undertaking is accurate, complete and current as well as functional and can be monitored effectively. There shall also be an adequate security system to prevent any unauthorized person from accessing or
undertaking is accurate, complete and current as well as functional and can be monitored effectively. There shall also be an adequate security system to prevent any unauthorized person from accessing or
. for the purpose of compliance convenience and render efficiently controlling for accessing the importance computer devices. Moreover, it should be separate the zone that officer from various division
efficiently controlling for accessing the importance computer devices. Moreover, it should be separate the zone that officer from various division can reach from the computer centre such as a zone where used
accessing or amending information; (d) non-public information protection system between the agent and its personnel; (e) supervisory system for making personnel to complete their functions in accordance with
ETF: (a) risk management system; (b) internal control system; (c) security system for investors’ information in order to prevent unrelated and unauthorized persons from accessing or amending information
ETF: (a) risk management system; (b) internal control system; (c) security system for investors’ information in order to prevent unrelated and unauthorized persons from accessing or amending information
accessing or amending information; (d) non-public information protection system between the agent and its personnel; (e) supervisory system for making personnel to complete their functions in accordance with
system for investors’ information in order to prevent unrelated and unauthorized persons from accessing or amending information; (d) non-public information protection system between the agent and its
nationwide 130,000 Boonterm kiosks along with its Master Agents and sub-agents to provide convenience of accessing products and services to both existing and new customers. For the Banking Agent & Lending