
Compliance
Silver Rock Capital Holdings (“SRCH”) is committed to fair dealing, investor protection, and regulatory excellence. This page summarizes our program and the practical steps we follow every day. It is informational and not legal advice; our policies may be updated as regulations evolve.
These standards apply to SRCH and its personnel, as well as contractors and vendors who access our systems or information. When SRCH operates in regulated jurisdictions, we comply with applicable laws, rules, and industry codes.
Compliance
Silver Rock Capital Holdings (“SRCH”)
is committed to fair dealing, investor protection, and regulatory excellence. This page summarizes our program and the practical steps we follow every day. It is informational and not legal advice; our policies may be updated as regulations evolve.
These standards apply to SRCH and its personnel, as well as contractors and vendors who access our systems or information. When SRCH operates in regulated jurisdictions, we comply with applicable laws, rules, and industry codes.
Compliance
Silver Rock Capital Holdings (“SRCH”) is committed to fair dealing, investor protection, and regulatory excellence. This page summarizes our program and the practical steps we follow every day. It is informational and not legal advice; our policies may be updated as regulations evolve.
These standards apply to SRCH and its personnel, as well as contractors and vendors who access our systems or information. When SRCH operates in regulated jurisdictions, we comply with applicable laws, rules, and industry codes.

1) Code of Ethics & Professional Conduct
Principles: integrity, fairness, accountability, confidentiality, and respect.
How we do it, step by step:
Annual certification by all personnel to the Code.
Pre-clear personal securities trading where applicable; maintain restricted lists.
Disclose and pre-approve outside business activities and board seats.
Record and pre-approve gifts/hospitality; decline anything that could impair judgment.
Report violations immediately; enforce with proportionate discipline.
2) Conflicts of Interest
Principle: identify, disclose, manage, and monitor conflicts so clients and counterparties are treated fairly.
How we do it, step by step:
Map potential conflicts (fees, valuation, research coverage, personal holdings, vendor ties).
Disclose conflicts in plain English to investors/clients as required.
Establish controls (information barriers, independent reviews, recusals).
Document decisions in the compliance log.
Monitor outcomes and refresh mitigants as facts change.
3) Material Non-Public Information (MNPI) & Insider Trading
Principle: zero tolerance for misuse of MNPI.
How we do it, step by step:
Train all personnel on MNPI definitions, sources, and red flags.
Maintain restricted and watch lists; suspend trading when appropriate.
Use formal wall-crossing procedures and insider lists for due diligence.
Segregate deal data in need-to-know folders; audit access.
Escalate suspected breaches to Compliance; document remedial actions.
4) Research Independence & Transparency
Principle: analysis must be objective, reproducible, and properly disclosed.
How we do it, step by step:
Publish methodology and key assumptions; cite sources.
Disclose SRCH holdings/relationships relevant to the subject where required.
Separate research views from marketing content; label opinions vs. facts.
Pre-publish compliance review for sensitive pieces.
Archive versions and backup data for reproducibility.
5) Information Barriers (“Chinese Walls”)
Principle: protect confidential and deal-sensitive information.
How we do it, step by step:
Segment networks, drives, and collaboration tools by function and deal.
Enforce least-privilege access with MFA and periodic access reviews.
Tag confidential files; restrict forwarding/sharing and external drives.
Use clean rooms and data rooms for diligence; log downloads.
Perform quarterly audits; remediate exceptions.
6) AML/KYC & Sanctions Screening
Principle: prevent misuse of our platform for illicit finance.
How we do it, step by step:
Collect identity, beneficial ownership, and source-of-funds documentation.
Verify documents and screen against applicable sanctions/PEP/adverse-media lists.
Risk-rate each relationship; obtain senior approval for higher-risk cases.
Monitor transactions and update KYC periodically or on trigger events.
Escalate and report suspicious activity consistent with local law.
7) Privacy & Data Protection
Principle: collect only what we need, protect it, and honor rights requests.
How we do it, step by step:
Data minimization: define purpose, limit fields, set retention.
Encrypt data in transit and at rest; apply role-based access.
Sign Data Processing Agreements with vendors; assess cross-border transfers.
Maintain procedures for data subject requests (access, deletion, correction).
