ก.ล.ต. จัดสัมมนาเพื่อเตรียมความพร้อมในเรื่องความมั่นคงปลอดภัยทางไซเบอร์และการคุ้มครองข้อมูลส่วนบุคคล (Cyber Security & Data Privacy Protection) ให้กับกรรมการและผู้บริหารระดับสูงของบริษัทหลักทรัพย์
to the IT Standard Rules this time are summarized as follows: (1) Establishing IT-related risk assessment criteria to define the entity’s risk level and to specify standards of IT security controls
balanced portfolio of owned, leased, and managed models • More industry partnerships • New hygiene, safety & security measures • More technology driven • Greater sustainability and local experiences
criteria: (1) establish conditions and controls relating to information security in an agreement signed by both parties; (2) monitor, evaluate, review and audit service delivery of the outsourcee regularly
) establish conditions and controls relating to information security in an agreement signed by both parties; (2) monitor, evaluate, review and audit service delivery of the outsourcee regularly; (3) re-assess
) establish conditions and controls relating to information security in an agreement signed by both parties; (2) monitor, evaluate, review and audit service delivery of the outsourcee regularly; (3) re-assess
& business ethics • Maximizing energy efficiency • Conservation of natural resources and waste management • Operational efficiency with an emphasis on safety, security, health, and environment • Rights and
security as well as supervise, monitor and examine compliance with such policies, measures, and operating systems, and review the suitability thereof regularly; In the interest of meeting the aforesaid
security as well as supervise, monitor and examine compliance with such policies, measures, and operating systems, and review the suitability thereof regularly; In the interest of meeting the aforesaid
risks that are incurred from the connectivity of operations. For instance, if the system of any one partner faces instability or a security problem, it may have a wide-ranging impact on customers all