the use of cryptographic controls and key management for protection of sensitive and critical information; (3) policy on the transfer of information within organization’s networks and with external
Item 11]. 4. Management of the computer network systems and information transfer: - communications security [Referring to Item 9] - information transfer [Referring to Item 9.2] 5. Protection against
, it should assess related affect and record such alteration up to date, including communicate to the concerned person for acknowledgement. [M] · It should install software as necessary for operation and
rights, construct, purchase, provide, sell, dispose, rent lease, hire purchase, grant of hire purchase, borrow, lend accept pledge, accept mortgage, exchange, transfer, accept transfer, or take any action
preparing records of clients’ assets from those responsible for physical keeping of such assets , and each transfer of clients’ assets shall be approved by the company’s authorized person who shall be neither
otherwise entitled. Clause 3 Intermediaries shall identify its critical functions, assess their risks of major operational disruptions, conduct business impact analysis and assess potential damages arising
during the period of providing services: (1) compile and assess the information of the service-receiving client for the following purposes: (a) to know the client; (b) to categorize the client; (c) to
following actions during the period of providing services: (1) compile and assess the information of the service-receiving client for the following purposes: (a) to know the client; (b) to categorize the
securities company shall identify its critical functions, assess their risks of major operational disruptions, conduct business impact analysis and assess potential damages arising from major operational
) “mutual fund merger” means merger of two mutual funds or more into a new mutual fund established to purchase or accept the transfer of assets, rights and duties of former mutual funds as specified in the