{"id":306,"date":"2004-05-06T00:00:00","date_gmt":"2004-05-06T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/05\/06\/regulator-says-u-s-nearing-basel-bank-rules-deal\/"},"modified":"2021-12-30T11:36:59","modified_gmt":"2021-12-30T11:36:59","slug":"regulator-says-u-s-nearing-basel-bank-rules-deal","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/05\/06\/regulator-says-u-s-nearing-basel-bank-rules-deal\/","title":{"rendered":"Regulator says U.S. nearing Basel bank rules deal"},"content":{"rendered":"<p>U.S. bank regulators will make proposals at meetings with international counterparts next week aimed at wrapping up an agreement on the Basel Capital Accord by the end of June, said Senior Deputy Comptroller of the Currency Douglas Roeder.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The accord &#8212; known as Basel 2 because it would replace an existing regime &#8212; is a set of rules governing international bank capital and oversight and is focused on preventing financial problems from spreading across borders while taking into account modern risk management methods.<\/p>\n<p>But Roeder said the United States will conduct an extensive survey of how the new regulations will affect the estimated 10 large U.S. banks that must follow them.<\/p>\n<p>Officials have not publicly identified which 10 banks will be subject to the rules, but they must have at least $250 billion in assets or have 10 percent of their assets outside the United States.<\/p>\n<p>http:\/\/www.reuters.com\/financeNewsArticle.jhtml?type=bondsNews&#038;storyID=5065845<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-306","post","type-post","status-publish","format-standard","hentry","category-financial"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/306","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=306"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/306\/revisions"}],"predecessor-version":[{"id":2793,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/306\/revisions\/2793"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=306"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=306"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}