[{"data":1,"prerenderedAt":579},["ShallowReactive",2],{"8RAG82uMwm":3},{"_id":4,"pageSetup":5,"sections":11},"ee2dba65-9333-4269-8f10-b0d6a71131cc",{"description":6,"image":6,"keywords":6,"noindex":6,"slug":7,"title":10},null,{"_type":8,"current":9},"slug","clear-street-trust-center","Clear Street Trust Center",{"footer":12,"legalContent":140},{"address":13,"disclaimer":14,"footerItems":54,"legalItems":116,"legalText":6,"newAddress":6,"newDisclaimer":6,"newFooterItems":6,"socialNetworks":126},"4 World Trade Center\n150 Greenwich St Floor 45\nNew York, NY 10007\n(646) 845-0036",[15,26,34],{"_key":16,"_type":17,"children":18,"markDefs":24,"style":25},"b41b74ae73bb","block",[19],{"_key":20,"_type":21,"marks":22,"text":23},"331699fdb6140","span",[],"Products and services are offered by Clear Street LLC as a Broker Dealer member FINRA and SIPC and a Futures Commission Merchant registered with the CFTC and member of NFA. ",[],"normal",{"_key":27,"_type":17,"children":28,"markDefs":33,"style":25},"6295c5718daa",[29],{"_key":30,"_type":21,"marks":31,"text":32},"aac9779076980",[],"Clear Street UK Limited is authorised and regulated in the United Kingdom by the Financial Conduct Authority and is a Category 1 member of the London Metals Exchange.",[],{"_key":35,"_type":17,"children":36,"markDefs":50,"style":25},"dbec5081eda7",[37,41,46],{"_key":38,"_type":21,"marks":39,"text":40},"42e587e4d749",[],"Additional information about Clear Street LLC is available on FINRA ",{"_key":42,"_type":21,"marks":43,"text":45},"4894062c01ca",[44],"d38625939708","BrokerCheck",{"_key":47,"_type":21,"marks":48,"text":49},"6db9006e1b4a",[],", including its Customer Relationship Summary and NFA BASIC | NFA (futures.org).",[51],{"_key":44,"_type":52,"href":53},"link","https://brokercheck.finra.org/firm/summary/288933",[55,65,85,107],{"pages":56,"title":64},[57,61],{"documentType":58,"slug":58,"title":59,"type":60},"about","About","internal",{"documentType":62,"slug":62,"title":63,"type":60},"careers","Careers","Company",{"pages":66,"title":84},[67,71,75,78,81],{"documentType":68,"slug":69,"title":70,"type":60},"trader","traders","Traders",{"documentType":72,"slug":73,"title":74,"type":60},"client","family-offices","Family Offices",{"documentType":72,"slug":76,"title":77,"type":60},"hedge-funds","Hedge Funds",{"documentType":72,"slug":79,"title":80,"type":60},"etf-issuers","ETF Issuers",{"documentType":72,"slug":82,"title":83,"type":60},"broker-dealers","Broker-Dealers","Clients",{"pages":86,"title":106},[87,90,94,97,100,103],{"documentType":88,"slug":88,"title":89,"type":60},"services","Services Overview",{"documentType":91,"slug":92,"title":93,"type":60},"service","clearing","Clearing",{"documentType":91,"slug":95,"title":96,"type":60},"financing","Financing",{"documentType":91,"slug":98,"title":99,"type":60},"execution-trading","Execution & Trading",{"documentType":91,"slug":101,"title":102,"type":60},"investment-banking","Investment Banking",{"documentType":91,"slug":104,"title":105,"type":60},"active-traders","Active Trading","Services",{"pages":108,"title":115},[109,112],{"documentType":110,"slug":110,"title":111,"type":60},"news","News & Content",{"documentType":113,"slug":113,"title":114,"type":60},"studio","Clear Street Studio","Other",[117,120,123],{"slug":118,"title":119},"regulatory-disclosures","Regulatory Disclosures",{"slug":121,"title":122},"privacy-notice","Privacy