Conduct privacy impact assessments for new tools and datasets.
8) Cybersecurity
Principle: defense-in-depth to safeguard systems and research.
How we do it, step by step:
MFA everywhere; endpoint protection and device encryption.
Patch management SLAs; vulnerability scans and penetration tests.
Network segmentation; continuous logging and anomaly detection.
Off-site encrypted backups; defined RTO/RPO for critical systems.
Incident Response Plan (IRP): detect → contain → eradicate → recover → post-mortem.
9) Investment Due Diligence & Investment Committee
Principle: rigorous, documented, repeatable decision-making.
How we do it, step by step:
Build an IC memo covering market, moat, unit economics, legal/regulatory, ESG, and risks.
Obtain third-party QoE/financial diligence as appropriate; validate data pipelines.
Independently test valuation sensitivities and downside cases.
Record IC debate and vote; capture conditions precedent and monitoring KPIs.
Set a 100-day plan and reporting cadence for portfolio oversight.
10) Valuation & Fair Value
Principle: fair, supportable, and consistently applied methodologies.
How we do it, step by step:
Select approach(es): market (comps), income (DCF), or cost—justify selection.
Normalize EBITDA/cash flows; document key assumptions (WACC, growth, multiples).
Cross-check across methods; analyze calibration to prior transactions.
Use independent reviews or third-party specialists where appropriate.
Reassess at defined intervals and upon impairment triggers.
11) Fees, Expenses & Side Letters
Principle: transparent, accurate, and fairly allocated.
How we do it, step by step:
Disclose fee mechanics and chargeable expenses up-front and in offering docs.
Allocate shared costs via documented methodology; no retroactive changes without consent.
Pre-approve any unusual charges; capture in the ledger with descriptions.
Track side-letter obligations and ensure equal-treatment clauses are respected.
Include fees/expenses in investor reporting with variances explained.
12) Marketing, Performance, and Communications
Principle: fair, balanced, and not misleading. No promises of future returns.
How we do it, step by step:
Substantiate all claims; avoid cherry-picking and hypothetical performance unless permitted and clearly labeled.
Include relevant risks and limitations; keep tone factual.
Pre-clear materials with Compliance; maintain version control.
Use approved disclaimers; include conflict disclosures where relevant.
Archive all external communications in accordance with recordkeeping rules.
13) Gifts, Entertainment & Political Activity
Principle: prevent undue influence and comply with applicable “pay-to-play” and ethics rules.
How we do it, step by step:
Pre-clear gifts/entertainment above de-minimis thresholds; record everything.
Prohibit cash or equivalents; refuse anything that creates an obligation.
Pre-clear political contributions where applicable; maintain logs.
Train annually on local restrictions and firm limits.
Review reports quarterly; remediate as needed.
14) Third-Party & Vendor Risk Management
Principle: trust but verify.
How we do it, step by step:
Perform due diligence (security, financial, compliance, sanctions).
Use contracts with confidentiality, data-protection, and performance clauses.
Request SOC/ISO attestations where appropriate; map sub-processors.
Monitor SLAs and incidents; maintain exit/transition plans.
Re-assess vendors annually or upon material change.
15) Recordkeeping & Retention
Principle: keep the right records, for the right time, in the right place.
How we do it, step by step:
Classify records (investment, research, communications, governance).
Apply retention schedules; use immutable storage where required.
Ensure searchability and prompt retrieval for audits/exams.
Secure destruction after retention expires.
Audit samples periodically; fix gaps.
16) Business Continuity & Disaster Recovery
Principle: resilience for investors, employees, and counterparties.
How we do it, step by step:
Identify critical processes/systems and set RTO/RPO targets.
Maintain alternate work locations and secure remote access.
Test backups and failovers; conduct tabletop exercises annually.
Crisis communications plan for stakeholders and regulators.
Post-incident review with corrective actions.
17) ESG & Responsible Investment
Principle: consider financially material ESG factors where relevant to risk-adjusted returns.
How we do it, step by step:
Apply an ESG materiality screen during diligence; avoid box-ticking.
Include ESG risks/opportunities and KPIs in IC memos and 100-day plans.
Engage portfolio management on practical improvements (safety, compliance, efficiency).
