Securities and Exchange Commission Appendix Definitions “ IT assets ” means (1) system assets, i.e., computer network, system software, application software, and information systems; (2) equipment assets, i.e
risks to be of significance, which are: accessing to the information and computer system by an unauthorised person, an authorised person is unable to access to the information in the computer system in
. Computer Operation. 8. IT Outsourcing. Policy of Security of the Information Technology. Objective Providing a policy of security of the information technology has an objective for the user and the concerned
individual, and shall be allowed to undertake a derivatives business only after a license from the SEC has been obtained. Any derivatives business operator which is a legal entity under Section 17 and engages
จดทะเบียนขั้นต่ำของผู้ได้รับใบอนุญาตดังกล่าว C:\Users\butree\Desktop\ประกาศ ทุนจดทะเบียน(แก้ไขตาม ผช วสันต์ฯ)-final.doc
,” describe the source of such material (such as access through computer software databases containing professional and regulatory literature). b. If “no,” describe how the firm obtains reasonable assurance
is to determine the maximum amount of damages claimed in order to ensure that the arbitration serves as an alternative dispute resolution for individual investors in accordance with the purpose of the
” means: (1) system assets, i.e., computer network, system software, application software, and information systems; (2) equipment assets, i.e., computers, equipment, data recorders, and other equipment; (3
, documentation and support of its quality control policies and procedures. 9 Do the individual or individuals assigned operational responsibility for the firm’s QC system by the firm leadership have sufficient and
กรณีใช้เทคโนโลยี virtual desktop (5) การป้องกันการเข้าถึงข้อมูลสารสนเทศจากบุคคลที่ไม่มีสิทธิในการใช้งาน เช่น ญาติพี่น้องและเพื่อน เป็นต้น (6) การตรวจสอบสิทธิการเข้าถึงของพนักงานที่ได้รับอนุญาตให้ปฏิบัติ