. Computer Operation. 8. IT Outsourcing. Policy of Security of the Information Technology. Objective Providing a policy of security of the information technology has an objective for the user and the concerned
regarding their Listed clients and if so, did this change the nature of services/fees charged? 11 Does the firm document its understanding with the client regarding the services to be performed by obtaining
risks to be of significance, which are: accessing to the information and computer system by an unauthorised person, an authorised person is unable to access to the information in the computer system in
Securities and Exchange Commission Appendix Definitions “ IT assets ” means (1) system assets, i.e., computer network, system software, application software, and information systems; (2) equipment assets, i.e
failure of computer systems used for trading securities by companies which are members of the Stock Exchange of Thailand. If the incident results in no ability in recording an offer for trading come from
จดทะเบียนขั้นต่ำของผู้ได้รับใบอนุญาตดังกล่าว C:\Users\butree\Desktop\ประกาศ ทุนจดทะเบียน(แก้ไขตาม ผช วสันต์ฯ)-final.doc
aware of the necessity and the importance of compliance inspection including the understanding of the policy and the guideline; (2) Authorises the head of operational and business unit to monitor and
” means: (1) system assets, i.e., computer network, system software, application software, and information systems; (2) equipment assets, i.e., computers, equipment, data recorders, and other equipment; (3
· Understanding of, and practical experience with, engagements of a similar nature and complexity through appropriate training and participation · Understanding of professional standards and applicable legal and
กรณีใช้เทคโนโลยี virtual desktop (5) การป้องกันการเข้าถึงข้อมูลสารสนเทศจากบุคคลที่ไม่มีสิทธิในการใช้งาน เช่น ญาติพี่น้องและเพื่อน เป็นต้น (6) การตรวจสอบสิทธิการเข้าถึงของพนักงานที่ได้รับอนุญาตให้ปฏิบัติ