Monitor and report progress where agreed with investors.
Update positions as regulations and stakeholder expectations evolve.
18) Complaints & Inquiries
Principle: respectful, timely resolution.
How we do it, step by step:
Log every complaint/inquiry with date, parties, and summary.
Acknowledge receipt promptly with a target timeline.
Investigate facts; obtain documents/interviews as needed.
Provide a written response and remedy where appropriate.
Track themes and implement preventive measures.
19) Training, Testing & Culture
Principle: compliance is a daily habit, not a checklist.
How we do it, step by step:
Onboarding training plus annual refreshers (ethics, MNPI, AML, cyber, privacy).
Quarterly micro-trainings tied to real scenarios.
Phishing simulations and incident tabletop drills.
Annual attestations to key policies.
Anonymous pulse surveys; leadership sets the tone from the top.
20) Whistleblowing & Non-Retaliation
Principle: speak up safely.
How we do it, step by step:
Maintain anonymous reporting channels (hotline/email/portal).
Prohibit retaliation; violations are cause for discipline.
Triage by Compliance; escalate to independent reviewers where needed.
Protect confidentiality to the extent permitted by law.
Track outcomes and communicate lessons learned.
21) Governance & Oversight
Principle: clear ownership and accountability.
How we do it, step by step:
Designate a Chief Compliance Officer (CCO) with authority and resources.
Quarterly reports from Compliance to senior leadership/board or equivalent body.
Annual independent review of the compliance program’s design and effectiveness.
Document remedial plans and deadlines; track to closure.
Update policies for regulatory changes and exam feedback.
Disclosures
Silver Rock Capital Holdings "SRCH" operates subject to the laws and regulations of the jurisdictions in which it conducts business. Registrations, licenses, and affiliations, if and where applicable, are disclosed to investors/clients and regulators.
Nothing on this page constitutes investment, legal, tax, or accounting advice, or a solicitation to buy or sell any security. Past performance is not indicative of future results.
Contact
Compliance & Ethics: raizer@silverrockcapitalholdings.com
Mailing Address: 16901 Collins Avenue, Unit 2001, Sunny Isles 33160
Version Control
Effective date: September 22, 2025
Last review: September 22, 2025
Next scheduled review: March 22, 2026

1) Code of Ethics & Professional Conduct
Principles: integrity, fairness, accountability, confidentiality, and respect.
How we do it, step by step:
Annual certification by all personnel to the Code.
Pre-clear personal securities trading where applicable; maintain restricted lists.
Disclose and pre-approve outside business activities and board seats.
Record and pre-approve gifts/hospitality; decline anything that could impair judgment.
Report violations immediately; enforce with proportionate discipline.
2) Conflicts of Interest
Principle: identify, disclose, manage, and monitor conflicts so clients and counterparties are treated fairly.
How we do it, step by step:
Map potential conflicts (fees, valuation, research coverage, personal holdings, vendor ties).
Disclose conflicts in plain English to investors/clients as required.
Establish controls (information barriers, independent reviews, recusals).
Document decisions in the compliance log.
Monitor outcomes and refresh mitigants as facts change.
3) Material Non-Public Information (MNPI) & Insider Trading
Principle: zero tolerance for misuse of MNPI.
How we do it, step by step:
Train all personnel on MNPI definitions, sources, and red flags.
Maintain restricted and watch lists; suspend trading when appropriate.
Use formal wall-crossing procedures and insider lists for due diligence.
Segregate deal data in need-to-know folders; audit access.
Escalate suspected breaches to Compliance; document remedial actions.
4) Research Independence & Transparency
Principle: analysis must be objective, reproducible, and properly disclosed.
How we do it, step by step:
Publish methodology and key assumptions; cite sources.
Disclose SRCH holdings/relationships relevant to the subject where required.
Separate research views from marketing content; label opinions vs. facts.
Pre-publish compliance review for sensitive pieces.
Archive versions and backup data for reproducibility.
5) Information Barriers (“Chinese Walls”)
Principle: protect confidential and deal-sensitive information.
How we do it, step by step:
Segment networks, drives, and collaboration tools by function and deal.
Enforce least-privilege access with MFA and periodic access reviews.
