information security incident management without delay; (3) put in place a disciplinary process to take action against any employee who has committed an IT security breach. Additional Guidelines 1. The examples
indicate that the system of quality control is insufficient. 2) Systemic, repetitive or other significant deficiencies that require prompt corrective action 2 Does the firm communicate (Audit Compliance
rights, construct, purchase, provide, sell, dispose, rent lease, hire purchase, grant of hire purchase, borrow, lend accept pledge, accept mortgage, exchange, transfer, accept transfer, or take any action
operational procedure clearly with regard to granting a consent to a designated person to act on behalf of the securities company or to approve any action that will create an obligation for the securities
.; (b) the complicated nature of the action or the tools using for such action such as using a disguised name of other person or establishing a company for concealment; (c) the record of behaviour of
Regulator which has the authority to impose sanctions or to order the Qualifying CIS Operator to act or refrain from acting in case there is an action which may cause damages to the interest of the investors
คอมพิวเตอร์ได้อย่างชัดเจน โดยเฉพาะกรณีที่ผู้ประกอบธุรกิจใช้หมายเลขประจำเครื่องแบบพลวัต (dynamic IP address) เพื่อให้ผู้ประกอบธุรกิจมีข้อมูล ที่สามารถระบุผู้ใช้งานหมายเลข IP address ในช่วงเวลาที่ใช้งานได้ 5.2
to impose sanctions or to order the CIS Operator to act or refrain from acting in case there is an action which may cause damages to the interest of the investors. Yes No If “No”, please specify
action within determined period which the SEC Office shall stipulate reasonably and in consistency with related circumstances, matters and issues; (6) imposing the intermediary to submit any information
infrastructures or real estates or real estate development businesses. However, such scheme shall be established upon aproval, registration or any other similar action from the the home regulator of any ASEAN