matters relative to independence confirmations, performance evaluations, results of monitoring, client acceptance and continuance evaluation, etc? · Using electronic databases · Manual notes · Checklists
? If yes, describe 18 Does the firm have staff consultation unit or counselor/counselee system? D Performance Evaluation 1 Does the firm have documented and organized appraisal policy and process? If yes
person within the firm, including CEO? Does the firm communicate to the person who take care of performance evaluation to consider the deficiencies found as part of evaluation? Does the firm communicate to
plan; (2) Evaluation of the test results under (1) and preparation of the test evaluation report by the personnel in charge who is qualified, knowledgeable and independent; (3) Reporting result of the
continuity plan under Clause 6; (2) Evaluation of the test results under (1) and preparation of the test evaluation report by the personnel in charge who is qualified, knowledgeable and independent; (3
engagement competently If yes, how this decision is reached and whether it is documented. Does the firm specify conditions that require evaluation of a specific client or engagement, obtaining relevant
which covers the methods for selection and evaluation of cloud providers, review of the qualifications of the cloud providers, the terms of services, and inspection of records and evidence; (2) policy on
evaluation by the SEC Office regarding the management of the operational risk and the customer relationship risk not higher than the medium level or in an acceptable level, unless granted an exemption from the
แบบแสดงรายการข้อมูลการเสนอขายหลักทรัพย์ (UNOFFICIAL TRANSLATION) Readers should be aware that only the original Thai text has legal force, and that this English translation is strictly for reference. 2 Registration Statement for Securities Offering (Form 69-1) Company: .......... (Name of Securities Offeror) ….....… Offers for Sale ....................................................................................................................................................... .................
documented information security policy which addresses at least the following matters: (1) policy on the use of cloud computing which covers the methods for selection and evaluation of cloud providers, review