to the IT Standard Rules this time are summarized as follows: (1) Establishing IT-related risk assessment criteria to define the entity’s risk level and to specify standards of IT security controls
. The securities company shall provide a physical security system which is sufficient for preventing any unauthorised person from accessing to significant computer devices stored in the information centre
of computer system. Clause 5. The securities company shall provide a physical security system which is sufficient for preventing any unauthorised person from accessing to significant computer devices
. Computer Operation. 8. IT Outsourcing. Policy of Security of the Information Technology. Objective Providing a policy of security of the information technology has an objective for the user and the concerned
Information Technology of a Securities Company. 2. Segregation of Duties. 3. Physical Security. 4. Information and Network Security. 5. Change Management. 6. Backup and IT Contingency Plan. 7. Computer
to Item 11]. 4. Management of the computer network systems and information transfer: - communications security [Referring to Item 9] - information transfer [Referring to Item 9.2] 5. Protection against
Item 11]. 4. Management of the computer network systems and information transfer: - communications security [Referring to Item 9] - information transfer [Referring to Item 9.2] 5. Protection against
data and information system in accordance with Chapter 3; (4) information communications security via computer network systems and operations security with respect to information systems in accordance
data and information system in accordance with Chapter 3; (4) information communications security via computer network systems and operations security with respect to information systems in accordance
data and information system in accordance with Chapter 3; (4) information communications security via computer network systems and operations security with respect to information systems in accordance