Tag confidential files; restrict forwarding/sharing and external drives.
Use clean rooms and data rooms for diligence; log downloads.
Perform quarterly audits; remediate exceptions.
6) AML/KYC & Sanctions Screening
Principle: prevent misuse of our platform for illicit finance.
How we do it, step by step:
Collect identity, beneficial ownership, and source-of-funds documentation.
Verify documents and screen against applicable sanctions/PEP/adverse-media lists.
Risk-rate each relationship; obtain senior approval for higher-risk cases.
Monitor transactions and update KYC periodically or on trigger events.
Escalate and report suspicious activity consistent with local law.
7) Privacy & Data Protection
Principle: collect only what we need, protect it, and honor rights requests.
How we do it, step by step:
Data minimization: define purpose, limit fields, set retention.
Encrypt data in transit and at rest; apply role-based access.
Sign Data Processing Agreements with vendors; assess cross-border transfers.
Maintain procedures for data subject requests (access, deletion, correction).
Conduct privacy impact assessments for new tools and datasets.
8) Cybersecurity
Principle: defense-in-depth to safeguard systems and research.
How we do it, step by step:
MFA everywhere; endpoint protection and device encryption.
Patch management SLAs; vulnerability scans and penetration tests.
Network segmentation; continuous logging and anomaly detection.
Off-site encrypted backups; defined RTO/RPO for critical systems.
Incident Response Plan (IRP): detect → contain → eradicate → recover → post-mortem.
9) Investment Due Diligence & Investment Committee
Principle: rigorous, documented, repeatable decision-making.
How we do it, step by step:
Build an IC memo covering market, moat, unit economics, legal/regulatory, ESG, and risks.
Obtain third-party QoE/financial diligence as appropriate; validate data pipelines.
Independently test valuation sensitivities and downside cases.
Record IC debate and vote; capture conditions precedent and monitoring KPIs.
Set a 100-day plan and reporting cadence for portfolio oversight.
10) Valuation & Fair Value
Principle: fair, supportable, and consistently applied methodologies.
How we do it, step by step:
Select approach(es): market (comps), income (DCF), or cost—justify selection.
Normalize EBITDA/cash flows; document key assumptions (WACC, growth, multiples).
Cross-check across methods; analyze calibration to prior transactions.
Use independent reviews or third-party specialists where appropriate.
Reassess at defined intervals and upon impairment triggers.
11) Fees, Expenses & Side Letters
Principle: transparent, accurate, and fairly allocated.
How we do it, step by step:
Disclose fee mechanics and chargeable expenses up-front and in offering docs.
Allocate shared costs via documented methodology; no retroactive changes without consent.
Pre-approve any unusual charges; capture in the ledger with descriptions.
Track side-letter obligations and ensure equal-treatment clauses are respected.
Include fees/expenses in investor reporting with variances explained.
12) Marketing, Performance, and Communications
Principle: fair, balanced, and not misleading. No promises of future returns.
How we do it, step by step:
Substantiate all claims; avoid cherry-picking and hypothetical performance unless permitted and clearly labeled.
Include relevant risks and limitations; keep tone factual.
Pre-clear materials with Compliance; maintain version control.
Use approved disclaimers; include conflict disclosures where relevant.
Archive all external communications in accordance with recordkeeping rules.
13) Gifts, Entertainment & Political Activity
Principle: prevent undue influence and comply with applicable “pay-to-play” and ethics rules.
How we do it, step by step:
Pre-clear gifts/entertainment above de-minimis thresholds; record everything.
Prohibit cash or equivalents; refuse anything that creates an obligation.
Pre-clear political contributions where applicable; maintain logs.
Train annually on local restrictions and firm limits.
Review reports quarterly; remediate as needed.
14) Third-Party & Vendor Risk Management
Principle: trust but verify.
How we do it, step by step:
Perform due diligence (security, financial, compliance, sanctions).
Use contracts with confidentiality, data-protection, and performance clauses.
Request SOC/ISO attestations where appropriate; map sub-processors.
Monitor SLAs and incidents; maintain exit/transition plans.
Re-assess vendors annually or upon material change.
15) Recordkeeping & Retention
Principle: keep the right records, for the right time, in the right place.
