with Chapter 1; (2) establishment of policies, measures, and management arrangement concerning information security in accordance with Chapter 2; (3) management of IT assets and the access control to
enterprise information technology and operating systems for information security; (2) supervision, monitoring and examinaion of compliance with the policies, measures and the operating systems under (1); (3
นโยบายและมาตรการรักษาความมั่นคงปลอดภัยของระบบสารสนเทศ (information security policy) 2.2 การจัดโครงสร้างความมั่นคงปลอดภัยของระบบสารสนเทศ (organization of information security) 2.3 การสร้างความมั่นคงปลอดภัย
control system; (c) information security system to prevent unauthorized and unrelated persons from accessing or amending information as well as from ascertaining non-public information between the service
ประเด็นหารือที่ปรึกษา วันที่ 3 กุมภาพันธ์ 2548 PAGE -15- แบบสอบถามเกี่ยวกับแนวทางการบริหารความปลอดภัยของระบบสารสนเทศ (Information Security Questionnaire) เรียน ผู้ที่เกี่ยวข้อง สำนักงานขอความร่วมมือ
securities company should arrange an information security system according to the following guidelines: (1) putting in place a secure and efficient system for safekeeping information, evidentiary documentation
provide a measure for protecting information security and computer system and network which is sufficient for preventing an unauthorised person from accessing, acknowledging, utilizing or altering such
) Having backup system and measures for emergency situation to prevent the extended discontinuing of operation. 1.1.2 Document and Information Security Having adequate security system for document and
include, internal control system, information security system to prevent access from unauthorized person, and effective Chinese Wall between difference departments and staffs as well as having measures for
specified by derivatives broker. Such conduct shall specify at least include internal control system, information security system to prevent access from unauthorized person, and effective Chinese Wall among