compose of personal detail, time of entering and there should be inspected that record consistently. [M] · Arranging the computer centre separately such as network zone, server zone and printer zone etc
) sufficient control of the user rights to access sensitive or critical information; (3) communication security of organization’s critical operating systems and computer network systems for connection or
,” describe the source of such material (such as access through computer software databases containing professional and regulatory literature). b. If “no,” describe how the firm obtains reasonable assurance
Communications with relevant persons (7) Division 7 Cross-border communication (8) Division 8 Companies shall test and assess the BCP (Training, Exercising and Auditing) (9) Division 9 Examples of emergency
ข้อมูลภายใน เช่น ระบบ E-mail / Web Application เป็นต้น · · Mobile push mail โปรดระบุจำนวนบุคลากรที่ใช้อุปกรณ์ดังกล่าว.................... · · Laptop/PC โปรดระบุจำนวนบุคลากรที่ใช้อุปกรณ์ดังกล่าว
of providing a self-service platform for customers through the use of communication equipments or computer while the office of securities company is closed , such securities company shall open 24 hours
” means: (1) system assets, i.e., computer network, system software, application software, and information systems; (2) equipment assets, i.e., computers, equipment, data recorders, and other equipment; (3
able to complete the engagement within the reporting deadline. 4 Does the firm inform personnel of its acceptance and continuance of client policies and procedures? If yes, mode of communication. If no
under Appendix Khor) 2. Having effective internal communication channel within the company that may notify the related persons in due course 3. Preparation of backup information stored in the computer
responsibilities of personal and units shall be appropriately divided; (d) arrange to have information and communication system related to business conduct with internal and external sources in appropriate form and