นโยบายการรักษาความปลอดภัยด้านเทคโนโลยีสารสนเทศ (IT security policy) PAGE - 2 - ประกาศสำนักงานคณะกรรมการกำกับหลักทรัพย์และตลาดหลักทรัพย์ ที่ อธ./น. 5/2547 เรื่อง แนวทางปฏิบัติในการควบคุมการปฏิบัติงาน
นโยบายการรักษาความปลอดภัยด้านเทคโนโลยีสารสนเทศ (IT security policy) เอกสารประกอบการ public hearing ร่างข้อบังคับและแนวทางปฏิบัติด้านเทคโนโลยีสารสนเทศ PAGE - 30 - เอกสารประกอบการ public hearing ร่าง
express opinions independently from the following persons: (a) the persons who will sell, transfer, lease or grant the rights in the infrastructure asset to the fund; (b) the common person group of (a). (2
with Chapter 1; (2) establishment of policies, measures, and management arrangement concerning information security in accordance with Chapter 2; (3) management of IT assets and the access control to
shares or rendering a financial support that will later generate the right to acquire shares of such business, and being involved in the supervision of the business plan, the operation or the improvement
entrusted to sell or redeem investment units, as the case may be, of mutual fund; “Staff” means any staff and employee of the management company and shall include managing director or equivalent which is
: Operational Control and Security for Information Technology of a Licensed Derivatives Broker. By virtue of the second paragraph of Clause 7 of the Notification of the Securities and Exchange Commission No
security as well as supervise, monitor and examine compliance with such policies, measures, and operating systems, and review the suitability thereof regularly; In the interest of meeting the aforesaid
Operating Control and Information Technology Security of Securities Company By virtue of Paragraph 1(2) of Section 141 of the Securities and Exchange Act B.E. 2535, the SEC Office, with the approval of the
have contact persons with investors, subject to approval of the Office, to sell investment units or to solicit customers or to prepare investment plans for customers. Any person so approved by the Office