information security incident management without delay; (3) put in place a disciplinary process to take action against any employee who has committed an IT security breach. Additional Guidelines 1. The examples
indicate that the system of quality control is insufficient. 2) Systemic, repetitive or other significant deficiencies that require prompt corrective action 2 Does the firm communicate (Audit Compliance
rights, construct, purchase, provide, sell, dispose, rent lease, hire purchase, grant of hire purchase, borrow, lend accept pledge, accept mortgage, exchange, transfer, accept transfer, or take any action
operational procedure clearly with regard to granting a consent to a designated person to act on behalf of the securities company or to approve any action that will create an obligation for the securities
.; (b) the complicated nature of the action or the tools using for such action such as using a disguised name of other person or establishing a company for concealment; (c) the record of behaviour of
Regulator which has the authority to impose sanctions or to order the Qualifying CIS Operator to act or refrain from acting in case there is an action which may cause damages to the interest of the investors
to impose sanctions or to order the CIS Operator to act or refrain from acting in case there is an action which may cause damages to the interest of the investors. Yes No If “No”, please specify
air conditioner and humidity level suitable for specification of the computer system, whereas the computer system may fail to function under unsuitable temperature and humidity condition. [M] 2.4 Water
action within determined period which the SEC Office shall stipulate reasonably and in consistency with related circumstances, matters and issues; (6) imposing the intermediary to submit any information
infrastructures or real estates or real estate development businesses. However, such scheme shall be established upon aproval, registration or any other similar action from the the home regulator of any ASEAN