นโยบายการรักษาความปลอดภัยด้านเทคโนโลยีสารสนเทศ (IT security policy) PAGE - 2 - ประกาศสำนักงานคณะกรรมการกำกับหลักทรัพย์และตลาดหลักทรัพย์ ที่ อธ./น. 5/2547 เรื่อง แนวทางปฏิบัติในการควบคุมการปฏิบัติงาน
นโยบายการรักษาความปลอดภัยด้านเทคโนโลยีสารสนเทศ (IT security policy) เอกสารประกอบการ public hearing ร่างข้อบังคับและแนวทางปฏิบัติด้านเทคโนโลยีสารสนเทศ PAGE - 30 - เอกสารประกอบการ public hearing ร่าง
with Chapter 1; (2) establishment of policies, measures, and management arrangement concerning information security in accordance with Chapter 2; (3) management of IT assets and the access control to
that is distinguishable without any suspicion, and there must be separate account for each client’s assets and segregated from the account of its own, which should be kept it accurate, complete and up-to
: Operational Control and Security for Information Technology of a Licensed Derivatives Broker. By virtue of the second paragraph of Clause 7 of the Notification of the Securities and Exchange Commission No
security as well as supervise, monitor and examine compliance with such policies, measures, and operating systems, and review the suitability thereof regularly; In the interest of meeting the aforesaid
suspicion that such amount of money belongs to the client; (2) Securities: (a) segregating by depositing with a securities depository center or the Bank of Thailand by clearly indicate that such securities
Operating Control and Information Technology Security of Securities Company By virtue of Paragraph 1(2) of Section 141 of the Securities and Exchange Act B.E. 2535, the SEC Office, with the approval of the
particular category of securities business, except for a security company operating securities business in the category of securities dealing or securities underwriting or operating securities business in any
suspicion that it belongs to the clients; (2) securities; (a) segregated by deposit with central securities depository, or the Bank of Thailand in a manner that such deposits are clearly identified that the