[Referring to Item 4.2]; - backup [Reference to Item 8.3]; - cryptographic control [Referring to Item 6]. 3. Supervision of the operating personnel: - end user controls, for example: - protection of unattended
บุคลากรผู้ปฏิบัติงาน - การควบคุมการใช้งานของผู้ใช้งาน (end user) เช่น - มาตรการป้องกันทรัพย์สินสารสนเทศประเภทอุปกรณ์ระหว่างที่ไม่มีผู้ใช้งาน (protection of unattended user equipment) [อ้างอิงจากข้อ 7.2
the business of the other party and the nature of such controlling power shall be depicted; and (b) The party that owns the funds does not want to obtain the legal protection under the provisions
shall, however, be submitted within the time specified in Section 90/26 or Section 91 of the Bankruptcy Act B.E. 2483 (1940), as the case may be. DIVISION 4 PROTECTION OF CUSTOMER ASSET SECTION 41. 2 The
such services; (12) clients’ asset An intermediary shall arrange adequate protection for clients’ assets when it is responsible for them; (13) relations with regulators An intermediary shall deal with
to make the management that are entrusted for the management of investments work on the basis of integrity and prudence with knowledge and expertise of the professional to ensure the full protection of
Law on Derivatives ; (17) derivatives business operator under the Law on Agricultural Futures Trading; (18) international financial institution; (19) Deposit Protection Agency; (20) Stock Exchange of
client by considering the following matters: (a) disclosure of accurate, complete, necessary and sufficient information to the client; (b) protection of the client’s confidentiality; (c) handling of the
services to the client by considering the following matters: (a) disclosure of accurate, complete, necessary and sufficient information to the client; (b) protection of the client’s confidentiality; (c
the use of cryptographic controls and key management for protection of sensitive and critical information; (3) policy on the transfer of information within organization’s networks and with external