code. Additional Guidelines 1. The examples of the control of access to information systems and applications under Clause 20(3)(b) are the protection against brute force log-on attempts and the retention
which should be considered whether a suspicious transaction report should be made to the anti-money laundering authorities: (1) the client attempts to open an account or conduct transactions under other
transactions be a suspicious transaction which should be considered whether a suspicious transaction report should be made to the anti-money laundering authorities: (1) the client attempts to open an account or
attempts to open an account or conduct transactions under other person’s names, or avoids using his own name to open an account or process the transaction; (2) the client insists to open several accounts of
outlets. By the end of 2020, approximately 40-50 Mikka outlets are expected to be opened, and around 100 outlets are expected to be opened the following year. Despite attempts to slowdown branch expansion
. The examples of the control of access to information systems and applications under Clause 20(3)(b) are the protection against brute force log-on attempts and the retention and examination of log-in
the Group’s financial performance and position at risks during the start-up phase. However, we believe that our feat of endeavors as mentioned shall be considered an investment from strategic
-up phase. However, we believe that our feat of endeavors as mentioned shall be considered an investment from strategic perspective to substantiate a solid platform instrumental in driving business
log / login-logout log / login attempts / firewall log ( กำหนดให้มีการสอบทานและวิเคราะห์ข้อมูล log อย่างสม่ำเสมอและความถี่ที่เหมาะสม ตามการประเมินความเสี่ยงหรือระบบความสำคัญ ( กำหนดเครื่องแม่ข่ายที่จัด
of Myanmar, State of Cambodia, Republic of Korea (South Korea) and Republic of China (Taiwan). To be well prepared for such endeavors, EGCO has consistently kept abreast of electricity industry