Cryptographic Control; 2.7 Physical and Environmental Security; 2.8 Operations Security; 2.9 Communications Security; 2.10 System Acquisition, Development and Maintenance; 2.11 IT Outsourcing; 2.12 Information
applicable, mutatis mutandis. The operating plan of the SEC Office under the first paragraph shall be prepared in the form of a three-year plan to promote the supervision and development of the capital market
. Computer Operation. 8. IT Outsourcing. Policy of Security of the Information Technology. Objective Providing a policy of security of the information technology has an objective for the user and the concerned
ภาคผนวก 1 ภาคผนวก 1 กลุ่มประเทศ Organization for Economic Co-operation and Development (OECD) และประเทศที่มีฐานะการเงินเทียบเท่า ออสเตรเลีย เกาหลีใต้ ออสเตรีย ลักเซมเบิร์ก เบลเยียม เม็กซิโก แคนาดา
ภาคผนวก 1 ภาคผนวก 1 กลุ่มประเทศ Organization for Economic Co-operation and Development (OECD) และประเทศที่มีฐานะการเงินเทียบเท่า ออสเตรเลีย เกาหลีใต้ ออสเตรีย ลักเซมเบิร์ก เบลเยียม เม็กซิโก แคนาดา
units in order to achieve efficiency in the overall operation of the company. (4) have performance appraisal and personnel development in order to maintain staff’s professional competence to remain fit
structure 1.1 Segregation of work units and responsibilities Objective A management company shall have organisational structure that reflects the systematic segregation of duties. The mission, strategy
innovative development, products and/or services or the business model (if any). The objective is to demonstrate the Company’s continuing development to serve the needs of the stakeholders and to make
information security; (3) define the recovery time objective (RTO) for information system and its priority to be recovered based on its criticality and potential impact; (4) consider redundant information
of a collective investment scheme which has characteristics similar to a mutual fund but excluding the collective investment scheme with the objective of directly investing in properties relating to