Notice",{"slug":124,"title":125},"security","Security",[127,132,136],{"_key":128,"_type":129,"link":130,"socialNetwork":131},"43f9fa8f49d0","links","https://www.linkedin.com/company/clear-street","linkedin",{"_key":133,"_type":129,"link":134,"socialNetwork":135},"b581a744d770","https://www.youtube.com/@ClearStreet","youtube",{"_key":137,"_type":129,"link":138,"socialNetwork":139},"466192507eea","https://github.com/clear-street","github",{"body":141,"title":10},[142,151,160,168,176,184,192,200,208,216,223,231,239,247,257,265,273,281,288,297,305,317,329,341,353,360,368,380,392,404,416,428,440,452,464,476,488,500,512,519,527,535,542,550,558,572],{"_key":143,"_type":17,"children":144,"markDefs":149,"style":150},"9a1b246f634f",[145],{"_key":146,"_type":21,"marks":147,"text":148},"08d155134aa6",[],"Our Approach to Security",[],"h2",{"_key":152,"_type":17,"children":153,"markDefs":158,"style":159},"3c2a429ecb07",[154],{"_key":155,"_type":21,"marks":156,"text":157},"445a03d4dff3",[],"At Clear Street, security is foundational to how we build and operate our platform.",[],"h3",{"_key":161,"_type":17,"children":162,"markDefs":167,"style":25},"476da6957484",[163],{"_key":164,"_type":21,"marks":165,"text":166},"b75ab5747022",[],"As a firm operating in highly regulated financial markets, we design our systems to be secure by design, with a focus on protecting client data, ensuring system integrity, and maintaining operational resilience.",[],{"_key":169,"_type":17,"children":170,"markDefs":175,"style":25},"81bd1ed0afb1",[171],{"_key":172,"_type":21,"marks":173,"text":174},"1c24f26ed5cf",[],"Our approach is risk-driven and continuously evolving to address emerging threats and changing regulatory expectations.",[],{"_key":177,"_type":17,"children":178,"markDefs":183,"style":25},"130bf425274f",[179],{"_key":180,"_type":21,"marks":181,"text":182},"fb095fe20c06",[],"",[],{"_key":185,"_type":17,"children":186,"markDefs":191,"style":150},"03f18035d123",[187],{"_key":188,"_type":21,"marks":189,"text":190},"a59da8503a71",[],"Independent Validation and Compliance",[],{"_key":193,"_type":17,"children":194,"markDefs":199,"style":159},"297f0ae125b2",[195],{"_key":196,"_type":21,"marks":197,"text":198},"d26e552a5a9d",[],"Clear Street undergoes regular independent audits to validate the effectiveness of our security controls.",[],{"_key":201,"_type":17,"children":202,"markDefs":207,"style":25},"609948d847e4",[203],{"_key":204,"_type":21,"marks":205,"text":206},"629cdbf75b04",[],"We maintain a SOC 2 Type II report covering the Prime Brokerage Platform, which evaluates the design and operating effectiveness of controls over an extended period.",[],{"_key":209,"_type":17,"children":210,"markDefs":215,"style":25},"4682bdfc745e",[211],{"_key":212,"_type":21,"marks":213,"text":214},"999c65ed8c18",[],"This assessment is performed by an independent third-party auditor and provides assurance that our controls are appropriately designed and operating effectively in alignment with industry-recognized trust criteria.",[],{"_key":217,"_type":17,"children":218,"markDefs":222,"style":25},"8a8d0fe525a8",[219],{"_key":220,"_type":21,"marks":221,"text":182},"05128b702cc9",[],[],{"_key":224,"_type":17,"children":225,"markDefs":230,"style":150},"598b23aab418",[226],{"_key":227,"_type":21,"marks":228,"text":229},"a9afa81dff59",[],"Security Program and