. Computer Operation. 8. IT Outsourcing. Policy of Security of the Information Technology. Objective Providing a policy of security of the information technology has an objective for the user and the concerned
been a change in the necessary circumstances as provided in the first paragraph, the Minister upon the recommendation of the SEC may modify or change the conditions already specified.
modify the rules concerning the preparation of reports on provident fund management and the calculation of investment limits of provident funds in respect of the provident funds with multiple investment
, there shall not be any person taking responsibility of the entire process which may render him or her an opportunity to illegally modify or amend the information or operation of computer system. Clause 5
. In the case where it is appropriate or necessary, the SEC Office upon approval of the SEC may revise or modify the operating plan; in such regard, the provision in the first paragraph shall be
: Governance of Enterprise IT Objective: Information technology systems are taken on a major role as a business driving force and constitute one of the core operating systems where disruption will have an impact
structure 1.1 Segregation of work units and responsibilities Objective A management company shall have organisational structure that reflects the systematic segregation of duties. The mission, strategy
shall comply with the following rules: (1) dealing with customer and customer service: (a) having procedures and methods to know the customer and understand the customer’s investment objective restriction
, settlement method and setting price, etc.. Moreover, investor should consider the suitability of such investment with the investor owns investment objective and financial. 3. Risk of loss beyond initial margin
4 Companies should determine a recovery objective to restore normal operations (5) Division 5 Companies shall arrange business continuity planning for supporting business continuity (6) Division 6