. Computer Operation. 8. IT Outsourcing. Policy of Security of the Information Technology. Objective Providing a policy of security of the information technology has an objective for the user and the concerned
been granted prior approval by the authorized Committee or management concerned; (c) number of persons and information of the personnel who are responsible for risk management arising from derivatives
its business with honesty, fairness and integrity by strongly being concerned about the market integrity as a whole; (2) skill, care and diligence An intermediary shall conduct its business with due
statement that ought to be declared. In this regard, as evidence that each and every page of the documents is of the exact documents to which I/we have certified, I/we have hereby signed my/our initial or
of the documents is of the exact documents to which I/we have certified, I/we have hereby signed my/our initial or signature on each and every page of the documents and the amendments thereto
nor omission of any material statement that ought to be declared. In this regard, as evidence that each and every page of the documents is of the exact documents to which I/we have certified, I/we have
this regard, as evidence that each and every page of the documents is of the exact documents to which I/we have certified, I/we have also signed my/our initial or signature on each and every page of the
. Maintenance of status. In order to ensure that all parties concerned understand and duly comply with the guidelines, the Office hereby offers clarification regarding the consideration of the skills and
regard, as evidence that each and every page of the documents is of the exact documents to which I/we have certified, I/we have also signed my/our initial or signature on each and every page of the
which satisfies the need of the users, and it shall communicate the development or change to all concerned persons for acknowledgement in order to be able to operate it correctly. Clause 8. The securities