characteristics and natures of transactions to be regarded as “suspicious transactions;” (2) have in place monitoring systems to promptly identify or detect suspicious transactions; (3) arrange to have proper
systems; (11) inspect records and evidence to detect potential issues arisen from the use of cloud service. 3.2. establish the service agreement between the cloud provider and the intermediary under Clause
with a client. Such procedure should have adequate process to identify and verify client’s true identity in order to ensure that the client is the person appears on the documents referred to during the
another business group, identify the name and the shareholding proportion of the joint venture partner. (If there are numerous subsidiaries or affiliates, they may be presented in business groups; - In case
agreement with another business group, identify the name and the shareholding proportion of the joint venture partner. (If there are several subsidiaries or associated companies, they may be presented in
clients An intermediary shall compile [i] sufficient information relating to clients in order to identify the clients and [ii] other information for supporting its properly provided services; (10
subsidiary formed by a joint venture agreement with another business group, identify the name and the shareholding proportion of the joint venture partner. (If there are numerous subsidiaries or associates
ลูกค้า (KYC/CDD Process) เมื่อลูกค้าเปิดบัญชีหรือเริ่มทำธุรกรรมเป็นครั้งแรก รับทำธุรกรรม /เปิดบัญชี เกี่ยวข้องกับฟอกเงิน /ไม่ให้ความร่วมมือ verify ข้อมูลเพิ่มเติม (เฉพาะบางกรณี) ไม่ใช่ ใช่ identify
except for reselling or transferring made under the requirements of the repurchase transaction. (b) segregating under self-safekeeping which shall be done in the manner that can clearly identify without
otherwise entitled. Clause 3 Intermediaries shall identify its critical functions, assess their risks of major operational disruptions, conduct business impact analysis and assess potential damages arising