· Forms 2 Does the firm have policies and procedures for the retention of firm’s documentation for a period of time sufficient to permit those performing monitoring and review procedures to evaluate the
inspection to evaluate its compliance with its policies and procedures? – Monitoring Process If yes, please specify 1) Who perform such function e.g. in-house, outsource, network firm? 2) How often the firm
each customer separately from the account of its own, in accordance with the rules specified in the notification of the SEC. In cases where the derivatives business operator has advanced its own asset to
internal control is rectified as follows: (1) monitor, inspect and evaluate the effectiveness of the operating procedures of the work unit responsible for the following functions by an independent auditor
, how does the firm inform its personnel or what kind of process that the firm use to ensure that its staff evaluate clients risk? 5 Regarding integrity checks does the firm’s conduct, for example
); (5) review procedures and processes in the management of information security incidents, after the testing under (4) is carried out, at least once a year; (6) evaluate the results of the testing under
substitute personnel at operational level and management level, financing source, office equipments and information technology systems, as well as, should evaluate on a usage of finance and accesibility to
well as specify the investment ratios and conditions for the fund to comply. Clause 12. The management company shall regularly evaluate the performance of the respective funds and disclose the
(Translation) PAGE 112 (Translation) Securities and Exchange Act B.E. 2535 (As Amended) _________________ BHUMIBOL ADULYADEJ, REX., Given on the 12th day of March B.E. 2535; Being the 47th Year of the Present Reign. His Majesty King Bhumibol Adulyadej is graciously pleased to proclaim that: Whereas it is expedient to enact a law on the securities and exchange; Be it, therefore, enacted by His Majesty the King, by and with the advice and consent of the National Legislative Assembly functioning as...
โจมตีในลักษณะ DDoS (distributed denial of service) การป้องกันการบุกรุกจากโปรแกรมไม่ประสงค์ดี การป้องกันภัยคุกคามในรูปแบบใหม่ (advanced persistent threat) การแบ่งแยกเครือข่าย การเข้ารหัสระหว่างแอพพลิเคชั่น