. Computer Operation. 8. IT Outsourcing. Policy of Security of the Information Technology. Objective Providing a policy of security of the information technology has an objective for the user and the concerned
regarding their Listed clients and if so, did this change the nature of services/fees charged? 11 Does the firm document its understanding with the client regarding the services to be performed by obtaining
risks to be of significance, which are: accessing to the information and computer system by an unauthorised person, an authorised person is unable to access to the information in the computer system in
failure of computer systems used for trading securities by companies which are members of the Stock Exchange of Thailand. If the incident results in no ability in recording an offer for trading come from
aware of the necessity and the importance of compliance inspection including the understanding of the policy and the guideline; (2) Authorises the head of operational and business unit to monitor and
” means: (1) system assets, i.e., computer network, system software, application software, and information systems; (2) equipment assets, i.e., computers, equipment, data recorders, and other equipment; (3
· Understanding of, and practical experience with, engagements of a similar nature and complexity through appropriate training and participation · Understanding of professional standards and applicable legal and
the People's Republic of China and Thailand We would like to bring your attention to the Memorandum of Understanding between the Government of the Hong Kong Special Administrative Region of the
Securities and Exchange Commission Appendix Definitions “ IT assets ” means (1) system assets, i.e., computer network, system software, application software, and information systems; (2) equipment assets, i.e
of providing a self-service platform for customers through the use of communication equipments or computer while the office of securities company is closed , such securities company shall open 24 hours