Governance",[],{"_key":232,"_type":17,"children":233,"markDefs":238,"style":159},"354f9636b346",[234],{"_key":235,"_type":21,"marks":236,"text":237},"e697cb04e9bc",[],"We operate a formal, company-wide information security program led by a dedicated security team and overseen by security leadership.",[],{"_key":240,"_type":17,"children":241,"markDefs":246,"style":25},"1e8a121b7c6c",[242],{"_key":243,"_type":21,"marks":244,"text":245},"5b0dcce29c39",[],"Our Program Includes:",[],{"_key":248,"_type":17,"children":249,"level":254,"listItem":255,"markDefs":256,"style":25},"c45621573d1a",[250],{"_key":251,"_type":21,"marks":252,"text":253},"2a82156788b4",[],"Defined security policies and procedures",1,"bullet",[],{"_key":258,"_type":17,"children":259,"level":254,"listItem":255,"markDefs":264,"style":25},"3b28fb6c824d",[260],{"_key":261,"_type":21,"marks":262,"text":263},"e471d20ff36d",[],"Ongoing risk assessments and control evaluations",[],{"_key":266,"_type":17,"children":267,"level":254,"listItem":255,"markDefs":272,"style":25},"996e4bfa9b15",[268],{"_key":269,"_type":21,"marks":270,"text":271},"e0b942690010",[],"Board-level oversight of security and internal controls",[],{"_key":274,"_type":17,"children":275,"markDefs":280,"style":25},"77a5c116561b",[276],{"_key":277,"_type":21,"marks":278,"text":279},"623a485d067c",[],"These practices ensure our security program evolves alongside our business and the threat landscape.",[],{"_key":282,"_type":17,"children":283,"markDefs":287,"style":25},"cb711aefe61f",[284],{"_key":285,"_type":21,"marks":286,"text":182},"689465a98061",[],[],{"_key":289,"_type":17,"children":290,"markDefs":296,"style":150},"344b92f27620",[291],{"_key":292,"_type":21,"marks":293,"text":295},"53d04aec5676",[294],"strong","Core Security Practices",[],{"_key":298,"_type":17,"children":299,"markDefs":304,"style":25},"84f9eed00861",[300],{"_key":301,"_type":21,"marks":302,"text":303},"56ec9cd3f6e3",[],"Protecting Client Data\nWe implement layered controls to protect sensitive and regulated data throughout its lifecycle, including encryption, access restrictions, and data classification.",[],{"_key":306,"_type":17,"children":307,"markDefs":316,"style":25},"fbaa72cd1e51",[308,312],{"_key":309,"_type":21,"marks":310,"text":311},"c6d0ee8b3423",[294],"Secure Infrastructure and Access Controls\n",{"_key":313,"_type":21,"marks":314,"text":315},"e873844e4ed6",[],"Our infrastructure is designed with layered protections across cloud and network environments, with strict access controls and continuous monitoring.",[],{"_key":318,"_type":17,"children":319,"markDefs":328,"style":25},"a5e6921548cf",[320,324],{"_key":321,"_type":21,"marks":322,"text":323},"354823482438",[294],"Secure Software Development",{"_key":325,"_type":21,"marks":326,"text":327},"64d52fef62dd",[],"\nSecurity is embedded into our development lifecycle through code review, automated scanning, and controlled deployment processes.",[],{"_key":330,"_type":17,"children":331,"markDefs":340,"style":25},"289bde7779e7",[332,336],{"_key":333,"_type":21,"marks":334,"text":335},"19dfadb6644c",[294],"Monitoring and Incident Response\n",{"_key":337,"_type":21,"marks":338,"text":339},"8d4df36d48e3",[],"We maintain continuous monitoring and a formal incident response capability to detect, investigate, and respond to potential threats.",[],{"_key":342,"_type":17,"children":343,"markDefs":352,"style":25},"534e8e3d493d",[344,348],{"_key":345,"_type":21,"marks":346,"text":347},"4530b020f3aa",[294],"Third