measures for communications security in accordance with the following criteria: (1) manage and control computer network systems in a secure way to ensure prevention of any action that may cause a risk to
firm’s compliance with its system of quality control or for a longer period if required by law or regulation? 3 Does the firm have policies and procedures relate to the access of audit file as well as back
approved by high-level management. In this case, such system shall; (a) generate good control environment; (b) assess, administer and manage any risks which arise or may arisen from conducting business to be
the Office of the Securities and Exchange Commission No. OrThor. 7/2549 Re: Guidelines and Conditions for Securities Company Relating to the Using of Back Office Service from Service Provider Whereas
etc. [M] · Providing an oversee system the operation of officer under the policy strictly [M] · providing an inspection and assessment of the sufficiency of policy and internal control information
shareholder(s) that have ultimate control of the audit firm? 2 Does the person that has ultimate control in the firm be a CFO or managing partner of the firm? If not, how the ultimate shareholder(s) delegate or
) Chapter 2: IT Security with the following details: 2.1 Information Security Policy; 2.2 Organization of Information Security; 2.3 Human Resource Security; 2.4 Asset Management; 2.5 Access Control 2.6
3.2 Investment management system 3.3 Back office supporting system 3.4 Compliance system 3.5 Documentary preparation and record keeping system Chapter 4 Internal Control System Chapter 1 Organisational
Securities and Exchange Commission No. Or Thor. 21/2543 Re: Guidelines for the Operating Control of Brokerage and Dealing of Securities That Are Not Debt Instruments _____________________________ For the
Office of the Securities and Exchange Commission No. SorThor. 20/2549 Re: Rules for Derivatives Broker on Using of Derivatives Investor Contact Service and Back Office Service from Service Provider By