that must be met for the trigger (below) to initiate the use case. Any assumptions about the state of other related systems can also be stated here. List all preconditions. | ||
Post-conditions | Provide any conditions that will be true of the state of the system after the use case has been completed. | ||
Triggers | Describe in detail the event or events that initiate the execution of this use case. Triggers can be external, temporal, or internal. They can be single events or a complex event that indicates that some set of conditions has been met. | ||
Performance Requirements | List any known performance-specific requirements – timing and sizing (volume, frequency, etc.), maintainability, reusability, other “-ilities”, etc. | ||
Assumptions |
| ||
Open Issues |
|
...
VII. Competency Questions
- For a given portfolio, what is the exposure to each of the relevant counterparties involved in end-of-day positions?
- The risk may depend on the type of product, for example there are differing risks for certain commodities.
...
- It also depends on the time horizon, for example, when are certain payments due, what does the market look like for a particular product, etc.
- For foreign exchange, it could mean exposure to a single currency across counterparties or with respect to a certain set of counterparties.
- This may involve not only the risk to certain counterparties and how has that exposure been hedged in order to mitigate it.
- Thus this is sort of a matrix between products and counterparties, all products for one counterparty, all counterparties for one product, with respect to one product and one counterparty ...
- What is the counterparty exposure for a portfolio at any point in time (intra-day, end-of-month, etc.)?
Describe at least one way you expect to use the semantics and/or provenance to propose an answer to the questions. Include an initial description of why the semantics and/or provenance representation and reasoning provides an advantage over other obvious approaches to the problem. (optional – depending on the use case and need for supporting business case).
...