of information (client verification) (3) record information gathered as well as opinions made under the KYC/CDD process. In identifying the client’s true identity under (1), the securities company must
shall have a clear principle in taking of purchase or redemption order of investment units and verification of the acceptance of such order shall to be in accordance with the prospectus in order to gain
of cloud computing under Clause 8(1) which contains at least the following matters: (1) assess risks relating to the use of cloud computing services; (2) define areas or function the cloud computing
arranging and keeping information, documents and evidentiary documentations relating to the intermediary ’s business. In this regard, such system shall serve accurately and thoroughly, including verification
otherwise entitled. Clause 3 Intermediaries shall identify its critical functions, assess their risks of major operational disruptions, conduct business impact analysis and assess potential damages arising
during the period of providing services: (1) compile and assess the information of the service-receiving client for the following purposes: (a) to know the client; (b) to categorize the client; (c) to
following actions during the period of providing services: (1) compile and assess the information of the service-receiving client for the following purposes: (a) to know the client; (b) to categorize the
securities company shall identify its critical functions, assess their risks of major operational disruptions, conduct business impact analysis and assess potential damages arising from major operational
Communications with relevant persons (7) Division 7 Cross-border communication (8) Division 8 Companies shall test and assess the BCP (Training, Exercising and Auditing) (9) Division 9 Examples of emergency
against any employee who has committed an IT security breach. Chapter 3 Management of IT Assets and Access Control _______________________ Clause 14 In managing IT assets and assess control of data and