Commission SorThor/Nor. 34/2547 Re: Operational Control and Information Technology Security of Securities Companies 20/07/2004 01/02/2005 2. Notification of the Office of the Securities and Exchange
Commission SorThor/Nor. 34/2547 Re: Operational Control and Information Technology Security of Securities Companies 20/07/2004 01/02/2005 2. Notification of the Office of the Securities and Exchange
Commission SorThor/Nor. 34/2547 Re: Operational Control and Information Technology Security of Securities Companies 20/07/2004 01/02/2005 2. Notification of the Office of the Securities and Exchange
Commission SorThor/Nor. 34/2547 Re: Operational Control and Information Technology Security of Securities Companies 20/07/2004 01/02/2005 2. Notification of the Office of the Securities and Exchange
4 ร้อยละของมูลค่าธุรกรรมของลูกค้ารายย่อย https://publish.sec.or.th/nrs/9645p.xlsx securities-ITchecklist.xlsx security) (2) การบริหารจัดการบุคลากร และบุคคลภายนอก (3) การบริหารจัดการทรัพย์สินด้าน IT
regulations specified by the SEC and arrange for IT security audit and a penetration test by a knowledgeable and skilled auditor who is independent from the responsible IT Unit before commencing service
following and inquiring about cybersecurity measures and data security from your service providers, including cooperating with them to ensure that your data and assets are safe.” In addition, the SEC
Computing (8) Digital Inclusion (9) Data Centres (10) Information Security (11) Service Innovation (12) Information Management (13) Green Government (14) Business Process (15) Government Transformation of
Cloud Computing 1ISO/IEC 27017-2015 : Code of practice for information security controls based on ISO/IEC 27002 for cloud services NIST: National Institute of Standards and Technology : Guidelines on
category 1 in accordance to the SEC’s Act no. Tor Jor 20/2551 on Regulations on transaction of asset acquisition and disposition dated August 31, 2008, and the Security Exchange Act on disclosure and