provides this practice guidelines for being a guideline in practice through which covers a critical matter of business continuity management that should be applied by each intermediary and for determining a
be a qualified person with independence, objectivity and required competency; (3) Update the requirements per current standards and guidelines to be in alignment with international standards and other
Internet trade clients, as defined in the table attached hereto. It should be required to monitor and analyze, based on the risk assessment of the organization, logs recorded from the use of critical
clients, as defined in the table attached hereto. It should be required to monitor and analyze, based on the risk assessment of the organization, logs recorded from the use of critical information systems
clients, as defined in the table attached hereto. It should be required to monitor and analyze, based on the risk assessment of the organization, logs recorded from the use of critical information systems
the type, strength and quality of the encryption algorithm based on a result of risk assessment and the required level of protection on sensitive and critical information. Also, such policy should
algorithm based on a result of risk assessment and the required level of protection on sensitive and critical information. Also, such policy should identify persons responsible for implementing policy on the
resilience of the defined system they operate within, as indicated by the boundaries of and critical interdependencies with that system. The issuance is required to demonstrate that there will be ongoing
obtain access to the contract. Indicate whether the issuer is required to make periodic disclosure such as disclose the evidence periodically that the issuer is not in default or that it is in full
the Capital Market (Normal) I hereby attach the supporting documents required by the Securities and Exchange Commission Office (“SEC Office”) and confirm my willingness to provide any other information