; (3) there shall be controls of unauthorized access to information systems and applications, as follows: (a) control access of users and system administrators to information and application system
administrators 45 มีการทดสอบการบุกรุกระบบ (penetration test) กับระบบงาน ที่มีความสำคัญทุกระบบ โดยผู้ประกอบธุรกิจอาจพิจารณา เลือกจัดทำการทดสอบกับบางระบบงานตามการวิเคราะห์ผลกระทบทางธุรกิจ (business impact analysis
system administrators to information and application system functions in accordance with the defined access rights; (b) control access to information systems and applications by a secured log-on procedure
(Translation) PAGE 112 (Translation) Securities and Exchange Act B.E. 2535 (As Amended) _________________ BHUMIBOL ADULYADEJ, REX., Given on the 12th day of March B.E. 2535; Being the 47th Year of the Present Reign. His Majesty King Bhumibol Adulyadej is graciously pleased to proclaim that: Whereas it is expedient to enact a law on the securities and exchange; Be it, therefore, enacted by His Majesty the King, by and with the advice and consent of the National Legislative Assembly functioning as...