นโยบายการรักษาความปลอดภัยด้านเทคโนโลยีสารสนเทศ (IT security policy) PAGE - 2 - ประกาศสำนักงานคณะกรรมการกำกับหลักทรัพย์และตลาดหลักทรัพย์ ที่ อธ./น. 5/2547 เรื่อง แนวทางปฏิบัติในการควบคุมการปฏิบัติงาน
นโยบายการรักษาความปลอดภัยด้านเทคโนโลยีสารสนเทศ (IT security policy) เอกสารประกอบการ public hearing ร่างข้อบังคับและแนวทางปฏิบัติด้านเทคโนโลยีสารสนเทศ PAGE - 30 - เอกสารประกอบการ public hearing ร่าง
security as well as supervise, monitor and examine compliance with such policies, measures, and operating systems, and review the suitability thereof regularly; In the interest of meeting the aforesaid
there are weaknesses or inappropriateness for control and good operating practice; (5) arrange an incident response policy in case of any occurrence of a security incident to the information systems; (6
the day before or of 1 hour before the occurrence of emergency incidents, as the case may be. In addition, there should be provided an approach on provision or preparation of substitute data in
is using the online service; 2. the management company has an operating system to verify the identity of the investor; (d) security system for customer information and other important information
Act, to serve as a security for the employees in case of their death, termination of employment, or resignation from the fund, by payments of the employees’ savings and the employer’s contribution in
directors and containing at least details as specified in the provisions under Clause 8. The policy shall be reviewed on its efficiency and appropriateness at least once a year or promptly upon occurrence of
: Operational Control and Security for Information Technology of a Licensed Derivatives Broker. By virtue of the second paragraph of Clause 7 of the Notification of the Securities and Exchange Commission No
) the Social Security Fund; (5) the juristic persons established under Thai law that is not subject to corporate income taxes. Clause 28 Clause 26 shall not be applicable to the underwriters receiving the