Browse Definitions :
Definition

FpML (Financial Products Markup Language)

Financial Products Markup Language (FpML) is a business information exchange standard based on Extensible Markup Language ( XML ) that enables business-to-business over-the-counter (OTC) financial derivative transactions using the Internet . FpML is used between participating companies for communicating OTC transaction details, within a company for the purpose of sharing OTC transaction information, and between a participating company and an outside firm offering a service related to the OTC transaction. FpML is freely licensed and, because it is independent of the software or hardware used by participating companies, ensures interoperability . FpML focuses on interest rate swaps and Forward Rate Agreements (FRA) but will eventually be used for all aspects of OTC transactions.

OTC contracts shared between two companies are highly customized based on the needs of the parties involved. For this reason, prior to the arrival of the Internet and XML, it was not feasible to efficiently carry out the OTC contract process online. Today, companies can electronically structure and negotiate the terms of an OTC contract, execute and confirm the contract, communicate settlement details, and analyze risks using FpML.

Chase Manhattan Bank has reviewed and adopted FpML for their OTC Interest Rate Derivative applications. Fuji Capital Markets Corporation used the FpML definition to design their XML-based FRA confirmation prototype. And J.P. Morgan developed an FpML interest rate swap prototype application. Organizations participating in the development and application of FpML include Bank of America, Citigroup, Deutsche Bank, IBM, PricewaterhouseCoopers, J.P. Morgan, Reuters, and UBS Warburg.

This was last updated in March 2011

Continue Reading About FpML (Financial Products Markup Language)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close