Party Risk Management\n",{"_key":349,"_type":21,"marks":350,"text":351},"bc0cae0c52cc",[],"We assess vendors prior to onboarding and periodically thereafter to ensure they meet our security standards.",[],{"_key":354,"_type":17,"children":355,"markDefs":359,"style":25},"f50e35f58213",[356],{"_key":357,"_type":21,"marks":358,"text":182},"03f52537cb20",[],[],{"_key":361,"_type":17,"children":362,"markDefs":367,"style":150},"2315b8cb1999",[363],{"_key":364,"_type":21,"marks":365,"text":366},"a422dd1e1151",[294],"Security Controls Details",[],{"_key":369,"_type":17,"children":370,"markDefs":379,"style":25},"8464bde32ea1",[371,375],{"_key":372,"_type":21,"marks":373,"text":374},"42bca4797199",[294],"Identity & Access Management\n",{"_key":376,"_type":21,"marks":377,"text":378},"4b30f2aa3d0b",[],"Role-based access controls (RBAC); least privilege access; multi-factor authentication (MFA); centralized identity management (SSO); regular access reviews; rapid reprovisioning upon termination.",[],{"_key":381,"_type":17,"children":382,"markDefs":391,"style":25},"831b50b1bce4",[383,387],{"_key":384,"_type":21,"marks":385,"text":386},"34f1ef758841",[294],"Data Protection & Encryption",{"_key":388,"_type":21,"marks":389,"text":390},"dab23eccfad5",[],"\nData classification framework; encryption in transit (TLS) and at rest; strict handling policies for sensitive data",[],{"_key":393,"_type":17,"children":394,"markDefs":403,"style":25},"18fdf23c374e",[395,399],{"_key":396,"_type":21,"marks":397,"text":398},"faae4d531b60",[294],"Infrastructure & Network Security\n",{"_key":400,"_type":21,"marks":401,"text":402},"2df5042a946a",[],"Cloud-native architecture; network segmentation; firewall protections; continuous monitoring for misconfigurations",[],{"_key":405,"_type":17,"children":406,"markDefs":415,"style":25},"55028f1a50ce",[407,411],{"_key":408,"_type":21,"marks":409,"text":410},"e618b181e23c",[294],"Application Security",{"_key":412,"_type":21,"marks":413,"text":414},"a4e075ee3b72",[],"\nSecure SDLC; peer code reviews; automated security scanning; separation of environments; controlled deployments",[],{"_key":417,"_type":17,"children":418,"markDefs":427,"style":25},"55672e5b49fe",[419,423],{"_key":420,"_type":21,"marks":421,"text":422},"f0273646ad45",[294],"Monitoring & Threat Detection",{"_key":424,"_type":21,"marks":425,"text":426},"339f64888f4b",[],"\nCentralized logging; real-time alerting; continuous monitoring; security operations response",[],{"_key":429,"_type":17,"children":430,"markDefs":439,"style":25},"9bddff2e8e04",[431,435],{"_key":432,"_type":21,"marks":433,"text":434},"e70105d93440",[294],"Vulnerability Management",{"_key":436,"_type":21,"marks":437,"text":438},"3ab6819496f0",[],"\nRegular vulnerability scanning; annual penetration testing; tracking and remediation based on risk severity",[],{"_key":441,"_type":17,"children":442,"markDefs":451,"style":25},"04458a11e18c",[443,447],{"_key":444,"_type":21,"marks":445,"text":446},"04c921e3a42e",[294],"Incident Response",{"_key":448,"_type":21,"marks":449,"text":450},"31f8b29106fd",[],"\nFormal incident response plan; defined escalation paths; testing and post-incident reviews",[],{"_key":453,"_type":17,"children":454,"markDefs":463,"style":25},"e012c871e727",[455,459],{"_key":456,"_type":21,"marks":457,"text":458},"29cb972885c7",[294],"Risk