/select?q=electronic possession OR "electronic possession" OR "electrical ownership" OR "electrical control" OR "digital ownership" OR "digital control"&wt=json&indent=true&facet=true&facet.field
system. 11.2 The company should define suitable control measures for infrastructure of technology system. 11.3 The company should define suitable security control for the technology system. Questions Yes
Commission SorThor/Nor. 34/2547 Re: Operational Control and Information Technology Security of Securities Companies 20/07/2004 01/02/2005 2. Notification of the Office of the Securities and Exchange
Commission SorThor/Nor. 34/2547 Re: Operational Control and Information Technology Security of Securities Companies 20/07/2004 01/02/2005 2. Notification of the Office of the Securities and Exchange
Commission SorThor/Nor. 34/2547 Re: Operational Control and Information Technology Security of Securities Companies 20/07/2004 01/02/2005 2. Notification of the Office of the Securities and Exchange
Commission SorThor/Nor. 34/2547 Re: Operational Control and Information Technology Security of Securities Companies 20/07/2004 01/02/2005 2. Notification of the Office of the Securities and Exchange
="text-align: left;">(2) หมวดที่ 2 การรักษาความมั่นคงปลอดภัยของระบบเทคโนโลยีสารสนเทศ (IT security)โดยมีรายละเอียดดังต่อไปนี้ 2.1  
risks that are incurred from the connectivity of operations. For instance, if the system of any one partner faces instability or a security problem, it may have a wide-ranging impact on customers all
control to ensure compliance with the policy; (2) Policy and procedures for designing, developing and managing digital wallets as well as creating, maintaining and accessing keys or other related
information security officer : CISO) หรือผู้บริหารที่รับผิดชอบในการบริหารจัดการความมั่นคงปลอดภัยด้าน IT ที่มีคุณสมบัติและอำนาจหน้าที่ที่เหมาะสม N/A Yes/Partial/No N/A N/A N/A N/A N/A 1 0 1 D1 #11 x 2.1 4 2.1 #4