classification [Referring to Item 4.2]; - backup [Reference to Item 8.3]; - cryptographic control [Referring to Item 6]. 3. Supervision of the operating personnel: - end user controls, for example: - protection of
. No. 4 – Revision has been made to remove restrictions and minimize service users’ burden for proof of identity and identity verification. (Previously, service users had to be present in order to submit
; (d) non-public information protection system between the agent and its personnel; (e) supervisory system for making personnel to complete their functions in accordance with the law on securities and
; (d) non-public information protection system between the agent and its personnel; (e) supervisory system for making personnel to complete their functions in accordance with the law on securities and
system for investors’ information in order to prevent unrelated and unauthorized persons from accessing or amending information; (d) non-public information protection system between the agent and its
to collect, use or disclose personal information on the legal basis of public interest in accordance with Section 24(4), Paragraph 1(2) of Section 25, and Section 27 of the Personal Data Protection Act
to collect, use or disclose personal information on the legal basis of public interest in accordance with Section 24(4), Paragraph 1(2) of Section 25, and Section 27 of the Personal Data Protection Act
introduced customized financial services and innovations that provide greater customer convenience, speed and reliability with ever-greater consideration of consumer protection and customer privacy. Being
verification of the acceptance of such order shall to be in accordance with the prospectus in order to gain confidence among investors. Guidelines 1. Accepting of purchase or redemption order of investment units
จึงกำหนดมาตรฐานขั้นต่ำในการพิสูจน์ตัวตน เพื่อให้การรวบรวมและตรวจสอบข้อมูล หลักฐานของลูกค้า (identification และ verification) มีคุณภาพเพียงพอที่จะให้มั่นใจว่า 1) ลูกค้ามีตัวตนจริง มีเพียงคนเดียว 2) หลัก