นโยบายการรักษาความปลอดภัยด้านเทคโนโลยีสารสนเทศ (IT security policy) PAGE - 2 - ประกาศสำนักงานคณะกรรมการกำกับหลักทรัพย์และตลาดหลักทรัพย์ ที่ อธ./น. 5/2547 เรื่อง แนวทางปฏิบัติในการควบคุมการปฏิบัติงาน
นโยบายการรักษาความปลอดภัยด้านเทคโนโลยีสารสนเทศ (IT security policy) เอกสารประกอบการ public hearing ร่างข้อบังคับและแนวทางปฏิบัติด้านเทคโนโลยีสารสนเทศ PAGE - 30 - เอกสารประกอบการ public hearing ร่าง
with Chapter 1; (2) establishment of policies, measures, and management arrangement concerning information security in accordance with Chapter 2; (3) management of IT assets and the access control to
9(1) by taking into consideration: (1) establishment of appropriate physical information security measures which are prudently sufficient to the scope of operation in the teleworking site; (2
controlling [M] · Keeping a written policy of security in the place where the user and the concerned person can simply reach [M] 2. Detail of Policy · Identifying clearly the purpose and scope and having a
include, internal control system, information security system to prevent access from unauthorized person, and effective Chinese Wall between difference departments and staffs as well as having measures for
specified by derivatives broker. Such conduct shall specify at least include internal control system, information security system to prevent access from unauthorized person, and effective Chinese Wall among
is using the online service; 2. the management company has an operating system to verify the identity of the investor; (d) security system for customer information and other important information
to check whether the work performance of such designated person is within the scope of power, duties and responsibilities; (2) determining clearly the rules concerning consideration for approval of
services within the scope of each type of license granted to the intermediary ; (2) To arrange for clients to access the information prepared by the foreign intermediary or the issuer or the offeror of such