photocopies of identity cards / photocopies of passports of the persons applied for approval; O photocopies of house register appearing the names of persons applied for approval; O photocopies of educational
) First name (Mr./Mrs./Miss) ………………… Last name ………………… Former name (if any) ………………………………………………………… (2) Date/month/year of birth ……… Age ……..years / Nationality …………… Identity card ……………………………… No
with a client. Such procedure should have adequate process to identify and verify client’s true identity in order to ensure that the client is the person appears on the documents referred to during the
services; (4) verify the identity of users in networks, in particular, if the dynamic IP address is used. 5.2 User Access Management Objective: To ensure authorized user access and to prevent unauthorized
client’s true identity (client identification), including the identity of the ultimate beneficial owner and the controlling person of the transactions; (2) verify the client’s identity using reliable sources
ปฏิบัตินี้ ทั้งนี้ รายละเอียดดังกล่าวได้แก่เรื่องดังต่อไปนี้ (1) แนวทางปฏิบัติในการนำเทคโนโลยีมาใช้ในการทำความรู้จักลูกค้า (ก) การพิสูจน์ตัวตน (Identity proofing) (ข) การยืนยันตัวตน (Authentication) (ค) การ
repealed. Clause 2 In this Notification: “ regulatory sandbox ” means a framework for experimenting and developing an innovation in a controlled environment to support provision of services related to
sandbox ” means a framework for experimenting and developing an innovation in a controlled environment to support provision of services related to capital market. “ approved person ” means a person who is
processes to ensure that the client is the same person whose identity appears in the evidentiary documentation of an application for doing business transactions with the securities company , and verify the
enable assignment of assess rights; (b) the allocation and use of privileged access rights should be restricted and controlled; (c) the allocation of passwords should be controlled through a formal