How we do it, step by step:
Classify records (investment, research, communications, governance).
Apply retention schedules; use immutable storage where required.
Ensure searchability and prompt retrieval for audits/exams.
Secure destruction after retention expires.
Audit samples periodically; fix gaps.
16) Business Continuity & Disaster Recovery
Principle: resilience for investors, employees, and counterparties.
How we do it, step by step:
Identify critical processes/systems and set RTO/RPO targets.
Maintain alternate work locations and secure remote access.
Test backups and failovers; conduct tabletop exercises annually.
Crisis communications plan for stakeholders and regulators.
Post-incident review with corrective actions.
17) ESG & Responsible Investment
Principle: consider financially material ESG factors where relevant to risk-adjusted returns.
How we do it, step by step:
Apply an ESG materiality screen during diligence; avoid box-ticking.
Include ESG risks/opportunities and KPIs in IC memos and 100-day plans.
Engage portfolio management on practical improvements (safety, compliance, efficiency).
Monitor and report progress where agreed with investors.
Update positions as regulations and stakeholder expectations evolve.
18) Complaints & Inquiries
Principle: respectful, timely resolution.
How we do it, step by step:
Log every complaint/inquiry with date, parties, and summary.
Acknowledge receipt promptly with a target timeline.
Investigate facts; obtain documents/interviews as needed.
Provide a written response and remedy where appropriate.
Track themes and implement preventive measures.
19) Training, Testing & Culture
Principle: compliance is a daily habit, not a checklist.
How we do it, step by step:
Onboarding training plus annual refreshers (ethics, MNPI, AML, cyber, privacy).
Quarterly micro-trainings tied to real scenarios.
Phishing simulations and incident tabletop drills.
Annual attestations to key policies.
Anonymous pulse surveys; leadership sets the tone from the top.
20) Whistleblowing & Non-Retaliation
Principle: speak up safely.
How we do it, step by step:
Maintain anonymous reporting channels (hotline/email/portal).
Prohibit retaliation; violations are cause for discipline.
Triage by Compliance; escalate to independent reviewers where needed.
Protect confidentiality to the extent permitted by law.
Track outcomes and communicate lessons learned.
21) Governance & Oversight
Principle: clear ownership and accountability.
How we do it, step by step:
Designate a Chief Compliance Officer (CCO) with authority and resources.
Quarterly reports from Compliance to senior leadership/board or equivalent body.
Annual independent review of the compliance program’s design and effectiveness.
Document remedial plans and deadlines; track to closure.
Update policies for regulatory changes and exam feedback.
Disclosures
Silver Rock Capital Holdings "SRCH" operates subject to the laws and regulations of the jurisdictions in which it conducts business. Registrations, licenses, and affiliations, if and where applicable, are disclosed to investors/clients and regulators.
Nothing on this page constitutes investment, legal, tax, or accounting advice, or a solicitation to buy or sell any security. Past performance is not indicative of future results.
Contact
Compliance & Ethics: raizer@silverrockcapitalholdings.com
Mailing Address: 16901 Collins Avenue, Unit 2001, Sunny Isles 33160
Version Control
Effective date: September 22, 2025
Last review: September 22, 2025
Next scheduled review: March 22, 2026

1) Code of Ethics & Professional Conduct
Principles: integrity, fairness, accountability, confidentiality, and respect.
How we do it, step by step:
Annual certification by all personnel to the Code.
Pre-clear personal securities trading where applicable; maintain restricted lists.
Disclose and pre-approve outside business activities and board seats.
Record and pre-approve gifts/hospitality; decline anything that could impair judgment.
Report violations immediately; enforce with proportionate discipline.
2) Conflicts of Interest
Principle: identify, disclose, manage, and monitor conflicts so clients and counterparties are treated fairly.
How we do it, step by step:
Map potential conflicts (fees, valuation, research coverage, personal holdings, vendor ties).
Disclose conflicts in plain English to investors/clients as required.
Establish controls (information barriers, independent reviews, recusals).
Document decisions in the compliance log.
Monitor outcomes and refresh mitigants as facts change.
3) Material Non-Public Information (MNPI) & Insider Trading
Principle: zero tolerance for misuse of MNPI.
