Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

I. Use Case Description

Use Case Name

Counterparty exposure in a derivatives trading network

Use Case Identifier

DER-01

Source

BE/DER Content Team

Point of Contact

SEC-Creation / Revision Date

6/11/2019

Associated Documents

Requirements documentation, traceability matrix if applicable



II. Use Case Summary

Goal

Describe briefly the goal the use case is intended to satisfy

Requirements

State any requirement(s)specific to this use case, including any capabilities from a business architecture or process model that the use case supports, any metrics or other reporting requirements, etc., including any reference identifier for the requirement(s), as applicableCounterparty exposure is one aspect of managing risk related to derivatives reporting, as one of many requirements related to regulatory reporting on risk.  It involves knowing who your counterparties are and rolling up the risk across legal entities under various scenarios - based on parameters required for stress testing.  Clearly organizations need to understand their counterparty exposure regardless of the reporting requirement.  Companies have many subsidiaries and complex relationships, and understanding total exposure across legal entities can be difficult at best.  The goal is to show how to use FIBO to demonstrate total exposure to a given counterparty.

Requirements

Exposure as a majority stakeholder, as a minority stakeholder, ... this involves percent ownership, what the risk in a given subsidiary might be, what happens if the subsidiary goes under but the parent does not, backing / recourse behind such situations ...

Scope

Identify any known boundaries and the intended scope of the use case

Priority

Identify the priority of the use case (with respect to other use cases for the project)

Stakeholders

Identify all known stakeholders for the use caseOf the three use cases we have to date, this is the top priority and required in order to implement the others.

Stakeholders

Executives within financial control / risk, anyone within the risk organization responsible for identifying counterparty risk, chief risk officer and other C-level executives, board of directors, regulators ...

Description

Summarize the use case, capturing the essential objectives (no longer than a page), including a quick overview, restated goals, and principal actor(s).

 

User stories, if applicable, and any narrative mapped from those user stories to usage scenarios should be included in the Usage Scenarios section, below.

Actors / Interfaces

List actors: people, systems, knowledge bases, repositories, and other data resources, services, sensors, or other “things” outside the system that either act on the system (primary actors) or are acted on by the system (secondary actors). Primary actors are those that invoke the use case and benefit from the result. Identify the primary actor and briefly describe role. 

 

Any actor that is external to or outside the control of the use case owner should be further described under Resources, below.

Pre-conditions

Identify any assumptions about the state of the system that must be met for the trigger (below) to initiate the use case.  Any assumptions about the state of other related systems can also be stated here.  List all preconditions.

Post-conditions

Provide any conditions that will be true of the state of the system after the use case has been completed.

Triggers

Describe in detail the event or events that initiate the execution of this use case.  Triggers can be external, temporal, or internal.  They can be single events or a complex event that indicates that some set of conditions has been met.

Performance Requirements

List any known performance-specific requirements – timing and sizing (volume, frequency, etc.), maintainability, reusability, other “-ilities”, etc.

Assumptions

 

Open Issues

 

...

VII. Competency Questions

  1. For a given portfolio, what is the exposure to each of the relevant counterparties involved in end-of-day positions?
    1. The risk may depend on the type of product, for example there are differing risks for certain commodities. 

...

    1. It also depends on the time horizon, for example, when are certain payments due, what does the market look like for a particular product, etc.
    2. For foreign exchange, it could mean exposure to a single currency across counterparties or with respect to a certain set of counterparties.
    3. This may involve not only the risk to certain counterparties and how has that exposure been hedged in order to mitigate it.
    4. Thus this is sort of a matrix between products and counterparties, all products for one counterparty, all counterparties for one product, with respect to one product and one counterparty ...
  1. What is the counterparty exposure for a portfolio at any point in time (intra-day, end-of-month, etc.)?

 

Describe at least one way you expect to use the semantics and/or provenance to propose an answer to the questions. Include an initial description of why the semantics and/or provenance representation and reasoning provides an advantage over other obvious approaches to the problem. (optional – depending on the use case and need for supporting business case).

...