gather information on name, last name, nationality, occupation, residential address, contacting address, name of ultimate beneficial owner, name of ultimate controlling person, name of the entity
); (5) review procedures and processes in the management of information security incidents, after the testing under (4) is carried out, at least once a year; (6) evaluate the results of the testing under
substitute personnel at operational level and management level, financing source, office equipments and information technology systems, as well as, should evaluate on a usage of finance and accesibility to
well as specify the investment ratios and conditions for the fund to comply. Clause 12. The management company shall regularly evaluate the performance of the respective funds and disclose the
internal control is rectified as follows: (1) monitor, inspect and evaluate the effectiveness of the operating procedures of the work unit responsible for the following functions by an independent auditor
or documents given by a client, the intermediary shall review and update such information without delay by taking the following actions: (a) gather and recheck information in addition to the normal