ก.ล.ต. จัดสัมมนาเพื่อเตรียมความพร้อมในเรื่องความมั่นคงปลอดภัยทางไซเบอร์และการคุ้มครองข้อมูลส่วนบุคคล (Cyber Security & Data Privacy Protection) ให้กับกรรมการและผู้บริหารระดับสูงของบริษัทหลักทรัพย์
to the IT Standard Rules this time are summarized as follows: (1) Establishing IT-related risk assessment criteria to define the entity’s risk level and to specify standards of IT security controls
W20 (3) Educated the staff about IT security and the Computer Crime Act B.E.2550 (2007) as well as monitored their compliance with the IT security policy; (4) Improved the SEC's website (www.sec.or.th
● Frauds or embezzlement considered as economic crime (e.g., product piracy, computer crime) Economic Crime Suppression Division (ECD) Telephone: +66-2234-1068 Website: www.ecdpolice.com ● Financial
Supervisory Board. Chapter 3 Business Continuity Management and Security of Information Technology Systems __________________ Clause 19 In this Chapter: “computer system relating to trading services with
. The securities company shall provide a physical security system which is sufficient for preventing any unauthorised person from accessing to significant computer devices stored in the information centre
of computer system. Clause 5. The securities company shall provide a physical security system which is sufficient for preventing any unauthorised person from accessing to significant computer devices
. Computer Operation. 8. IT Outsourcing. Policy of Security of the Information Technology. Objective Providing a policy of security of the information technology has an objective for the user and the concerned
Information Technology of a Securities Company. 2. Segregation of Duties. 3. Physical Security. 4. Information and Network Security. 5. Change Management. 6. Backup and IT Contingency Plan. 7. Computer