นโยบายการรักษาความปลอดภัยด้านเทคโนโลยีสารสนเทศ (IT security policy) PAGE - 2 - ประกาศสำนักงานคณะกรรมการกำกับหลักทรัพย์และตลาดหลักทรัพย์ ที่ อธ./น. 5/2547 เรื่อง แนวทางปฏิบัติในการควบคุมการปฏิบัติงาน
นโยบายการรักษาความปลอดภัยด้านเทคโนโลยีสารสนเทศ (IT security policy) เอกสารประกอบการ public hearing ร่างข้อบังคับและแนวทางปฏิบัติด้านเทคโนโลยีสารสนเทศ PAGE - 30 - เอกสารประกอบการ public hearing ร่าง
date on which the information was recorded in the system. In this regard, during the first two years it shall be kept in a manner that is able to be retrieved promptly and inspected by the SEC. Clause 5
structures indicate that it is acting as a business unit within a financial conglomerate as accepted by the Office. The procedures mentioned in the first paragraph should contain all necessary details to be
person, categorized by underwriters, and submit it to the SEC Office together with reports on securities sales results. The name list of the largest allocated persons under the first paragraph shall
issued by virtue of this Notification or other Notifications thereof, have not been stipulated as a requirement for any particular business operation, or have been stipulated such requirement but it is
securities to each person, categorized by underwriters, and submit it to the Office together with reports on securities sales results. The name list of the largest allocated persons under the first paragraph
client or client’s authorized person. Clause 10. A securities company shall not utilize the client’s assets for the benefits of other clients, other persons or for itself unless it receives an order or
appoint it to act as securities broker. For the purpose of fairness to the parties, the SEC may specify any particulars which are material to the agreement.
, or have been stipulated such requirement but it is necessary to determine the implementation or to make clarification, the intermediary shall operate its business, or implement or clarify such