to Item 11]. 4. Management of the computer network systems and information transfer: - communications security [Referring to Item 9] - information transfer [Referring to Item 9.2] 5. Protection against
: Operational Control and Security of the Information Technology of Securities Company For the purpose of rendering the securities companies to efficiently comply with the Notification of the Office of Securities
with Chapter 1; (2) establishment of policies, measures, and management arrangement concerning information security in accordance with Chapter 2; (3) management of IT assets and the access control to
with Chapter 1; (2) establishment of policies, measures, and management arrangement concerning information security in accordance with Chapter 2; (3) management of IT assets and the access control to
in auditing and reviewing its 2014 and Q1/2015 financial statements where the auditor expressed qualified opinions due to limitation on scope of audit imposed by the company management. EIC must submit
accounting principles. Moreover, the auditor was unable to find sufficient supporting evidence to satisfy the audit procedures due to limitation on scope of audit imposed by the PICNI management in various
increased .In addition the Social security revenue of subsidiaries decreased because of the uncertainty of the payment system of Social security office. 2. Cost of hospital operations & Administrative
risks that are incurred from the connectivity of operations. For instance, if the system of any one partner faces instability or a security problem, it may have a wide-ranging impact on customers all
banking business, directly and indirectly. In detail: 1. Cyber Security Risk Amid rapid technological change, Thai consumers have readily embraced the new tech trends. Obviously, economic activity
’ qualified opinions resulted from limitation on their scope of audit/review. Hence, the auditors were unable to obtain sufficient and appropriate audit evidence with respect to valuation of investment in PT