assessment according to the degree of importance of the outsourced function; (6) information security system of a service provider for protecting the information of the intermediary and the clients; 5 Clause 9
Rules, Conditions and Procedures for Outsourcing Function related to Business Operation to Third Party
) appropriate guideline for risk assessment according to the degree of importance of the outsourced function; (6) information security system of a service provider for protecting the information of the
thereof before proceeding with such subcontracting. (5) appropriate guideline for risk assessment according to the degree of importance of the outsourced function; (6) information security system of a
thereof before proceeding with such subcontracting. (5) appropriate guideline for risk assessment according to the degree of importance of the outsourced function; (6) information security system of a
procedures by meeting the following criteria: (1) educate all employees and contractors on IT security policy relevant to their job function; (2) communicate to the employees and contractors that they should
procedures by meeting the following criteria: (1) educate all employees and contractors on IT security policy relevant to their job function; (2) communicate to the employees and contractors that they should
procedures by meeting the following criteria: (1) educate all employees and contractors on IT security policy relevant to their job function; (2) communicate to the employees and contractors that they should
security within the organization in order that operation cross- check is performed for prevention of potential risks, for example, segregation of personnel who operate in the developmental function
security within the organization in order that operation cross-check is performed for prevention of potential risks, for example, segregation of personnel who operate in the developmental function