risks to be of significance, which are: accessing to the information and computer system by an unauthorised person, an authorised person is unable to access to the information in the computer system in
risks to be of significance, which are: accessing to the information and computer system by an unauthorised person, an authorised person is unable to access to the information in the computer system in
Mr. Wiboon Phatrapiboon obtained a bachelor’s degree in engineering from Kasetsart University and a master’s degree in Science from Chieng Mai University. Prior to joining the SEC, he was Deputy
. Computer Operation. 8. IT Outsourcing. Policy of Security of the Information Technology. Objective Providing a policy of security of the information technology has an objective for the user and the concerned
Information Technology of a Securities Company. 2. Segregation of Duties. 3. Physical Security. 4. Information and Network Security. 5. Change Management. 6. Backup and IT Contingency Plan. 7. Computer
computer network systems; 13 (5) communicate protection measures with the users and arrange for the users to sign for acknowledgement and awareness of usage risks and the guidelines to control such risks; (6
computer network systems; (5) communicate protection measures with the users and arrange for the users to sign for acknowledgement and awareness of usage risks and the guidelines to control such risks; (6
regulations, the SEC established foundations for good governance, social responsibility, and anti-corruption. To drive social awareness towards sustainable development, as examples, we created additional tools
Network Phase 4 of the Office of the Permanent Secretary for Higher Education, Science, Research and Innovation, the Project of information and communication technology Installation of the New Parliament
. Suparut Kawatkul Permanent-Secretary for Finance An ex-officio member of the Board, he graduated with a B.Sc. in Economics from the London School of Economics and Political Science and holds an M.Sc. in the