threats to information systems: - protection from malware [Referring to Item 8.2]. - technical vulnerability management [Referring to Item 8.6]. 6. System acquisition, development and maintenance [Referring
the use of cryptographic controls and key management for protection of sensitive and critical information; (3) policy on the transfer of information within organization’s networks and with external
the protection and maintenance of the best interest of investors under acceptable risk exposure. Therefore, in the supervision of the business of mutual fund or private fund management, it is necessary
changes in the shareholding structure, management or business operation or any other important events (for example, merger and acquisition) during the past three years, if any. 1.3 Shareholding structure In
implementation Details 1. To acquire assets or finance acquisitions of other business, related to the operation of the current business. - In case of asset acquisition: describe the types of assets and their
the business of the other party and the nature of such controlling power shall be depicted; and (b) The party that owns the funds does not want to obtain the legal protection under the provisions
and acquisition) during the past three years; 1.1.3 Specify whether or not the Company has already spent the raised fund to serve the objectives declared in the registration statement for securities
such services; (12) clients’ asset An intermediary shall arrange adequate protection for clients’ assets when it is responsible for them; (13) relations with regulators An intermediary shall deal with
infrastructure business operators; (b) being an infrastructure business whose operation generates benefits to the general public indirectly in the areas of health, environment, life safety and asset protection; (c
to make the management that are entrusted for the management of investments work on the basis of integrity and prudence with knowledge and expertise of the professional to ensure the full protection of