compose of personal detail, time of entering and there should be inspected that record consistently. [M] · Arranging the computer centre separately such as network zone, server zone and printer zone etc
Item 11]. 4. Management of the computer network systems and information transfer: - communications security [Referring to Item 9] - information transfer [Referring to Item 9.2] 5. Protection against
” means: (1) system assets, i.e., computer network, system software, application software, and information systems; (2) equipment assets, i.e., computers, equipment, data recorders, and other equipment; (3
risks to be of significance, which are: accessing to the information and computer system by an unauthorised person, an authorised person is unable to access to the information in the computer system in
37 Management of trust is a trustee’s personal duty. A trustee shall not delegate its duty to other persons except where: (1) the trust instrument provides otherwise; (2) it is a transaction that is
calculating net asset value of fund or securities-clearing (back-office function) including the segregation of reporting line of the personal in the segregated units and there should be a person responsible for
กรณีฉุกเฉิน (Backup and IT Continuity Plan) 7. การควบคุมการปฏิบัติงานประจำด้านคอมพิวเตอร์ (Computer Operation) 8. การควบคุมการใช้บริการด้านงานเทคโนโลยีสารสนเทศจากผู้ให้บริการรายอื่น (IT Outsourcing
document submitted to the Bank of Thailand relating to protection system and measure on risk control and management, operational management and internal control system. Part II : Application for registration
Management) 6. การสำรองข้อมูลและระบบคอมพิวเตอร์ และการเตรียมพร้อมกรณีฉุกเฉิน (Backup and IT Continuity Plan) 7. การควบคุมการปฏิบัติงานประจำด้านคอมพิวเตอร์ (Computer Operation) 8. การควบคุมการใช้บริการด้านงาน
,” describe the source of such material (such as access through computer software databases containing professional and regulatory literature). b. If “no,” describe how the firm obtains reasonable assurance