compose of personal detail, time of entering and there should be inspected that record consistently. [M] · Arranging the computer centre separately such as network zone, server zone and printer zone etc
risks to be of significance, which are: accessing to the information and computer system by an unauthorised person, an authorised person is unable to access to the information in the computer system in
Securities and Exchange Commission Appendix Definitions “ IT assets ” means (1) system assets, i.e., computer network, system software, application software, and information systems; (2) equipment assets, i.e
Fundamental of Financial Statements (UFS) [ ] Role of the Compensation Committee (RCC) [ ] Improving the Quality of Financial Reporting (QFR) [ ] DCP Refresher Course [ ] others (please specify) [ specify
กรณีฉุกเฉิน (Backup and IT Continuity Plan) 7. การควบคุมการปฏิบัติงานประจำด้านคอมพิวเตอร์ (Computer Operation) 8. การควบคุมการใช้บริการด้านงานเทคโนโลยีสารสนเทศจากผู้ให้บริการรายอื่น (IT Outsourcing
Management) 6. การสำรองข้อมูลและระบบคอมพิวเตอร์ และการเตรียมพร้อมกรณีฉุกเฉิน (Backup and IT Continuity Plan) 7. การควบคุมการปฏิบัติงานประจำด้านคอมพิวเตอร์ (Computer Operation) 8. การควบคุมการใช้บริการด้านงาน
,” describe the source of such material (such as access through computer software databases containing professional and regulatory literature). b. If “no,” describe how the firm obtains reasonable assurance
following two business days; (2) improving the capability to maintain collateral and liquid asset adequacy for a period of not less than seven consecutive business days, within thirty days from the date on
” means: (1) system assets, i.e., computer network, system software, application software, and information systems; (2) equipment assets, i.e., computers, equipment, data recorders, and other equipment; (3
37 Management of trust is a trustee’s personal duty. A trustee shall not delegate its duty to other persons except where: (1) the trust instrument provides otherwise; (2) it is a transaction that is