; · abnormal operation ; · compliance and alteration a network by unauthorized person. · Preparing a network diagram which having a detail related to scope of internal network and external network and other
interest Total 1. Balance at the beginning 25x0 x x x x x x x (x) x x 2. Accumulation from write off x x x 3. Adjusted balance x x x x x x x (x) x x Alteration between a period 4. Appraisal surplus x x 5
); (5) review procedures and processes in the management of information security incidents, after the testing under (4) is carried out, at least once a year; (6) evaluate the results of the testing under
substitute personnel at operational level and management level, financing source, office equipments and information technology systems, as well as, should evaluate on a usage of finance and accesibility to
well as specify the investment ratios and conditions for the fund to comply. Clause 12. The management company shall regularly evaluate the performance of the respective funds and disclose the
internal control is rectified as follows: (1) monitor, inspect and evaluate the effectiveness of the operating procedures of the work unit responsible for the following functions by an independent auditor