compose of personal detail, time of entering and there should be inspected that record consistently. [M] · Arranging the computer centre separately such as network zone, server zone and printer zone etc
computer network systems; (5) communicate protection measures with the users and arrange for the users to sign for acknowledgement and awareness of usage risks and the guidelines to control such risks; (6
” means: (1) system assets, i.e., computer network, system software, application software, and information systems; (2) equipment assets, i.e., computers, equipment, data recorders, and other equipment; (3
risks to be of significance, which are: accessing to the information and computer system by an unauthorised person, an authorised person is unable to access to the information in the computer system in
calculating net asset value of fund or securities-clearing (back-office function) including the segregation of reporting line of the personal in the segregated units and there should be a person responsible for
กรณีฉุกเฉิน (Backup and IT Continuity Plan) 7. การควบคุมการปฏิบัติงานประจำด้านคอมพิวเตอร์ (Computer Operation) 8. การควบคุมการใช้บริการด้านงานเทคโนโลยีสารสนเทศจากผู้ให้บริการรายอื่น (IT Outsourcing
Management) 6. การสำรองข้อมูลและระบบคอมพิวเตอร์ และการเตรียมพร้อมกรณีฉุกเฉิน (Backup and IT Continuity Plan) 7. การควบคุมการปฏิบัติงานประจำด้านคอมพิวเตอร์ (Computer Operation) 8. การควบคุมการใช้บริการด้านงาน
,” describe the source of such material (such as access through computer software databases containing professional and regulatory literature). b. If “no,” describe how the firm obtains reasonable assurance
its business by maintaining corporate image and reputation including credibility of capital market essentially, as well as operates its business with reasonable awareness by taking account of time
image and reputation including credibility of capital market essentially, as well as operates its business with reasonable awareness by taking account of time, business manner or circumstance, and