risks to be of significance, which are: accessing to the information and computer system by an unauthorised person, an authorised person is unable to access to the information in the computer system in
. Computer Operation. 8. IT Outsourcing. Policy of Security of the Information Technology. Objective Providing a policy of security of the information technology has an objective for the user and the concerned
Securities and Exchange Commission Appendix Definitions “ IT assets ” means (1) system assets, i.e., computer network, system software, application software, and information systems; (2) equipment assets, i.e
จดทะเบียนขั้นต่ำของผู้ได้รับใบอนุญาตดังกล่าว C:\Users\butree\Desktop\ประกาศ ทุนจดทะเบียน(แก้ไขตาม ผช วสันต์ฯ)-final.doc
” means: (1) system assets, i.e., computer network, system software, application software, and information systems; (2) equipment assets, i.e., computers, equipment, data recorders, and other equipment; (3
unless there is a reasonable ground to believe that by the time the search warrant is obtained, the document or evidence may be relocated, concealed, destroyed, or deformed, then the search, seizures, or
กรณีใช้เทคโนโลยี virtual desktop (5) การป้องกันการเข้าถึงข้อมูลสารสนเทศจากบุคคลที่ไม่มีสิทธิในการใช้งาน เช่น ญาติพี่น้องและเพื่อน เป็นต้น (6) การตรวจสอบสิทธิการเข้าถึงของพนักงานที่ได้รับอนุญาตให้ปฏิบัติ
discharged the executive or personnel responsible for the cause of prohibited characteristics of the applicant. 4.6 Having not deliberately concealed the financial status or the operating result during the
evaluation of controls on complex systems; and · effect of Internet and e-commerce. 2 How is firm dealing with greater use of computer technology - at firm: · use of intelligent software to carry out audit
of providing a self-service platform for customers through the use of communication equipments or computer while the office of securities company is closed , such securities company shall open 24 hours