guideline for risk assessment according to the degree of importance of the outsourced function; (6) information security system of a service provider for protecting the information of the intermediary and the
assessment according to the degree of importance of the outsourced function; (6) information security system of a service provider for protecting the information of the intermediary and the clients; 5 Clause 9
assessment according to the degree of importance of the outsourced function; (6) information security system of a service provider for protecting the information of the intermediary and the clients; 5 Clause 9
risks that are incurred from the connectivity of operations. For instance, if the system of any one partner faces instability or a security problem, it may have a wide-ranging impact on customers all
. Thai Oil Public Company Limited* 133,468,059 8.91 5. Bualuang Long-Term Equity Fund 45,364,300 3.03 6. Social Security Office 24,970,400 1.67 7. Bualuang Long-Term Equity Fund 75/25 23,548,100 1.57 8
mechanism for supervising relevant service providers has also been established to create trustworthiness and increased security. 4 Rules and Regulations Key Points 5. Securities and Exchange Act (No. 6) B.E
should select a critical business function which it considers that if emergency incidents happen, it will disrupt and significantly affect customers, business operation, financial status or reputation of
. In doing so, it shall be complied with the following approaches: 3.1 Defining Critical Business Function Companies should select a critical business function which it considers that if emergency
management, work system and data security in compliance with law and international standards, as well as appropriate user protection. 2. Eligible banks must have investment and income ratio of IT-related
with severe and significantly complex digital risk and cybersecurity challenges, we have established a Digital-Oriented Risk and Cyber Security Risk Management Framework in alignment with the strategy of