นโยบายการรักษาความปลอดภัยด้านเทคโนโลยีสารสนเทศ (IT security policy) PAGE - 2 - ประกาศสำนักงานคณะกรรมการกำกับหลักทรัพย์และตลาดหลักทรัพย์ ที่ อธ./น. 5/2547 เรื่อง แนวทางปฏิบัติในการควบคุมการปฏิบัติงาน
นโยบายการรักษาความปลอดภัยด้านเทคโนโลยีสารสนเทศ (IT security policy) เอกสารประกอบการ public hearing ร่างข้อบังคับและแนวทางปฏิบัติด้านเทคโนโลยีสารสนเทศ PAGE - 30 - เอกสารประกอบการ public hearing ร่าง
. Balance at end 25x1 x x x x x x x (x) x x /1In case of the company have both ordinary share and preferred share, it shall separate ordinary share and preferred share. And in case of having both a surplus
. Clause 17 Information shall be classified in terms of sensitivity and other IT assets (i.e., systems asset and equipment asset) shall be classified in terms of criticality in order that such IT assets are
arbitral process under the Derivatives Act B.E. 2546 (2003) in addition to the arbitral process under the Securities and Exchange Act B.E. 2535 (1992), it is deemed necessary to improve the processes and
and other IT assets (i.e., systems asset and equipment asset) shall be classified in terms of criticality in order that such IT assets are given an appropriate level of protection in accordance with
a year or when there is a significant change affecting the risks and impacts as such. In doing so, it shall be complied with the following approaches: 3.1 Defining Critical Business Function Companies
institutional investor under Section 3 and the Notification of the Securities and Exchange Commission concerning Additional Determination of Type of Juristic Person Classified as Institutional Investors . Chapter
structures indicate that it is acting as a business unit within a financial conglomerate as accepted by the Office. The procedures mentioned in the first paragraph should contain all necessary details to be
issued by virtue of this Notification or other Notifications thereof, have not been stipulated as a requirement for any particular business operation, or have been stipulated such requirement but it is