[Referring to Item 4.2]; - backup [Reference to Item 8.3]; - cryptographic control [Referring to Item 6]. 3. Supervision of the operating personnel: - end user controls, for example: - protection of unattended
to make the management that are entrusted for the management of investments work on the basis of integrity and prudence with knowledge and expertise of the professional to ensure the full protection of
client by considering the following matters: (a) disclosure of accurate, complete, necessary and sufficient information to the client; (b) protection of the client’s confidentiality; (c) handling of the
services to the client by considering the following matters: (a) disclosure of accurate, complete, necessary and sufficient information to the client; (b) protection of the client’s confidentiality; (c
the use of cryptographic controls and key management for protection of sensitive and critical information; (3) policy on the transfer of information within organization’s networks and with external
guidelines, the manual and the disclosure checklists available on the SEC website. Table of Contents Part 1: Business Operation Page 1. Policy and business overview 2. Nature of business 3. Rick factors 4
procedure for providing services by considering the following matters: (a) disclosure of accurate, complete, necessary and sufficient information in order for the service user to choose a service or make an
services to the service user by considering the following matters: (a) disclosure of accurate, complete, necessary and sufficient information for the service user to choose services or make investment
in the interest of investor protection or to ensure the uniformity of operating standards. Clause 9 Apart from what specifically prescribed earlier, the SEC Office shall have the power to prescribe
the protection and maintenance of the best interest of investors under acceptable risk exposure. Therefore, in the supervision of the business of mutual fund or private fund management, it is necessary