Management",{"_key":460,"_type":21,"marks":461,"text":462},"97bd2d437582",[],"\nFormal risk assessment process; documented risk tracking; ongoing evaluation of threats and mitigations",[],{"_key":465,"_type":17,"children":466,"markDefs":475,"style":25},"dac3723569c0",[467,471],{"_key":468,"_type":21,"marks":469,"text":470},"a53c7848e754",[294],"Change Management",{"_key":472,"_type":21,"marks":473,"text":474},"879e5fcb6184",[],"\nControlled change processes; peer review and approval; security validation prior to deployment",[],{"_key":477,"_type":17,"children":478,"markDefs":487,"style":25},"7a64791291de",[479,483],{"_key":480,"_type":21,"marks":481,"text":482},"3bbcbcf25981",[294],"Third Party Risk Management",{"_key":484,"_type":21,"marks":485,"text":486},"0a981ba59bb0",[],"\nVendor due diligence; contractual safeguards; periodic reassessment of high-risk vendors",[],{"_key":489,"_type":17,"children":490,"markDefs":499,"style":25},"6b1dbd15e1a8",[491,495],{"_key":492,"_type":21,"marks":493,"text":494},"d86c21ec8e50",[294],"Governance & Oversight",{"_key":496,"_type":21,"marks":497,"text":498},"0616ec3f7281",[],"\nSecurity leadership under CISO; formal policies; executive and board oversight",[],{"_key":501,"_type":17,"children":502,"markDefs":511,"style":25},"b9eab820cf9e",[503,507],{"_key":504,"_type":21,"marks":505,"text":506},"022c30575d55",[294],"Independent Assurance\n",{"_key":508,"_type":21,"marks":509,"text":510},"3d95a4bb89e6",[],"SOC 2 Type II audit validating control design and operating effectiveness",[],{"_key":513,"_type":17,"children":514,"markDefs":518,"style":25},"3a4627a58e05",[515],{"_key":516,"_type":21,"marks":517,"text":182},"297798809060",[],[],{"_key":520,"_type":17,"children":521,"markDefs":526,"style":150},"cf0609a9768d",[522],{"_key":523,"_type":21,"marks":524,"text":525},"edfedf5b42c4",[294],"Security Resources",[],{"_key":528,"_type":529,"items":530,"title":534},"528af7c242b6","documentation",[531],{"slug":532,"title":533},"https://cdn.sanity.io/files/40fnhjbe/production/80ef485b707c5ff2344b05c31337e222c79001e1.pdf","Sales 2-pager -July 2023.pdf","Resources",{"_key":536,"_type":17,"children":537,"markDefs":541,"style":25},"e0f3798dfd98",[538],{"_key":539,"_type":21,"marks":540,"text":182},"16e3dc67355d",[],[],{"_key":543,"_type":17,"children":544,"markDefs":549,"style":150},"421a3a522040",[545],{"_key":546,"_type":21,"marks":547,"text":548},"d601e6341c5d",[294],"Modern infrastructure requires modern security controls",[],{"_key":551,"_type":17,"children":552,"markDefs":557,"style":159},"0c2f43512e23",[553],{"_key":554,"_type":21,"marks":555,"text":556},"83042ce835fd",[],"Security at Clear Street is an ongoing investment. We continuously enhance our controls, processes, and technology to protect our clients and support the trust placed in us.",[],{"_key":559,"_type":17,"children":560,"markDefs":570,"style":25},"ff38c0a3c643",[561,565],{"_key":562,"_type":21,"marks":563,"text":564},"818f2f9e1d43",[],"For more information or questions about Clear Street’s security program, please reach out to: ",{"_key":566,"_type":21,"marks":567,"text":569},"8609ae53ed6f",[568],"26e3903bf0f7","security@clearstreet.io",[571],{"_key":568,"_type":52},{"_key":573,"_type":17,"children":574,"markDefs":578,"style":25},"4e644bc8bbf1",[575],{"_key":576,"_type":21,"marks":577,"text":182},"37c09836ba4a",[],[],1779196473469]