security in accordance with the following criteria: (1) manage and control computer network systems in a secure way to ensure prevention of any action that may cause a risk to information in networks; (2
secure, effective and efficient IT practices and IT usage in businesses. The update would also include requirements related to the information security audits and the qualifications of the auditor who must
Securities and Exchange Commission No. Or Thor. 21/2543 Re: Guidelines for the Operating Control of Brokerage and Dealing of Securities That Are Not Debt Instruments _____________________________ For the
Securities and Exchange Commission No. Or Thor. 21/2543 Re: Guidelines for the Operating Control of Brokerage and Dealing of Securities That Are Not Debt Instruments _____________________________ For the
Securities and Exchange Commission No. Or Thor. 21/2543 Re: Guidelines for the Operating Control of Brokerage and Dealing of Securities That Are Not Debt Instruments _____________________________ For the
Repeal of the Notification of the Office of the Securities and Exchange Commission regarding Operating Control and Information Technology Security of Securities Company
Ladkrabang), (7) the ASEAN Chief Information Officer Association (ACIOA), (8) the Thailand Information Security Association (TISA), and (9) the Information Systems Audit and Control Association – Bangkok
enter the secure areas for only relevant persons, establish physical entry control to ensure that only authorized personnel are allowed to access, and conduct a periodic review on the access rights
such security systems in a good condition on a regular basis; 4. The intermediary should closely monitor and control external party support service personnel working in the secure areas; 5. The
"electronic possession" OR "electric ownership" OR "electric control" OR "digital ownership" OR "digital control"&wt=json&indent=true&facet=true&facet.field=key_filetype&facet.field=key_sitemap&facet.field