นโยบายการรักษาความปลอดภัยด้านเทคโนโลยีสารสนเทศ (IT security policy) PAGE - 2 - ประกาศสำนักงานคณะกรรมการกำกับหลักทรัพย์และตลาดหลักทรัพย์ ที่ อธ./น. 5/2547 เรื่อง แนวทางปฏิบัติในการควบคุมการปฏิบัติงาน
นโยบายการรักษาความปลอดภัยด้านเทคโนโลยีสารสนเทศ (IT security policy) เอกสารประกอบการ public hearing ร่างข้อบังคับและแนวทางปฏิบัติด้านเทคโนโลยีสารสนเทศ PAGE - 30 - เอกสารประกอบการ public hearing ร่าง
security as well as supervise, monitor and examine compliance with such policies, measures, and operating systems, and review the suitability thereof regularly; In the interest of meeting the aforesaid
give the securities company sufficient time for preparing or taking any action to allocate fund or solve an issue of maintaining the financial position possibly arising from operational risk. Clause 4 A
companies are able to set a priority of works and allocate its resources for business continuity management effectively. At least, companies should conduct a risk assessment and business impacts analysis once
of the REIT; (2) in case it is underwriting for the benefit of the parent company or the subsidiary company of the securities underwriter where the company wishes to distribute the held REIT units
Clause 8, a securities underwriter shall not allocate securities to the following persons: (1) itself or a co-underwriter; (2) a director, an executive, a major shareholder, a controlling person, a parent
with Chapter 1; (2) establishment of policies, measures, and management arrangement concerning information security in accordance with Chapter 2; (3) management of IT assets and the access control to
: Operational Control and Security for Information Technology of a Licensed Derivatives Broker. By virtue of the second paragraph of Clause 7 of the Notification of the Securities and Exchange Commission No
Operating Control and Information Technology Security of Securities Company By virtue of Paragraph 1(2) of Section 141 of the Securities and Exchange Act B.E. 2535, the SEC Office, with the approval of the