participating in the regulatory sandbox, and that the service user’s consent is required prior to provision of services; (4) making an agreement with the service user related to obligations to damage that may be
rules: (1) having a procedure for providing services by considering the following matters: (a) disclosure of accurate, complete, necessary and sufficient information in order for the service user to
Operation. 8. IT Outsourcing. (Translation) -2- Policy of Security of the Information Technology. Objective Providing a policy of security of the information technology has an objective for the user and the
ensure that KBank’ s business can maintain healthy growth within appropriate risk limits under normal and stress scenarios. 11 Development of risk management system and framework for capital market and