. Computer Operation. 8. IT Outsourcing. Policy of Security of the Information Technology. Objective Providing a policy of security of the information technology has an objective for the user and the concerned
Cryptographic Control; 2.7 Physical and Environmental Security; 2.8 Operations Security; 2.9 Communications Security; 2.10 System Acquisition, Development and Maintenance; 2.11 IT Outsourcing; 2.12 Information
ภาคผนวก 1 ภาคผนวก 1 กลุ่มประเทศ Organization for Economic Co-operation and Development (OECD) และประเทศที่มีฐานะการเงินเทียบเท่า ออสเตรเลีย เกาหลีใต้ ออสเตรีย ลักเซมเบิร์ก เบลเยียม เม็กซิโก แคนาดา
ภาคผนวก 1 ภาคผนวก 1 กลุ่มประเทศ Organization for Economic Co-operation and Development (OECD) และประเทศที่มีฐานะการเงินเทียบเท่า ออสเตรเลีย เกาหลีใต้ ออสเตรีย ลักเซมเบิร์ก เบลเยียม เม็กซิโก แคนาดา
units in order to achieve efficiency in the overall operation of the company. (4) have performance appraisal and personnel development in order to maintain staff’s professional competence to remain fit
structure 1.1 Segregation of work units and responsibilities Objective A management company shall have organisational structure that reflects the systematic segregation of duties. The mission, strategy
innovative development, products and/or services or the business model (if any). The objective is to demonstrate the Company’s continuing development to serve the needs of the stakeholders and to make
information security; (3) define the recovery time objective (RTO) for information system and its priority to be recovered based on its criticality and potential impact; (4) consider redundant information
of a collective investment scheme which has characteristics similar to a mutual fund but excluding the collective investment scheme with the objective of directly investing in properties relating to
) international financial institutions; (8) government agencies and state enterprise under the law on budgetary procedure; (9) the Financial Institutions Development Fund; (10) the Government Pension Fund; (11