by such board of directors; (1) management of information technology risks which covers identification, assessment, and control of risks within the organization’s acceptable level; (2) allocation and
compliance of user account and password. · Providing the identification and authentication measure prior to access to the computer system strictly such as impose hardly password for presumption etc. and
. Controlling the compliance of user account and password. o Providing the identification and authentication measure prior to access to the computer system strictly such as impose hardly password for presumption
different situations. (4) compliance system: (a) arrange to have compliance officer and compliance unit to support and inspect investment management and related work to be in accordance with laws, code of
. (Unofficial Translation) Page 3 of 4 (4) compliance system: (a) arrange to have compliance officer and compliance unit to support and inspect investment management and related work to be in accordance with laws
suitable for different situations. (Unofficial Translation) Page 3 of 4 (4) compliance system: (a) arrange to have compliance officer and compliance unit to support and inspect investment management and
workshop to exchange information on cyber scams as well as identification and examination of crypto nominee accounts for representatives from public and private sectors. On this occasion, Ms. Jomkwan
, for the purpose of listing my name onto the Issuing Company’s Director and Executive Database of the company, to inspect my personal information relevant to consideration of the SEC Office and to
;s system for categorizing customers and offering debentures according to the customer classification, as well as its supervision were insufficiently stringent because CL did not inspect that the
method, as well as to increase the trustworthiness in the identification and authentication process for onboarding customers that could boost the standard of performing e-KYC in the capital market. The