the use of cryptographic controls and key management for protection of sensitive and critical information; (3) policy on the transfer of information within organization’s networks and with external
the use of cryptographic controls and key management for protection of sensitive and critical information; (3) policy on the transfer of information within organization’s networks and with external
., computers, equipment, data recorders, and other equipment; (3) information assets, i.e., information, electronic data, and computer data; “critical IT assets” means the IT assets that are related to or
Notification. “critical function” means any activities related to services, transactions or any other functions of an intermediary, the disruption of which would significantly affect customers, business
Notification. “critical function” means any activities related to services, transactions or any other functions of an intermediary, the disruption of which would significantly affect customers, business
financing. “Critical function” means any activities related to services, transactions or any other functions of a securities company, the disruption of which would significantly affect customers, business
securities financing. “Critical function” means any activities related to services, transactions or any other functions of a securities company, the disruption of which would significantly affect customers
provides this practice guidelines for being a guideline in practice through which covers a critical matter of business continuity management that should be applied by each intermediary and for determining a
Telecom Public Company Limited (At the moment, it is the National Telecommunications Public Company Limited.), the project of selling computer network equipment for supporting Cloud for Critical Information
Telecom Public Company Limited (At the moment, it is the National Telecommunications Public Company Limited.), the project of selling computer network equipment for supporting Cloud for Critical Information