operator in the same manner not participating in the regulatory sandbox , and that the service user’s consent is required prior to provision of services; (4) making an agreement with the service user related
procedure for providing services by considering the following matters: (a) disclosure of accurate, complete, necessary and sufficient information in order for the service user to choose a service or make an
. Computer Operation. 8. IT Outsourcing. Policy of Security of the Information Technology. Objective Providing a policy of security of the information technology has an objective for the user and the concerned