How we do it, step by step:
Train all personnel on MNPI definitions, sources, and red flags.
Maintain restricted and watch lists; suspend trading when appropriate.
Use formal wall-crossing procedures and insider lists for due diligence.
Segregate deal data in need-to-know folders; audit access.
Escalate suspected breaches to Compliance; document remedial actions.
4) Research Independence & Transparency
Principle: analysis must be objective, reproducible, and properly disclosed.
How we do it, step by step:
Publish methodology and key assumptions; cite sources.
Disclose SRCH holdings/relationships relevant to the subject where required.
Separate research views from marketing content; label opinions vs. facts.
Pre-publish compliance review for sensitive pieces.
Archive versions and backup data for reproducibility.
5) Information Barriers (“Chinese Walls”)
Principle: protect confidential and deal-sensitive information.
How we do it, step by step:
Segment networks, drives, and collaboration tools by function and deal.
Enforce least-privilege access with MFA and periodic access reviews.
Tag confidential files; restrict forwarding/sharing and external drives.
Use clean rooms and data rooms for diligence; log downloads.
Perform quarterly audits; remediate exceptions.
6) AML/KYC & Sanctions Screening
Principle: prevent misuse of our platform for illicit finance.
How we do it, step by step:
Collect identity, beneficial ownership, and source-of-funds documentation.
Verify documents and screen against applicable sanctions/PEP/adverse-media lists.
Risk-rate each relationship; obtain senior approval for higher-risk cases.
Monitor transactions and update KYC periodically or on trigger events.
Escalate and report suspicious activity consistent with local law.
7) Privacy & Data Protection
Principle: collect only what we need, protect it, and honor rights requests.
How we do it, step by step:
Data minimization: define purpose, limit fields, set retention.
Encrypt data in transit and at rest; apply role-based access.
Sign Data Processing Agreements with vendors; assess cross-border transfers.
Maintain procedures for data subject requests (access, deletion, correction).
Conduct privacy impact assessments for new tools and datasets.
8) Cybersecurity
Principle: defense-in-depth to safeguard systems and research.
How we do it, step by step:
MFA everywhere; endpoint protection and device encryption.
Patch management SLAs; vulnerability scans and penetration tests.
Network segmentation; continuous logging and anomaly detection.
Off-site encrypted backups; defined RTO/RPO for critical systems.
Incident Response Plan (IRP): detect → contain → eradicate → recover → post-mortem.
9) Investment Due Diligence & Investment Committee
Principle: rigorous, documented, repeatable decision-making.
How we do it, step by step:
Build an IC memo covering market, moat, unit economics, legal/regulatory, ESG, and risks.
Obtain third-party QoE/financial diligence as appropriate; validate data pipelines.
Independently test valuation sensitivities and downside cases.
Record IC debate and vote; capture conditions precedent and monitoring KPIs.
Set a 100-day plan and reporting cadence for portfolio oversight.
10) Valuation & Fair Value
Principle: fair, supportable, and consistently applied methodologies.
How we do it, step by step:
Select approach(es): market (comps), income (DCF), or cost—justify selection.
Normalize EBITDA/cash flows; document key assumptions (WACC, growth, multiples).
Cross-check across methods; analyze calibration to prior transactions.
Use independent reviews or third-party specialists where appropriate.
Reassess at defined intervals and upon impairment triggers.
11) Fees, Expenses & Side Letters
Principle: transparent, accurate, and fairly allocated.
How we do it, step by step:
Disclose fee mechanics and chargeable expenses up-front and in offering docs.
Allocate shared costs via documented methodology; no retroactive changes without consent.
Pre-approve any unusual charges; capture in the ledger with descriptions.
Track side-letter obligations and ensure equal-treatment clauses are respected.
Include fees/expenses in investor reporting with variances explained.
12) Marketing, Performance, and Communications
Principle: fair, balanced, and not misleading. No promises of future returns.
How we do it, step by step:
Substantiate all claims; avoid cherry-picking and hypothetical performance unless permitted and clearly labeled.
Include relevant risks and limitations; keep tone factual.
Pre-clear materials with Compliance; maintain version control.
Use approved disclaimers; include conflict disclosures where relevant.
