Re: Operational Control and Information Technology Security of Securities Companies Whereas in these days securities companies widely accept information technology as an instrument for securities
year; (3) To adjust security measures to be commensurate with the risks of small business operators by, for example, reducing the penetration testing frequency, increasing access control
: IT Security with the following details: 2.1 Information Security Policy; 2.2 Organization of Information Security; 2.3 Human Resource Security; 2.4 Asset Management; 2.5 Access Control 2.6
) Chapter 2: IT Security with the following details: 2.1 Information Security Policy; 2.2 Organization of Information Security; 2.3 Human Resource Security; 2.4 Asset Management; 2.5 Access Control 2.6
Ladkrabang), (7) the ASEAN Chief Information Officer Association (ACIOA), (8) the Thailand Information Security Association (TISA), and (9) the Information Systems Audit and Control Association – Bangkok
Rules, Conditions and Procedures for Operational Control in Underwriting of Securities (No. 2)
="text-align: left;">(2) หมวดที่ 2 การรักษาความมั่นคงปลอดภัยของระบบเทคโนโลยีสารสนเทศ (IT security)โดยมีรายละเอียดดังต่อไปนี้ 2.1  
/select?q=electronic possession OR "electronic possession" OR "electrical ownership" OR "electrical control" OR "digital ownership" OR "digital control"&wt=json&indent=true&facet=true&facet.field
/select?q=electronic possession OR "electronic possession" OR "electrical ownership" OR "electrical control" OR "digital ownership" OR "digital control"&wt=json&indent=true&facet=true&facet.field
implement effective information technology risk control measures on a continuing basis without imposing undue burdens. The SEC is therefore conducting this public hearing on the proposed revisions to the