Attention Investors: Prevent Unauthorized transactions in your Account -> Update your mobile numbers/email IDs with your stock brokers. Receive information of your transactions directly from Exchange on your mobile/email at the end of the day ..... Issued in the interest of investor

We also do Pro-Account trading in own account.

Ganpati Derivatice Services Private Limited

Procedure For Risk Management & Surveillance Deptt The objective of this process notes is to explain the Surveillance Process and systems used for Risk management Surveillance by Surveillance Department. The key points are following:

Dealer ID Creation

Department gets the details of new User ID from the Customer Relationship Department. Details are approved only by Marketing Head or Director. The details are uploaded using ENIT to NSE. Once NSE approves the User ID, ID is created and details of retail clients (obtained from Back Office) are mapped with the User ID using ODIN Admin. It is communicated to Customer that new User ID has been created.


NSE Cash trading is done through NEAT/CTCL terminal. CTCL is mapped with ODIN Admin that is provided to set margin limits for retail clients. We have only one CTCL server and one ODIN Admin ID (Chief user) that can monitor all the retail clients connected with that particular CTCL server. NEAT access is restricted to few branches and clients have CTCL. Margin Limits are set through ODIN Admin (Chief user) and surveillance department can check rejected orders in ODIN Admin. Margin limits are changed only on phone calls from designated people of Accounts department. Capital market surveillance for orders placed on CTCL is done using Odin Admin/Risk Server and surveillance for orders placed on NEAT is done by Risk Server. Risk Server only gives the margin utilized at the retail client or dealer.

General Points

Employees follow roles and responsibilities as communicated verbally by Department Manager.

All User Ids are password protected

Manuals for Risk Server are not available readily. These surveillance systems are used to monitor positions but orders that exceed the limits will be rejected .