of passwords; (d) tightly restrict and control the use of utility programs and limit access to program source code. Chapter 4 Information Communications Security via Computer Network Systems and
) tightly restrict and control the use of utility programs and limit access to program source code. Chapter 4 Information Communications Security via Computer Network Systems and Operations Security with
) tightly restrict and control the use of utility programs and limit access to program source code. Chapter 4 Information Communications Security via Computer Network Systems and Operations Security with
at least of the following: □ (1) Number of employees; □ (2) The qualifications to prove that personnel is knowledgeable, competent and experienced suitable for the assigned task and such personnel
of employees; □ (2) The qualifications to prove that personnel is knowledgeable, competent and experienced suitable for the assigned task and such personnel hasbasic understanding of general laws
manner to allow members and involved persons to be well informed of possible effects and risks from the operation of the business; Part 3 Subject Matters of this Notification Clause 4 This Notification
10/1. In applying for license, if the applicant requests to restrict the scope of its securities borrowing and lending business in any way, then after license has been given,, the business operator
applicant requests to restrict the scope of its securities borrowing and lending business in any way, then 11 As added by the Notification of the Securities and Exchange Commission No. KorThor 12/2542 Re
applying for license, if the applicant requests to restrict the scope of its securities borrowing and lending business in any way, then 11 As added by the Notification of the Securities and Exchange
starts its operation; (4) not being ordered by the Capital Market Supervisory Board or the Office to restrict its business expansion or cease its operation, or in the process of rectifying its operation by