client’s true identity (client identification), including the identity of the ultimate beneficial owner and the controlling person of the transactions; (2) verify the client’s identity using reliable sources
of cloud computing under Clause 8(1) which contains at least the following matters: (1) assess risks relating to the use of cloud computing services; (2) define areas or function the cloud computing
with a client. Such procedure should have adequate process to identify and verify client’s true identity in order to ensure that the client is the person appears on the documents referred to during the
otherwise entitled. Clause 3 Intermediaries shall identify its critical functions, assess their risks of major operational disruptions, conduct business impact analysis and assess potential damages arising
during the period of providing services: (1) compile and assess the information of the service-receiving client for the following purposes: (a) to know the client; (b) to categorize the client; (c) to
following actions during the period of providing services: (1) compile and assess the information of the service-receiving client for the following purposes: (a) to know the client; (b) to categorize the
securities company shall identify its critical functions, assess their risks of major operational disruptions, conduct business impact analysis and assess potential damages arising from major operational
Communications with relevant persons (7) Division 7 Cross-border communication (8) Division 8 Companies shall test and assess the BCP (Training, Exercising and Auditing) (9) Division 9 Examples of emergency
against any employee who has committed an IT security breach. Chapter 3 Management of IT Assets and Access Control _______________________ Clause 14 In managing IT assets and assess control of data and
ปฏิบัตินี้ ทั้งนี้ รายละเอียดดังกล่าวได้แก่เรื่องดังต่อไปนี้ (1) แนวทางปฏิบัติในการนำเทคโนโลยีมาใช้ในการทำความรู้จักลูกค้า (ก) การพิสูจน์ตัวตน (Identity proofing) (ข) การยืนยันตัวตน (Authentication) (ค) การ