Archive all external communications in accordance with recordkeeping rules.
13) Gifts, Entertainment & Political Activity
Principle: prevent undue influence and comply with applicable “pay-to-play” and ethics rules.
How we do it, step by step:
Pre-clear gifts/entertainment above de-minimis thresholds; record everything.
Prohibit cash or equivalents; refuse anything that creates an obligation.
Pre-clear political contributions where applicable; maintain logs.
Train annually on local restrictions and firm limits.
Review reports quarterly; remediate as needed.
14) Third-Party & Vendor Risk Management
Principle: trust but verify.
How we do it, step by step:
Perform due diligence (security, financial, compliance, sanctions).
Use contracts with confidentiality, data-protection, and performance clauses.
Request SOC/ISO attestations where appropriate; map sub-processors.
Monitor SLAs and incidents; maintain exit/transition plans.
Re-assess vendors annually or upon material change.
15) Recordkeeping & Retention
Principle: keep the right records, for the right time, in the right place.
How we do it, step by step:
Classify records (investment, research, communications, governance).
Apply retention schedules; use immutable storage where required.
Ensure searchability and prompt retrieval for audits/exams.
Secure destruction after retention expires.
Audit samples periodically; fix gaps.
16) Business Continuity & Disaster Recovery
Principle: resilience for investors, employees, and counterparties.
How we do it, step by step:
Identify critical processes/systems and set RTO/RPO targets.
Maintain alternate work locations and secure remote access.
Test backups and failovers; conduct tabletop exercises annually.
Crisis communications plan for stakeholders and regulators.
Post-incident review with corrective actions.
17) ESG & Responsible Investment
Principle: consider financially material ESG factors where relevant to risk-adjusted returns.
How we do it, step by step:
Apply an ESG materiality screen during diligence; avoid box-ticking.
Include ESG risks/opportunities and KPIs in IC memos and 100-day plans.
Engage portfolio management on practical improvements (safety, compliance, efficiency).
Monitor and report progress where agreed with investors.
Update positions as regulations and stakeholder expectations evolve.
18) Complaints & Inquiries
Principle: respectful, timely resolution.
How we do it, step by step:
Log every complaint/inquiry with date, parties, and summary.
Acknowledge receipt promptly with a target timeline.
Investigate facts; obtain documents/interviews as needed.
Provide a written response and remedy where appropriate.
Track themes and implement preventive measures.
19) Training, Testing & Culture
Principle: compliance is a daily habit, not a checklist.
How we do it, step by step:
Onboarding training plus annual refreshers (ethics, MNPI, AML, cyber, privacy).
Quarterly micro-trainings tied to real scenarios.
Phishing simulations and incident tabletop drills.
Annual attestations to key policies.
Anonymous pulse surveys; leadership sets the tone from the top.
20) Whistleblowing & Non-Retaliation
Principle: speak up safely.
How we do it, step by step:
Maintain anonymous reporting channels (hotline/email/portal).
Prohibit retaliation; violations are cause for discipline.
Triage by Compliance; escalate to independent reviewers where needed.
Protect confidentiality to the extent permitted by law.
Track outcomes and communicate lessons learned.
21) Governance & Oversight
Principle: clear ownership and accountability.
How we do it, step by step:
Designate a Chief Compliance Officer (CCO) with authority and resources.
Quarterly reports from Compliance to senior leadership/board or equivalent body.
Annual independent review of the compliance program’s design and effectiveness.
Document remedial plans and deadlines; track to closure.
Update policies for regulatory changes and exam feedback.
Disclosures
Silver Rock Capital Holdings "SRCH" operates subject to the laws and regulations of the jurisdictions in which it conducts business. Registrations, licenses, and affiliations, if and where applicable, are disclosed to investors/clients and regulators.
Nothing on this page constitutes investment, legal, tax, or accounting advice, or a solicitation to buy or sell any security. Past performance is not indicative of future results.
Contact
Compliance & Ethics: raizer@silverrockcapitalholdings.com
Mailing Address: 16901 Collins Avenue, Unit 2001, Sunny Isles 33160
Version Control
Effective date: September 22, 2025
Last review: September 22, 2025
Next scheduled review: March 22, 2026
