[Referring to Item 4.2]; - backup [Reference to Item 8.3]; - cryptographic control [Referring to Item 6]. 3. Supervision of the operating personnel: - end user controls, for example: - protection of unattended
with a client. Such procedure should have adequate process to identify and verify client’s true identity in order to ensure that the client is the person appears on the documents referred to during the
client’s true identity (client identification), including the identity of the ultimate beneficial owner and the controlling person of the transactions; (2) verify the client’s identity using reliable sources
the business of the other party and the nature of such controlling power shall be depicted; and (b) The party that owns the funds does not want to obtain the legal protection under the provisions
ปฏิบัตินี้ ทั้งนี้ รายละเอียดดังกล่าวได้แก่เรื่องดังต่อไปนี้ (1) แนวทางปฏิบัติในการนำเทคโนโลยีมาใช้ในการทำความรู้จักลูกค้า (ก) การพิสูจน์ตัวตน (Identity proofing) (ข) การยืนยันตัวตน (Authentication) (ค) การ
such services; (12) clients’ asset An intermediary shall arrange adequate protection for clients’ assets when it is responsible for them; (13) relations with regulators An intermediary shall deal with
processes to ensure that the client is the same person whose identity appears in the evidentiary documentation of an application for doing business transactions with the securities company , and verify the
to make the management that are entrusted for the management of investments work on the basis of integrity and prudence with knowledge and expertise of the professional to ensure the full protection of
photocopies of identity cards / photocopies of passports of the persons applied for approval; O photocopies of house register appearing the names of persons applied for approval; O photocopies of educational
Law on Derivatives ; (17) derivatives business operator under the Law on Agricultural Futures Trading; (18) international financial institution; (19) Deposit Protection Agency; (20) Stock Exchange of